What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Service Coordinator(SC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Burbank, IL Businesses:
What A Few Of Our Clients Have To Say
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
5 Cyber Security Features/Protocols Your Business Needs To Protect Against Scammers, Hackers & Cyber Criminals Oct 30, 2017
Sometimes it sounds like the news and cyber experts are on loop or a broken record. Every day there is a new report about cyber security, threats and the like. But while these stories and warnings may start to seem like white noise in the background, the threats are still here and they are very real.
The upside of all of this coverage and conversation is that business owners are wising up and with the topic of cyber security taking center stage, users and business owners alike are being more proactive when it comes to protecting and educating themselves.
In the spirit of education we’d like to dive a little deeper into 5 features/protocols you can set up at your office to beef up your IT Security.
Top 5 Cyber Security Features/Protocols
Multi Factor Authentication
This feature is nothing new but it is becoming more and more common across all kinds of accounts. Financial services, email, social media and other applications/accounts are making use of multi or dual factor authentication. Essentially you have a password and second form of identification to prove your identity. Sometimes this is a randomly generated code – think Facebook’s code generator.
Another type of multi or dual factor authentication uses biometric data for identity verification. Things like a fingerprint or a retina scan are examples of this type of security measure. In fact, last month we took a look at biometrics, integrated security and banking applications – read more about that here.
An Employee Training Program
Statistically over 80% of all breaches and intrusions occur after an employee error. Clicking a link in an email, downloading a malicious file, visiting an infected website . . . there are so many ways this can happen and most of the time it isn’t intentional either. The best way to prevent this from happening is an ongoing security program for yourself and employees. A good program will have a varied focus: compliance standards for personal and customer info (commonly known as pii or personally identifiable information), strategies for recognizing and avoiding email scams, proper security protocols for best practices at the office and more. In 2017 Andromeda recognized this need and released our PII Protection/Cyber Security Training Program. See full details here.
Business Grade Firewall
A good firewall is your first defense against intrusion. With proper intrusion detection and intrusion prevention settings you arm yourself against cyber criminals and hackers. On top of that, a business grade firewall solution is an important piece of hardware when you want to set up public and private networks. You definitely don’t want guests at your building or passersby accessing company documents or networks because of low cyber security protocols.
Regularly Scheduled Updates/Patching
New viruses and threats hit the market every day. On top of that, hackers and criminals discover new vulnerabilities almost as fast as developers can protect against them. This is why keeping up to date and on top of patching and updates is so important. For instance, the WannaCry virus everyone heard so much about this year took advantage of a vulnerability that had already been addressed by a Windows patch. If companies had proactively updated and maintained their updates/patches, they wouldn’t have been as vulnerable to an attack.
This ties into both firewall protocols and employee training but of course, the fewer random emails that make it into your employee inboxes, the fewer links and files you need to worry about employee’s (or even yourself) clicking on. A professional spam tool can be configured to your liking and can do a whole lot to prevent content from making it to those that might accidentally infect your network. See the photos below for a few examples of emails we protect customers from on a daily basis.
As always, Andromeda is here to help you protect yourself and your business from these ongoing threats. Take the first step today and sign up for a cyber security audit with our team of experts.
The post 5 Cyber Security Features/Protocols Your Business Needs To Protect Against Scammers, Hackers & Cyber Criminals appeared first on Andromeda Technology Solutions.4 Reasons Office 365 is the Right Choice for Your Business Aug 03, 2018
By the end of 2017, Microsoft’s Office 365 Suite of applications had over 120 million active business and commercial users. Microsoft projects that in fiscal 2019, approximately two-thirds of all Microsoft Office users will be subscribed to Office 365 instead of the traditional licensing model.*
Cloud applications have made a great impact on business, connectivity, accessibility, and productivity. From the looks of it, more and more applications and even hardware solutions are moving to the cloud.
This is exciting for business and the technology sector because there are many real benefits to business owners and employees built into cloud applications.
Office 365 offers different subscriptions and packages built to suit the specific needs of your business, but across their offering, there are many shared benefits.
Let’s take a look at the top 4 reasons Office 365 is the right choice for your business, and why Andromeda Technology Solutions recommends it.
1. Say Goodbye to Expensive Microsoft Licenses
Licensing for the Microsoft Suite (Word, Excel, PowerPoint, etc.) can be very costly. Depending on which version of Office you are purchasing, each license can set you back hundreds of dollars. Even for the average small or mid-sized business, this adds up to thousands of dollars very quickly.
Microsoft also phases out legacy software over time, which means that your current professional Microsoft Office license will no longer be supported, maintained, or updated at some point. For example – Microsoft Office 2010 will reach end of life in 2020, and businesses with these licenses will need to purchase new ones for all machines or migrate to Office 365.
