- Long-term MSP (Managed Services Provider) for all your IT, phone, and security needs
- "Special needs" implementer to augment the day-to-day tasks of an internal technical staff (e.g., initial setup of a new server or new phone system)
- Reliable "go to" solution provider for the occasional break-fix issue (HelpDesk and dispatchable techs)
Managed IT Services
…and your budget!
In an MSP role, Andromeda offers a range of service plans—anything from month-to-month "time & materials" based assistance to fixed service contracts that permit "no-brainer" conformance to an annual budget. We even offer V.I.P. plans which permit you to "jump the queue" for HelpDesk and remote technical support assignments! Beyond the functions you would expect from a full-service MSP:
- Reliable & Fast Hybrid System Backup / Business Continuity Solutions
- Fast Data Recovery
- Network Management including 24/7/365 monitoring
- Virtual CIO role
- Security (spam control, anti-malware, containment & cleansing)
- End-to-End Internet Access & Web Hosting
- Email Account Setups, Mobile Syncing, Hosting, Archiving, and Cloud storage/services in Calumet City, IL (e.g., Microsoft Office365 setups)
- Software Application Deployment & Database Repair
- Automated Patching
...Andromeda can offer so much more: a single, expert source for a full range of physical security systems which can (and should) freely interact with your data network:
- Telephone systems—both hosted VoIP and traditional on-premises
- Building/Door Access Control
- Security Camera Systems and Video Surveillance
- Burglar Alarm System Installation & Monitoring
So, not only can we provide professional service for the full gamut of physical security needs of your growing organization, we are uniquely positioned to integrate those systems with any elements of your data and voice network. It is this integration that extracts the full power and usefulness of these systems for your organization.
- System design (for new networks or expansion of existing ones)
- Ordering/delivery/installation of network components
- In-wall & in-ceiling wiring & access boxes in new or existing structures
- Integration with your current network, security systems, alarm systems, door access…
- Computer configurations, email/network accounts, firewalls, security software…
- Complete system testing and staff training
But our job doesn't stop there. Once your network is operational, we can continue to support you with preventive maintenance packages, innovative approaches to data backup, virus and Malware control, and anti-spam solutions.
Computer Network Infrastructure – Switches, Routers and Firewalls
Having a solid network infrastructure is critical to keeping your systems running well and with minimal downtime. Truly, a $20 network switch from the retail store down the street or the guy you know that "does some wiring on the side" is not going to get you where you need to be. Neither are onsite-only or Cloud-only backup solutions!
Knowing that IT network wiring and switches are the vital backbones of your operation, Andromeda employs only experienced technicians and uses only business-class networking gear:
HP network switches • Cisco routers • Sonicwall & Netgear firewalls
WANs, VPNs – Multiple Locations and Remote Access
We specialize in extending your network beyond the four walls of your main office. This might include remote or branch offices, mobile employees or remote access from your house for voice, video, file sharing and much more!
Wireless IT networks are quite popular and are fast becoming indispensible. However, they generally cannot achieve the same level of performance as traditional wired networks where security, reliability, and bandwidth are of premium importance. Still, a wireless network is a great solution for a few roaming laptops or tablet PCs overlaying your wired office areas. To overcome the potential shortcomings of wireless, we use HP and Cisco Wireless Access Points, and we can guide you through the do’s and don’ts of implementing a wireless network to avoid the pitfalls.
Computer Network Design and Infrastructure Wiring
Whether you are adding a few offices or doing an entire build-out from the ground up, Andromeda Technology Solutions can help. We can provide infrastructure wiring for your voice, data, TV, cameras, overhead paging, etc. Having one company to handle all your wiring needs eliminates trying to coordinate vendors, minimizes labor overlap, and decreases cost.
We are also available to assist in the design of your wiring. While architects generally do a good job with this layout, we have a unique real-world approach that tends to be more in line with what is actually needed for a working office. Involving us early in the process will minimize the chance of having to run additional wires after your construction is complete…when it's much more expensive to install!
Web/Email Hosting & Web Design
"Commodity" web and email hosting seem like great solutions…until they go down OR you need to add a new account OR remove an ex-employee's access OR countless other items that need attention more regularly than you initially imagined. Ideally, your IT service that performs these functions for you should also host your web and email accounts to avoid delays, transfer issues, and any number of other potential mishaps. Andromeda is pleased to offer comprehensive hosting plans to do just that. Through our plans, you can also choose additional premium services like website hit tracking and statistics reporting.
