What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Account Coordinator(AC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Chicago, IL Businesses:
What A Few Of Our Clients Have To Say
Andromeda IT Service Offerings
Here is just a quick list demonstrating the breadth of IT services you can expect from Andromeda:
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
What is the Co-Managed IT Services model? Your Top 3 Questions Answered Oct 02, 2020
Co-managed IT service (CoMITS) is a rather new idea that creates a partnership between an internal IT department and an external service company like Andromeda. Co-Managed IT Services are essentially meant to help you get more done by augmenting specific elements of your IT Service and infrastructure with a professional outsourced IT team. The best part about it is the CoMITS relationship is fully customizable so you get what you need without paying for what you don’t.
Who is it for?
The co-managed IT service structure is built to be a partnership between an internal IT person/team and an MSP. It takes cooperation between the two to give an organization the best service, security, and maintenance possible.
Co-Managed IT is a great fit for:
- Your IT department that may be overwhelmed with tasks and may need some support.
- Your internal IT support that may be lacking in one or more specific skillsets. CoMIT services will fill in that gap. Andromeda provides the specialists in all fields and lends them to your organization.
How does It Work?
As stated above, the co-managed IT partnership is fully customizable, so it can mean different things to different organizations but here are a few solutions to think about:
- Internal IT handles everything with workstations & users with Andromeda handling your servers & infrastructure.
- Basically, the opposite of #1. Andromeda handles workstations & users, while you handle servers & infrastructure.
- Andromeda handles emergencies. We offer tools and best practices for your internal IT and may also do the monitoring of systems. When anything outside your internal IT departments scope of expertise comes up, we are here to support them and handle any issues. Basically, Andromeda becomes familiar with your systems, then waits on the sidelines until you need us. We have the familiarity to handle the situation quickly and painlessly.
- We are your specialists. This will seem similar to #3, but it really isn’t. When you are making hardware purchases, we can offer our advice, do the purchasing for you and also installation. Any time the internal person/team has a question, our specialist are available for consult. This includes training, monitoring, best practices and procedures, access to tools, support, management, back-up and recovery, among many other services.
- Some subset of services that is customized to fit your needs.
Is Co-managed IT For You And Your Organization?
If you have an IT person or team, then the answer is yes! Because this solution is completely customizable for your organization, there is no scenario where we can’t partner for the best results. We would both be looking out for the ultimate success of your business.
Because of the customization of the partnership, we are flexible to integrate our services with your needs. We don’t force our way on your team. We don’t step in and take over. We do work together and share responsibilities and knowledge.
Our ultimate goal is to support your organization. Our main focus and expertise as an MSP becomes a tool to use for the success of your business. This collaboration gives your team whatever they need to do the best job possible.
If you have any questions about CoMITS, then our team is here to answer them. Let’s start a conversation.
The post What is the Co-Managed IT Services model? Your Top 3 Questions Answered appeared first on Andromeda Technology Solutions.Password Quick Tips – 6 Do’s & Don’ts Oct 30, 2020
Of course, cyber security and are hot topics, but many of you mentioned that you are interested in quick tips you can follow or use yourself.
You ask – we deliver.
Without further ado – check out these 6 quick tips for best password security practices
- Create passwords with multiple cases, symbols and numbers. Just be sure to avoid passwords such as “123456”, “qwerty”, “football”, “princess” or “password” – some of the most common passwords according to SplashData.
- Don’t create a password based on personal details such as your birth date, an anniversary, phone number, social security number etc. While not everyone may know these details about you, they are among the first a cybercriminal or evildoer will attempt when trying to hack your account. Even worse, if your password data is compromised, imagine what a cybercriminal could do with that social security information if it was exposed.
- Avoid using the same password on multiple sites. We get it, remembering different passwords for all of your different sites and needs is difficult. It is important to create something unique for every login you maintain. Remember, if a hacker gets ahold of your password for one account, the first thing they will do is try that bad boy on bank accounts, social media, emails and anywhere else they can to grab sensitive information or even your hard earned money. (Don’t worry about remembering all the different passwords, we cover that below.)
