What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Account Coordinator(AC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Bloomingdale, IL Businesses:
What A Few Of Our Clients Have To Say
Andromeda IT Service Offerings
Here is just a quick list demonstrating the breadth of IT services you can expect from Andromeda:
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
Password Quick Tips – 6 Do’s & Don’ts Oct 30, 2020
Of course, cyber security and are hot topics, but many of you mentioned that you are interested in quick tips you can follow or use yourself.
You ask – we deliver.
Without further ado – check out these 6 quick tips for best password security practices
- Create passwords with multiple cases, symbols and numbers. Just be sure to avoid passwords such as “123456”, “qwerty”, “football”, “princess” or “password” – some of the most common passwords according to SplashData.
- Don’t create a password based on personal details such as your birth date, an anniversary, phone number, social security number etc. While not everyone may know these details about you, they are among the first a cybercriminal or evildoer will attempt when trying to hack your account. Even worse, if your password data is compromised, imagine what a cybercriminal could do with that social security information if it was exposed.
- Avoid using the same password on multiple sites. We get it, remembering different passwords for all of your different sites and needs is difficult. It is important to create something unique for every login you maintain. Remember, if a hacker gets ahold of your password for one account, the first thing they will do is try that bad boy on bank accounts, social media, emails and anywhere else they can to grab sensitive information or even your hard earned money. (Don’t worry about remembering all the different passwords, we cover that below.)
- Change your passwords regularly. We suggest changing passwords every 90 days. This can be a pain but if you maintain this practice you make getting into your accounts that much harder.
- Do Not keep a list of your passwords on your computer. Keeping a list of passwords is dangerous in any format. You open yourself up to great risk in doing so. The worst method for this is keeping a list of your passwords in a file on your computer. Instead, keep a list of each site and next to it write a specific clue that will only make sense to you. This can help jog your memory without spilling the beans if someone stumbles upon the file. (Or let a password manager create passwords for you and store them so you have them all in one place – see below.)
- Use Dual Authentication. Many apps and sites now offer dual authentication as an added security measure. Once you login to your account, you will be prompted for a code (either one you create or a randomly generated code). You put this code into the site as a second proof of your identity. This feature greatly reduces if not eliminates the likelihood of someone breaking into your accounts.
Password protection is difficult. The average Joe has anywhere from 20-200 passwords. We recognize that is a big gap but even memorizing 20 different passwords is a difficult task. With that said, we would like to provide you with a few useful tools that can free up your memory and manage your password security for you.
There are a variety of password managers on the market. We have used and enjoyed LastPass which comes with a free and premium subscription as well as an app for your phone. If you want to check out a variety of password managers and how they stack up – PC Magazine has rated them for you here.
Password Security Tests
Platforms and websites do exist that will check the security of your password. There are even some websites out there that will tell you how long a hacker would have to spend to crack your code. Check out our recommended tool here.
Email Alias Tools
We’ve found an interesting tool that can help you keep track of your passwords but also creates aliases for your email address. This is useful because without your email address, a password is essentially useless. Now, of course you don’t want someone to have your password at all but this also helps you keep your inbox clear of spam and unwanted mail.
Any of these tools can help you out. If you have any questions feel free to reach the Andromeda Team Today!
The post Password Quick Tips – 6 Do’s & Don’ts appeared first on Andromeda Technology Solutions.Importance of Segmenting Your Network in Manufacturing and Logistics Jul 17, 2020
There are likely many kinds of devices and many different elements that makeup the unique network infrastructure at your manufacturing, logistics, transportation or distribution (MLTD) business. You probably have many of the standard devices we see across most of our IT clients – firewalls, routers, access points, switches etc.
Not to mention any connected devices related to your production, staging or shipping processes.
In recent years, the MLTD industries have been heavy targets for cybercrime and cybercriminals. This has been largely attributed to the way these businesses use technology and the fact that many businesses in these industries are leaning on older systems and technologies that are specific to their business models.
Criminals have caught onto this issue and are attacking known weak points, disrupting production, and grinding businesses to a halt.
One important step you can take to defend against this is to segment your networks and add layers to protect the different networks of your business.
What does it mean to segment my network?
Essentially, all this means is separating different groups or functions at your business into different networks so that you can control them individually.
The most common network segmentation we perform and encounter in the MLTD market is between the operations network (back office) and the production network (on ‘the floor’ of your facility) and the BYOD Network (for guests and staff devices).
Why do I want to segment my network?
Segmenting your network helps to keep all of the appropriate activities in their appropriate lanes. For instance, you don’t want your employees surfing the web on their cell phones on the same network that your primary business functions on.
Imagine an employee accidentally clicked a bad link and infected/shut down the whole network – you’d likely want this to happen in an area that didn’t impact the entire business. Instead, if you segment properly, the impact would be restricted to the BYOD or Guest network and your employees couldn’t use WIFI on their personal devices until you got things cleaned up.
Now, imagine this same example hits your back office. An employee opens an email and unknowingly gets infected with ransomware. That ransomware now spreads throughout the office and all PCs are down. With proper network segmentation, you have an added layer that will help protect your production floor from being infected. With a good <<business continuity plan – Link to that other article on business continuity>> your team can work on resolving the issues in the office but the production network would not be impacted.
The post Importance of Segmenting Your Network in Manufacturing and Logistics appeared first on Andromeda Technology Solutions.Yahoo Making Email Forwarding Rules Changes In January Nov 19, 2020
Do you have a free Yahoo email account? If so, be advised that beginning January 1, 2021, you will lose the ability to set up automatic email forwarding from that account, and any automatic forwarding rules you've already got in place will stop working.
Yahoo Mail's new owner, Verizon, announced the change in October 2020 on a blog post, and are now proceeding with customer notifications via email.
According to a recently updated FAQ page, security is the main reason for the change. It's an incredibly common tactic for hackers to breach a user's email account and then abuse the auto-forwarding rules to get copies of all the incoming mail messages that user receives.
On balance, this is a good change and a smart move by Verizon, even though it will inconvenience some of the company's users. If you want to continuing having access to auto-forwarding rules, your only real options are to either migrate to a different email platform or get a pro Yahoo.com mail account.
If you've got an account and you're not sure whether or not you have auto-forwarding rules set up, here's how you can check to see if the coming change will impact you:
- Log onto your Yahoo.com mail account
- Click "Settings" once you're looking at your inbox
- Then select "More Settings"
- From here, select your "Account Name"
- And then scroll down to the "Forwarding" section to see if you have any rules in place.
If you don't see any rules in that section of the screen, then the change isn't going to impact you anyway, and you can keep using your existing account without issue.
Change is hard, and we imagine that Verizon wrestled with the issue before making a final decision. After all, estimates are that Yahoo mail boasts more than three billion users, so this has the potential to be a big change. In the name of improved security, however, it seems like the right call.
Kudos to Verizon for taking security seriously, even at the risk of alienating some of their customers.