What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Service Coordinator(SC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Bloomingdale, IL Businesses:
What A Few Of Our Clients Have To Say
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
How to Spot Phishing Scams and Stop Cyber-Criminals from Stealing Your Data Apr 27, 2018
Cyber-Security is a big topic in the news. New businesses fall victim to hackers and cyber criminals daily.
Even high quality security programs and protocols can fall victim to cyber-bullies without proper employee training, awareness and attention to detail.
We believe education is one of the best defenses against cyber criminals.
With that in mind, we want to provide some valuable tips for spotting and avoiding one of the most popular scams/tactics cyber-criminals use against you: the Phishing Scam.
Email is essential to your business and every day communication. It is also one of the prime spaces hackers focus on to steal your information and sneak into your network.
This is because it is SO much easier to get a person to click on a link, input account info or download a corrupt file via an email scam than many other hacker strategies.
You’ve probably heard this but it’s true – “There’s one person in every office that will click on anything.”
Hopefully that person isn’t you!
But – with the information below, you’ll learn how to spot these scams and some strategies to avoid them altogether.
Phishing Scams 101
What are some of the Goals of Phishing Scams?
- Steal Sensitive Personal Info – Credit Card Info, Account Login Info, Personally Identifiable Information (SSN, Birth Date etc.)
- Gain control of your computer or network
- Install malware or other computer viruses
How do cyber-criminals convince you to fall for their plans?
- Deliver file attachments with harmful software enclosed – viruses/malware/keystroke loggers
- Trick you into clicking on bad websites that secretly infect your PC with viruses etc.
- Convincing you to give them username info and password info to desired accounts
Things you should look out for to spot and prevent Phishing Scams
- Make sure that the “reply to” email address matches the sent address
- Any message that creates a sense of urgency – especially regarding login info
- Any message that requests sensitive data
- Questionable links or links that don’t match the anticipated site/source
- Random social media messages asking you to click a link to see a video or receive specific info
Keep in mind and remember that legitimate companies won’t email you asking for passwords, sensitive info (social security numbers) or other sensitive data via email.
Sample Phishing Scams Explained:
- The ‘From’ email address is suspicious
- ‘From’ and ‘Reply-To’ are different and both are suspicious again
- When you hover over the ‘Restore Access’ button there is a link that doesn’t match any Microsoft destinations
- Bad sender domain
- Suspicious Subject & Content – generic name and sense of urgency to give up account info
- Bad grammar
- Suspicious link if you hover over the masked link.
- Bad domain in ‘From’ section – email@example.com
- Generic Greeting
- Bad link redirect
- Sense of Urgency in message to get your account info
Response Strategies/Protocols for suspected phishing emails:
In the office it is important to have conversations with employees and make sure everyone knows what to do if they suspect a bad email.
- We recommend alerting your IT partner or IT staff members of the issue.
- NEVER click any links you think are suspicious.
- If you are unsure of an email you can always contact the related company direct. For example, with respect to any of the above emails you can always go directly to their official page, grab contact info and call/contact support to confirm that the email is real.
- NEVER use contact info in a suspicious email to figure out whether it is real or not. Criminals put fake phone numbers and contact info in their messages so of course they will tell you that the email is real.
- Hold regular cyber security and data security training in your office to make sure employees are up to speed on the latest techniques/red flags.
The post How to Spot Phishing Scams and Stop Cyber-Criminals from Stealing Your Data appeared first on Andromeda Technology Solutions.Dark Web Series Part 1 – What Is the Dark Web & Why It Matters To You Dec 29, 2017
Ransomware, cybercrime, hackers . . .
It’s safe to say that you’ve at least heard of these terms in the news and if you are like most people, you’ve heard them over and over on the news, in the office and just in everyday conversation for the past few years.
This progression in the cybersecurity world may come with unique phrases and buzzwords but the trend itself is nothing new. Since the internet’s beginning, there have been people working to cause chaos.
Think computer viruses, Trojan horses, scams, spam, malware etc.
Like most technology, the internet is used predominantly for good. But, there are always a few bad apples who take good technology and choose to use it with less than the best intentions. And while there have always been “bad guys” out there trying to disrupt good works from being done, over the last decade and specifically in the last few years we’ve seen an incredible increase in spending, vulnerability and rates of incident for large scale cyber-attacks.
To put this in perspective, spending on cybersecurity is projected to exceed 1 trillion dollars by 2021. In 2017, information security (a subset of the cybersecurity industry) spending hit over 86 billion dollars.