Andromeda is also pleased to provide web design services—anything from simple informational sites to complete new site designs featuring animation/video, multi-tiered navigation, database-backed forms and social media interaction. We also have proven expertise in the art of SEO (Search Engine Optimization)—a "must" for any company that needs to generate new business leads from its on-line presence!
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
Dark Web Series Part 1 – What Is the Dark Web & Why It Matters To You Dec 29, 2017
Ransomware, cybercrime, hackers . . .
It’s safe to say that you’ve at least heard of these terms in the news and if you are like most people, you’ve heard them over and over on the news, in the office and just in everyday conversation for the past few years.
This progression in the cybersecurity world may come with unique phrases and buzzwords but the trend itself is nothing new. Since the internet’s beginning, there have been people working to cause chaos.
Think computer viruses, Trojan horses, scams, spam, malware etc.
Like most technology, the internet is used predominantly for good. But, there are always a few bad apples who take good technology and choose to use it with less than the best intentions. And while there have always been “bad guys” out there trying to disrupt good works from being done, over the last decade and specifically in the last few years we’ve seen an incredible increase in spending, vulnerability and rates of incident for large scale cyber-attacks.
To put this in perspective, spending on cybersecurity is projected to exceed 1 trillion dollars by 2021. In 2017, information security (a subset of the cybersecurity industry) spending hit over 86 billion dollars.
On top of this, there has been a dramatic increase of incidents in the small to medium sized business arena. When a local business gets hit, it may not make the 5 o’clock news like Home Depot or Target, but it hurts just the same – and maybe even more.
The crazy thing when it comes to cybercrime, ransomware and other infections is that you can be doing regular updates, implement antivirus etc. and you still can fall victim to identity theft, breaches and other cyber incidents.
All of this cyber-security and cyber-crime discussion lays the groundwork for this Dark Web discussion.
What is the Dark Web?
First, what is the Dark Web? In a simple and brief explanation, the Dark Web is a mostly anonymous space online that you need special software to access. The experience is much like a normal internet browser but the sites and activities available are very different.
Many times the Dark Web is described using an iceberg illustration.
- The internet as we know it is what you can see above sea level.
- There is a larger space just below the surface of the iceberg where the ‘darknet’ lives, this is dominantly used for large data stores. Financial records, academic databases, government records etc. live here.
- Then there is the bottommost layer of the iceberg, this is the Dark Web – here you’ll find illegal activity like drug trafficking, illegal gun sales, and even personal data for sale.
Now, you may be thinking,
“This is interesting information but what in the heck does the Dark Web have to do with me? Why do I care about it? I don’t use it. I don’t know anyone who does. . .” And we get that, but even if you don’t use the Dark Web you may be on it.
The Dark Web is one of the largest sources of stolen data available to criminals. While some may use it to buy goods, other criminals purchase pieces of your information like credit card information, passwords, social security information and more to use for their own purposes.
When cybercriminals go to places like your local grocery store, Experian and other sites to wreak havoc, the information they steal ends up for sale on the Dark Web.
All of this taken into consideration, the everyday consumer and business professional shouldn’t be scanning these areas of the web to try and protect their data.
Instead, a business professional like yourself should make sure that you are following proper security protocols:
- Anti-Virus Software Regularly Updated and on every device
- Proper Firewalls and regular updates
- Employee training
- Regular Professional Backups (also regularly tested and verified)
- Disaster Recovery Plan
- Spam filtering
- Encourage employees to speak up if they see a weird email or link
- Bring in professional cyber security consulting
With all of these items and a few more in place, you make it much more difficult for a cyber-criminal to get into your network and steal your data. This in turn will help keep your data and that of your employees off of the Dark Web. Of course, nothing is foolproof and that is why an exceptional cyber-security partner should offer Dark Web monitoring.
Dark Web monitoring is a program some IT professionals offer businesses where scans are going on constantly in the background and are looking for a specific domain. When the scan recognizes your domain in a database, it flags the software and you are alerted to change passwords or address the breach.
This way, you are always a step ahead of the criminals without lowering yourself to the “Dark Web” itself.
We hope you found this first installment in our Dark Web series helpful. Look out for our next article in February focused on 5 ways you can keep your information off of the Dark Web entirely.
The post Dark Web Series Part 1 – What Is the Dark Web & Why It Matters To You appeared first on Andromeda Technology Solutions.Holy Big Brother! Google Location History: An All Knowing Function You Probably Didn’t Know You’ve Enabled Jul 31, 2017
Technology has changed our world forever. What’s the first thing you do before you get out of bed in the morning? Chances are it has something to do with your smartphone. These items open up worlds of possibilities but they can also bring issues and privacy conflicts with them. For this month’s IT article we bring you an article from our President and CEO Jeff Borello on the intersection of instant access (google) and user privacy (location sharing) – focusing on something called: Google Location History. Without further ado . . .
