What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Service Coordinator(SC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Bedford Park, IL Businesses:
What A Few Of Our Clients Have To Say
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
To SSL or Not to SSL: What is HTTPs and Why it Matters to You Jan 12, 2018
2017 was a pretty eventful year for tech. Between the WannaCry ransomware virus, the data breach at Equifax and many other less famous incidents – one thing is for certain. 2017 was the year of cybersecurity and 2018 is expected to follow suit.
With cyber attacks on everyone’s mind and radar, businesses are starting to notice a shift in public perception when it comes to the companies they work with when it comes to data security. People want to feel safe – and they want to make sure that their information is safe, even on the web.
So while this has been a growing trend for a few years now, it is safe to say that moving forward, the trend has transformed into an expectation of security and protecting consumer data.
2018 is definitely the year of HTTPs.
What is HTTPs?
To understand what HTTPS means and how it works, you need to know a few definitions.
First – HTTP, HTTP stands for HyperText Transfer Protocol. Without diving too deep into the technical lingo, this is an application layer protocol. Basically, HTTP is the protocol that involves information sent between a browser (like google chrome) and a website itself. So if you were to interrupt that connection and intercept it, you’d see in plain text what was being communicated between the website and the browser.
This can be very dangerous in certain situations. For example, if you are purchasing goods on a website with a basic HTTP (basic meaning unsecured), your personal information like your address, credit card info and whatever else you submit can be intercepted and stolen.
Nobody wants this to occur – except the thieves – so HTTPs was introduced as a secure option.
Like HTTP, HTTPs stands for HyperText Transfer Protocol but it has an additional Security component; hence the “S”.
By adding additional security components, the language being transmitted between website and browser is encrypted and kept from being read by evil doers and criminals.
Another term you might hear thrown around regarding this security protocol is an SSL or Secure Socket Layer Certificate. Again, this is just another way of saying that your site has the technology in place to securely encrypt transactions between the website and browsers etc.
The types of SSL Certificates may vary, but their basic coding provides security and encryption.
You can always tell if a website is secure in a few different ways.
- https:// precedes the URL destination i.e. https://www.google.com
- A lock shows up in the leftmost corner of your navigation bar
- A green lock shows up in the leftmost corner of your navigation bar
Sounds pretty good, right?
There was a time when this added security feature was mainly used on websites that transfer personal information such as ecommerce, financial, medical, legal etc. but these days the added security of an SSL or HTTPs on your site is more of a standard.
It is something that savvy consumers look for to avoid vulnerability.
Now that we’ve gone through what this feature is and how it operates in respect to your website you might have some additional questions about whether this feature would benefit you. We’ve touched on a few of the most common topics below.
I’m Just A Small Business Website,
Why Should HTTPs Matter to Me?
An SSL Shows Your Customer Base You Care About Their Security
By adding an SSL certificate to your website, and turning it from HTTP to HTTPs, you are providing an extra level of security for your users. They know right away that your website is secure- that nothing they are viewing or how they are interacting on your website is being monitored or watched by a malicious entity. It shows that you care about your customer’s user experience – and that reflects highly upon your company brand.
It Actually Provides Additional Security Against Hackers
Having an SSL certificate installed on your website also helps protect your website from a possible breach or hacking attempt. The extra level of encryption provides an external wall that is harder for hackers to break and infect. So while you might not necessarily need one for the type of website your business uses – it does help you protect yourself against would-be attackers and saves you money on potential cleanup and patches once a website does get infected or breached.
HTTPs Help Improve Website Search Engine Rankings and Traffic
Having this added security installed on your website shows popular search engines like Google, Yahoo and Bing! that you take your user’s experience and security seriously. So seriously that they award your website with increased rankings.
And we all know higher rankings lead to more traffic which you hope leads to more clients/customers.
Google has been favoring websites with HTTPs for a few years now; however, after recent technology-related world events, they have doubled-down.
Starting this past October, websites that use a form or search tool on their website will not have a Not Secure warning when viewed on Google Chrome browser. The last thing you want your prospective clients to see when visiting your site is a message about poor security.
Google also has been blatantly favoring websites with HTTPs over HTTP. About have of all 1st page results on Google are websites with HTTPs, up over 30% since the end of 2016.
Failure to increase security on your site risks lower search rankings and even increases bounce rates. It is also proven that HTTP sites load slower, causing Google to penalize them for site speed as well. Overall, the industry is punishing sites that do not value security.
So, what should you take away from all of this?
An SSL does incur extra costs (but they are minimal) but failure to secure your website can cost you potential new customers, reduce website traffic and impact overall user experience.
Your IT partner or web hosting provider should have the necessary tools to help you with your website security. It should be fairly simple and won’t break your budget either.
Want to take the next step and convert to HTTPs but not sure how?
Andromeda has trained technicians and developers that are more than happy to help you with the conversion. Just give us a call to get started today!