On top of this, there has been a dramatic increase of incidents in the small to medium sized business arena. When a local business gets hit, it may not make the 5 o’clock news like Home Depot or Target, but it hurts just the same – and maybe even more.
The crazy thing when it comes to cybercrime, ransomware and other infections is that you can be doing regular updates, implement antivirus etc. and you still can fall victim to identity theft, breaches and other cyber incidents.
All of this cyber-security and cyber-crime discussion lays the groundwork for this Dark Web discussion.
What is the Dark Web?
First, what is the Dark Web? In a simple and brief explanation, the Dark Web is a mostly anonymous space online that you need special software to access. The experience is much like a normal internet browser but the sites and activities available are very different.
Many times the Dark Web is described using an iceberg illustration.
- The internet as we know it is what you can see above sea level.
- There is a larger space just below the surface of the iceberg where the ‘darknet’ lives, this is dominantly used for large data stores. Financial records, academic databases, government records etc. live here.
- Then there is the bottommost layer of the iceberg, this is the Dark Web – here you’ll find illegal activity like drug trafficking, illegal gun sales, and even personal data for sale.
Now, you may be thinking,
“This is interesting information but what in the heck does the Dark Web have to do with me? Why do I care about it? I don’t use it. I don’t know anyone who does. . .” And we get that, but even if you don’t use the Dark Web you may be on it.
The Dark Web is one of the largest sources of stolen data available to criminals. While some may use it to buy goods, other criminals purchase pieces of your information like credit card information, passwords, social security information and more to use for their own purposes.
When cybercriminals go to places like your local grocery store, Experian and other sites to wreak havoc, the information they steal ends up for sale on the Dark Web.
All of this taken into consideration, the everyday consumer and business professional shouldn’t be scanning these areas of the web to try and protect their data.
Instead, a business professional like yourself should make sure that you are following proper security protocols:
- Anti-Virus Software Regularly Updated and on every device
- Proper Firewalls and regular updates
- Employee training
- Regular Professional Backups (also regularly tested and verified)
- Disaster Recovery Plan
- Spam filtering
- Encourage employees to speak up if they see a weird email or link
- Bring in professional cyber security consulting
With all of these items and a few more in place, you make it much more difficult for a cyber-criminal to get into your network and steal your data. This in turn will help keep your data and that of your employees off of the Dark Web. Of course, nothing is foolproof and that is why an exceptional cyber-security partner should offer Dark Web monitoring.
Dark Web monitoring is a program some IT professionals offer businesses where scans are going on constantly in the background and are looking for a specific domain. When the scan recognizes your domain in a database, it flags the software and you are alerted to change passwords or address the breach.
This way, you are always a step ahead of the criminals without lowering yourself to the “Dark Web” itself.
We hope you found this first installment in our Dark Web series helpful. Look out for our next article in February focused on 5 ways you can keep your information off of the Dark Web entirely.
Interested in reading more? Check out:
Part 2 Part 3
The post Dark Web Series Part 1 – What Is the Dark Web & Why It Matters To You appeared first on Andromeda Technology Solutions.Digital Movie Service UltraViolet Is Shutting Down Feb 14, 2019
On paper, UltraViolet seemed like a great idea.� It was (and still is, for the moment) a service that stored your license information for various digital media you purchased.
You could buy a movie from Amazon Prime, buy something else from some other online vendor, and watch them on any number of devices without having to log into individual services.
You could even use the service to redeem digital copies of movies that are sometimes made available when you buy a physical copy of a movie.
Unfortunately, the Digital Entertainment Content Ecosystem (DECE), the group of companies that created UltraViolet, has now decided to end their experiment and is in the process of closing down the service due to changes in the marketplace.
As Wendy Aylsworth, the head of the DECE explained:
"The marketplace for collecting entertainment content was very small when UltraViolet started.� It was siloed into walled gardens at the time."
That's clearly no longer the case. A variety of companies have now launched similar services including industry heavyweights like Disney with their Movies Anywhere service.
From now until July 31st, you'll be able to continue to use UltraViolet to watch movies you have in your library and to redeem digital copies of physical purchases you've made if (and as) they are offered.� After July 31st, however, the only way you'll be able to access your movies is to log onto the site or service you purchased them from, or link those accounts to some other comparable service.
In many ways, UltraViolet was ahead of its time and it enjoyed a good run, making the lives of digital consumers of media much simpler than it otherwise would have been.� Unfortunately, all good things eventually come to and end, and for UltraViolet, the end is July 31st, 2019.