With Office 365, your software is always up to date and there are no licenses to worry about. Whenever a new version of the product becomes available, it is automatically pushed out across the cloud applications and your employees keep working without issue. Any documents, presentations, spreadsheets, or other items you’ve created within Office 365 will automatically update to the latest version of Office.
2. Office 365 is Budget-Friendly
Office 365 is a subscription-based cloud application. As mentioned before, there are several different subscription levels with multiple applications. This offers flexibility to suit most any business needs and budget. You can easily calculate and anticipate your annual budget with Office 365 and build it into your regular expenses.
The solution is billed per user. It should be mentioned as well that each user can install the application on multiple devices. This means that you only pay for one subscription per user – even if they access Office 365 on multiple computers, a tablet, and even their smart phone.
3. Work from Anywhere
While you’ll need an internet connection to collaborate with your coworkers in real time, or use certain applications, Office 365 lets you work from just about anywhere. You need an internet connection for the initial setup, migration, and sign up. After that, you have the option to install the latest Microsoft Office Suite directly on your computer. You can save your files directly onto your PC and host them in the cloud for accessibility on the go.
The real productivity magic with Office 365 lives in your ability to access and work on things from anywhere with an internet connection.
Whether you are in the airport, at home, drinking coffee on the go, or in your car before a big meeting, you can login to Office 365 to review your files or make last minute changes at any time: you can even do it from your smartphone.
You can also work with multiple teammates in the same documents from multiple locations. For example – teammates in 2 different locations can work together to complete presentations, spreadsheets, and other deliverables in real time without locking one another out of documents.
4. Increased Storage & Security
Microsoft knows that to make Office 365 attractive to businesses like yours, they have to make sure that the cloud environment and application is secure and trustworthy. There are many features and add-on security settings available to you like encrypted email, spam filters, data loss prevention services, mobile device management, and more (some may require additional fees).
On top of built-in security features, Office 365 subscribers benefit from increased storage capacity in Outlook and OneDrive. The Office 365 Enterprise E3 license offers 100GB mailbox storage and unlimited personal cloud storage as a standard. If that isn’t enough for your environment, or you outgrow any of your storage over time, Office 365 is built to scale and grow with you. This is possible by offering additional storage, security, and application options specific to your needs.
When it comes to accessibility, ease of use, budgeting, and ongoing support, Office 365 is the leading option for business. We anticipate it will continue to dominate the market for both small to mid-size businesses and enterprise.
If you are interested in Office 365 for your business, a great first step is a consultation with one of Andromeda’s local account managers. There are many different subscription levels, applications, and migration details that you will want to go over before making the switch. Additionally, you will want to make sure you are working with an IT Services Professional to make your project and migration as seamless as possible.
Simply reach our team by phone (815) 836-0030 or email: Contact@WeNetwork.com to schedule a conversation. You’ll be glad you did!
*For more on Office 365 users and statistics, check out this article from zdnet.com.
The post 4 Reasons Office 365 is the Right Choice for Your Business appeared first on Andromeda Technology Solutions.New Versions Of Ransomware Continue To Wreak Havoc Sep 11, 2018
2017 was "The Year of Ransomware." It saw an incredible number of ransomware attacks and infections, paired with a tremendous number of innovations.
Although 2018 hasn't seen quite the same level of ransomware activity, it's still a major threat with one company coming under attack about every ten minutes.
Although there haven't been as many innovations so far this year, that doesn't mean they're not occurring, and some of the new ransomware strains are particularly nasty.
Of interest, this year has seen a rise in 'Cryptojacking', which is a variant of a classic ransomware attack where the malware mass encrypts files on the victim's machine while simultaneously installing cryptocurrency mining software.
This should come as no surprise given the rise in popularity of cryptocurrency, but it does add a disturbing new wrinkle to ransomware attacks. Even after you get your files back, lurking in the background there is a rogue process that's slowing your system and ultimately putting money into the bank accounts of the hackers.
Most recently, an Obama-themed cryptojacker has been making the rounds.
The ransomware itself is nothing out of the ordinary. It predictably locks your files, demands payment, and installs a Monero miner in the background.
Obama is not the first world leader to unwittingly become the face of ransomware. In 2016, Candidate Trump was featured in a malware strain that proved to be a work in progress. It would infect machines, but didn't actually encrypt files. It's unclear if a working version was ever deployed in the wild.
The Obama strain contains code fragments that indicate Chinese origin. There's circumstantial evidence that leads some security researchers to believe it may be the work of a Chinese hacker known only as "Rocke," but so far, there's no definitive proof.
As things stand now, there's no good defense against this most recent threat, save for continued vigilance.