- Change your passwords regularly. We suggest changing passwords every 90 days. This can be a pain but if you maintain this practice you make getting into your accounts that much harder.
- Do Not keep a list of your passwords on your computer. Keeping a list of passwords is dangerous in any format. You open yourself up to great risk in doing so. The worst method for this is keeping a list of your passwords in a file on your computer. Instead, keep a list of each site and next to it write a specific clue that will only make sense to you. This can help jog your memory without spilling the beans if someone stumbles upon the file. (Or let a password manager create passwords for you and store them so you have them all in one place – see below.)
- Use Dual Authentication. Many apps and sites now offer dual authentication as an added security measure. Once you login to your account, you will be prompted for a code (either one you create or a randomly generated code). You put this code into the site as a second proof of your identity. This feature greatly reduces if not eliminates the likelihood of someone breaking into your accounts.
Password protection is difficult. The average Joe has anywhere from 20-200 passwords. We recognize that is a big gap but even memorizing 20 different passwords is a difficult task. With that said, we would like to provide you with a few useful tools that can free up your memory and manage your password security for you.
There are a variety of password managers on the market. We have used and enjoyed LastPass which comes with a free and premium subscription as well as an app for your phone. If you want to check out a variety of password managers and how they stack up – PC Magazine has rated them for you here.
Password Security Tests
Platforms and websites do exist that will check the security of your password. There are even some websites out there that will tell you how long a hacker would have to spend to crack your code. Check out our recommended tool here.
Email Alias Tools
We’ve found an interesting tool that can help you keep track of your passwords but also creates aliases for your email address. This is useful because without your email address, a password is essentially useless. Now, of course you don’t want someone to have your password at all but this also helps you keep your inbox clear of spam and unwanted mail.
Any of these tools can help you out. If you have any questions feel free to reach the Andromeda Team Today!
The post Password Quick Tips – 6 Do’s & Don’ts appeared first on Andromeda Technology Solutions.Cyber Attack Found At Gaming Company Capcom Nov 11, 2020
Are you a gamer? Are you a fan of Resident Evil, Devil May Cry, Mega Man, Monster Hunter or Street Fighter? All of those games have something in common. All were developed by Capcom, a Japanese development company with offices in Japan, the US, and Canada.
Unfortunately, according to a recent disclosure, Capcom is the latest company to fall victim to a nasty ransomware attack.
The company's disclosure reads in part as follows:
"Beginning in the early morning hours of November 2, 2020 some of the Capcom Group networks experienced issues that affected access to certain systems, including email and file servers. The company has confirmed that this was due to unauthorized access carried out by a third party, and that it has halted some operations of its internal networks as of November 2."
The initial disclosure did not reveal the exact nature of the attack. Subsequently, it has come to light that Capcom fell victim to a Ragnar Locker ransomware attack and the hackers responsible have apparently exfiltrated more than a terrabyte's worth of sensitive and proprietary information. Worse, they are demanding a staggering eleven million dollar ransom, to be paid in Bitcoin.
The ransom note included a link to a password protected web page containing a 24MB sample archive displaying a small fraction of the data the hackers were able to make off with. The data includes revenue forecasts, salary spreadsheets, NDAs, immigration forms, corporate communications, royalty reports, and more.
At the time this article was written, there is no indication as to if or how Capcom plans to respond to the ransom demand. Although it should be noted that hackers are notorious for promising to delete all stolen data once the ransom has been paid, and then putting the information up for sale on the Dark Web anyway, which puts Capcom in a tricky position indeed.
In any event, there's nothing for you to do in this case. The stolen information does not appear to include customer payment card information, but if you've made purchases on the company's website, it pays to keep a close watch on the payment card you used, out of an abundance of caution.