The post To SSL or Not to SSL: What is HTTPs and Why it Matters to You appeared first on Andromeda Technology Solutions.Your Company Laptop Was Stolen – Now What? May 29, 2018
It’s another Tuesday in the airport, and you just cleared the TSA line and went to the pretzel shop for a quick bite before you catch your plane. You sit your laptop down to get a straw, and the next second…your laptop is gone. It’s not in sight, nor is the thief who stole it.
At first you’re confused, then the confusion starts to fade away and you realize that this wasn’t just a personal laptop. It was your work computer and had company files, sensitive information and access to company data that definitely doesn’t belong in anyone else’s hands.
But what do you do?
What To Do When You Can’t Find Your Stolen Laptop
Stolen Laptop Step 1: Get in touch with your IT team
Whether you outsource, have internal IT staff or a mixture of both, your first step is to alert your IT support teams of the incident. Time is critical on this.
Even if you have a password on your laptop, which will likely prevent the thief from immediately having access to your private documents. It won’t stop someone removing the hard drive from your laptop and connecting it to another computer. Suddenly your hard drive is sitting there, ready to browse – just like any other folder or drive letter.
Your IT Staff/Vendor should be installing encryption and remote management software on all remote devices. With proper encryption, your data is secure AND with remote management, your IT staff can wipe the stolen laptop before any damage is done.
Without this encryption software and remote management, you’d be forced to report any theft like this as a data breach. That means the government knows about it, your employees need to be made aware and worst of all – you have to alert clients.
This is why in this instance, you call your tech staff first.
Stolen Laptop Step 2: Contact the Police and file a report
The next best thing to do in situations like this is to immediately file a police report for the stolen laptop. Having a police case number can help with any insurance and/or recovery endeavors that come up. Plus, having a police report can help catch the criminal who stole your sensitive devices.
Stolen Laptop Step 3: Change Your Passwords
If you don’t have encryption and even if you do – it is smart to change passwords to all personal, professional and financial accounts. Additionally if you used this computer to pay bills, check banking information or for any type of financial transactions, you’ll want to make sure to check those accounts.
Stolen Laptop Step 4: Recover Your data on another device
This step also involves your IT staff/company. Hopefully you’re IT pros have all of your company data backed up and readily available. It is important that you synch your portable devices regularly so that in ANY incident of failure or theft, you can be restored quickly without too much interruption.
To make sure that you’re covered on this front, we’d suggest requesting regular tests of your backups anyway. That way, no matter the issue, you know your data is secured, backed up AND ready to deploy in an emergency or urgent situation.
There are many steps you’ll want to take after a theft occurs but with proactive IT support you won’t have nearly as many headaches to deal with.
These things happen more often than you’d think too.
On average a laptop is stolen every 53 seconds!
So – take the following actions and get ahead of the issue before a stolen laptop happens.
- Find out if your company’s remote devices are encrypted with the ability to wipe all data on command
- Make sure that you train employees with remote devices not to leave them unattended and to lock them in the trunk of their cars instead of leaving them in a front or backseat.
- When travelling put your laptop on the TSA conveyer belt last – that way it is less likely to remain unattended.
- Look into your company backups and business continuity protocols.
- How often are they tested?
- How often are remote users synching and backing up data?
- How long will it take to restore a PC when you need it?
Our team is here to help you set up and manage any of the technical details listed above.
In fact, fill out the form below or call the office to receive 10% off of your initial setup fees for our remote encryption software!
Just mention the code “Encrypt4Me” when you call (815) 836-0030 or fill out the form below.
The post Your Company Laptop Was Stolen – Now What? appeared first on Andromeda Technology Solutions.Researchers Have Found A New Security Issue With Bluetooth Nov 17, 2018
Researchers from the Israeli security firm Armis have discovered a new security flaw in BLE (Bluetooth Low Energy) chips that expose millions of access points and networking devices around the world. This opened the door to a new hack.
The flaw has been dubbed "BleedingBit" and is actually two separate vulnerabilities that could allow a hacker to execute code or take complete control over a vulnerable device without the need of a password.� What makes BleedingBit an especially dangerous flaw is the fact that a wide range of medical devices including pacemakers and insulin pumps can be targeted, along with other IoT devices and point of sale terminals.
According to the research team, the attack works as follows:
"First, the attacker sends multiple benign BLE broadcast messages called Advertising Packets, which will be stored on the memory of the vulnerable BLE chip in the targeted device.
Next, the attacker sends the overflow packet, which is a standard advertising packet with a subtle alteration - a specific bit in its header is turned ON instead of off.� This bit causes the chip to allocate the information from the packet a much larger space than it really needs, triggering an overflow of critical memory in the process."
It should be noted that in order to execute the attack, a hacker would need to be in close proximity to the target device. Of course, once it has been compromised, it can be accessed again at will remotely, monitoring network traffic, conducting man in the middle attacks, or launching additional attacks on other devices connected to the targeted device.
The Armis researchers responsibly reported their findings and the chip manufacturer, Texas Instruments, has confirmed the vulnerabilities and has already released patches for the affected hardware.
If your company uses BLE chips in any aspect of your business, be sure to grab the latest update.