Holy Big Brother
Have you ever heard of Google Location History?
Yeah, me neither.
Let me start by saying I am not a guy that cares about intrusions on my privacy. I don’t care if the government is listening to my phone calls or reading my Emails. I figure I am not doing anything wrong – so if they are interested in my boring life – so be it. Especially if it helps them catch some bad guys.
Now, with that said, even I was a little freaked out when I discovered how much Google and my Google App know about my daily movements.
These days, almost everyone has a Google login and is quite often signed into their account – especially from a mobile device.
So, let’s play a little game. Where were you on January 17th at 4pm? You probably don’t remember, but if you have location services enabled on your device . . . Google does.
Google Location History is a comprehensive (and by that I mean every detail imaginable) history of places you have visited as tracked and logged by your smartphone’s GPS function. Besides being comprehensive, it also has a very long memory – like years.
Give this a try to see if Google Location History is enabled on your phone.
- From a desktop browser, go to Maps.google.com (from your phone you need to open the Google Maps App)
- Sign in to your Google account (if you aren’t already). Top right-hand corner will either show a Letter (first letter of your login) or a Sign In button.
- Click the 3-bar menu in the top left corner and select “Your Timeline”
- If you see some bar graph data there, click the bar for a given day shown from the last month.
- How long did it take you to get to work that day?
- Where did you have lunch?
- Did you walk anywhere during the day?
- Did you take any pictures? (Yes, those might be logged in there as well)
See a screenshot below of my recent trip to Nashville. Yep, lunch at Monell’s (great place BTW) from 12:25 to 2:06 and dinner at 9:14 at the Peg Leg Porker BBQ
Walking, driving, flying. It knows and records those differently.
So, the obvious question is why on earth would you want something this invasive turned on? The answer is convenience. As often is the case, to gain some convenience you need to give up some privacy.
It is this information that Google uses to help you throughout your day. It will inform you of traffic issues based on your travel habits and places you may visit often. The more information the system has on you, the more helpful an AI-powered app (Google Assistant) can be.
Okay, I have Google Location History turned on. Now what?
The good news is you do have control over this. If you aren’t comfortable being tracked, you can turn this feature off. From the Timeline there is an option to Pause that feature, which in effect disables it until you turn it back on. You can also delete your entire location history as well, or just delete individual entries if you wish.
Of course, as long as the GPS is enabled on your phone, there are still plenty of apps out there that could be tracking you. Only truly private solution is to disable the GPS completely (which probably causes you more issues than you think) or just leave your phone at home (yeah, right).
Is Google Location History too much an invasion on your privacy? That is for you to decide but at least now you’re aware you are under the microscope.
The post Holy Big Brother! Google Location History: An All Knowing Function You Probably Didn’t Know You’ve Enabled appeared first on Andromeda Technology Solutions.Virus Spread Through Facebook Messenger Mines For Cryptocurrency Jan 13, 2018
Facebook scams are fairly common occurrences, owing to the sheer size of the platform's user base. It's no surprise that there's a new one making the rounds that you should be aware of.
This latest threat was discovered by researchers at Trend Micro, and makes use of Facebook Messenger.� If you get a message containing an embedded video file saved as a zip (the file name usually appears as "video_xxxx.zip"), don't click on it, even if it's from someone you know.
This file is a modified form of a legitimate piece of software called "XMRig", an open source project that allows users to mine the cryptocurrency called Monero.
When the user clicks on this poisoned version, it will direct them to a website controlled by the hackers, in addition to quietly installing the corrupted software in the background.� Once installed, the hackers put the infected PC's processor to work for them, creating a distributed network of hash power to solve advanced cryptographic puzzles and generate new Monero "coins" for themselves.
The hackers have gone to some lengths to mask their true intentions.� The site appears to be a video streaming service, and users who click on the embedded file will actually see a video playing.� Of course, the website is also part of the C&C structure.
There are several intriguing things to note about this new threat:
- It only affects people who use the Google Chrome web browser
- It only affects PCs and Laptops.� Smartphones are not impacted in any way
- The miner software is actually controlled via the C&C server, meaning that the hackers can upgrade their malware, adding new functionality in the blink of an eye
So far, the virus has been spreading mostly in south east Asia, but has also begun appearing in the Ukraine and Venezuela.� Given the global nature of Facebook's user base, this is wholly unsurprising, so be on the lookout for it. Don't click embedded files in Messenger, even if you think you know the sender.