What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Service Coordinator(SC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Chicago Ridge, IL Businesses:
What A Few Of Our Clients Have To Say
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
5 Cyber Security Features/Protocols Your Business Needs To Protect Against Scammers, Hackers & Cyber Criminals Oct 30, 2017
Sometimes it sounds like the news and cyber experts are on loop or a broken record. Every day there is a new report about cyber security, threats and the like. But while these stories and warnings may start to seem like white noise in the background, the threats are still here and they are very real.
The upside of all of this coverage and conversation is that business owners are wising up and with the topic of cyber security taking center stage, users and business owners alike are being more proactive when it comes to protecting and educating themselves.
In the spirit of education we’d like to dive a little deeper into 5 features/protocols you can set up at your office to beef up your IT Security.
Top 5 Cyber Security Features/Protocols
Multi Factor Authentication
This feature is nothing new but it is becoming more and more common across all kinds of accounts. Financial services, email, social media and other applications/accounts are making use of multi or dual factor authentication. Essentially you have a password and second form of identification to prove your identity. Sometimes this is a randomly generated code – think Facebook’s code generator.
Another type of multi or dual factor authentication uses biometric data for identity verification. Things like a fingerprint or a retina scan are examples of this type of security measure. In fact, last month we took a look at biometrics, integrated security and banking applications – read more about that here.
An Employee Training Program
Statistically over 80% of all breaches and intrusions occur after an employee error. Clicking a link in an email, downloading a malicious file, visiting an infected website . . . there are so many ways this can happen and most of the time it isn’t intentional either. The best way to prevent this from happening is an ongoing security program for yourself and employees. A good program will have a varied focus: compliance standards for personal and customer info (commonly known as pii or personally identifiable information), strategies for recognizing and avoiding email scams, proper security protocols for best practices at the office and more. In 2017 Andromeda recognized this need and released our PII Protection/Cyber Security Training Program. See full details here.
Business Grade Firewall
A good firewall is your first defense against intrusion. With proper intrusion detection and intrusion prevention settings you arm yourself against cyber criminals and hackers. On top of that, a business grade firewall solution is an important piece of hardware when you want to set up public and private networks. You definitely don’t want guests at your building or passersby accessing company documents or networks because of low cyber security protocols.
Regularly Scheduled Updates/Patching
New viruses and threats hit the market every day. On top of that, hackers and criminals discover new vulnerabilities almost as fast as developers can protect against them. This is why keeping up to date and on top of patching and updates is so important. For instance, the WannaCry virus everyone heard so much about this year took advantage of a vulnerability that had already been addressed by a Windows patch. If companies had proactively updated and maintained their updates/patches, they wouldn’t have been as vulnerable to an attack.
This ties into both firewall protocols and employee training but of course, the fewer random emails that make it into your employee inboxes, the fewer links and files you need to worry about employee’s (or even yourself) clicking on. A professional spam tool can be configured to your liking and can do a whole lot to prevent content from making it to those that might accidentally infect your network. See the photos below for a few examples of emails we protect customers from on a daily basis.
As always, Andromeda is here to help you protect yourself and your business from these ongoing threats. Take the first step today and sign up for a cyber security audit with our team of experts.
The post 5 Cyber Security Features/Protocols Your Business Needs To Protect Against Scammers, Hackers & Cyber Criminals appeared first on Andromeda Technology Solutions.Password Quick Tips – 6 Do’s And Don’ts Oct 02, 2017
We’ve been polling our readers recently for topics of interest. Of course, cyber security and ransomware are hot topics but many of you mentioned that you are interested in quick tips you can follow or use yourself.
You ask – we deliver.
Without further ado – check out these 6 quick tips for best password practices
- Create passwords with multiple cases, symbols and numbers. Just be sure to avoid passwords such as “123456”, “qwerty”, “football”, “princess” or “password” – some of the most common passwords in 2016 according to SplashData.
- Don’t create a password based on personal details such as your birth date, an anniversary, phone number, social security number etc. While not everyone may know these details about you, they are among the first a cybercriminal or evildoer will attempt when trying to hack your account. Even worse, if your password data is compromised, imagine what a cybercriminal could do with that social security information if it was exposed.
- Avoid using the same password on multiple sites. We get it, remembering different passwords for all of your different sites and needs is difficult. It is important to create something unique for every login you maintain. Remember, if a hacker gets ahold of your password for one account, the first thing they will do is try that bad boy on bank accounts, social media, emails and anywhere else they can to grab sensitive information or even your hard earned money.
- Change your passwords regularly. We suggest changing passwords every 90 days. This can be a pain but if you maintain this practice you make getting into your accounts that much harder.
- Do Not keep a list of your passwords on your computer. Keeping a list of passwords is dangerous in any format. You open yourself up to great risk in doing so. The worst method for this is keeping a list of your passwords in a file on your computer. Instead, keep a list of each site and next to it write a specific clue that will only make sense to you. This can help jog your memory without spilling the beans if someone stumbles upon the file.
- Use Dual Authentication. Many apps and sites now offer dual authentication as an added security measure. Once you login to your account, you will be prompted for a code (either one you create or a randomly generated code). You put this code into the site as a second proof of your identity. This feature greatly reduces if not eliminates the likelihood of someone breaking into your accounts.
Password protection is difficult. The average Joe has anywhere from 20-200 passwords. We recognize that is a big gap but even memorizing 20 different passwords is a difficult task. With that said, we would like to provide you with a few useful tools that can free up your memory and manage your password security for you.
There are a variety of password managers on the market. We have used and enjoyed LastPass which comes with a free and premium subscription as well as an app for your phone. If you want to check out a variety of password managers and how they stack up – PC Magazine released their “Best Password Managers of 2017” earlier this month.
Password Security Tests
Platforms and websites do exist that will check the security of your password. There are even some websites out there that will tell you how long a hacker would have to spend to crack your code. Check out our recommended tool here .
Email Alias Tools
We’ve found an interesting tool that can help you keep track of your passwords but also creates aliases for your email address. This is useful because without your email address, a password is essentially useless. Now, of course you don’t want someone to have your password at all but this also helps you keep your inbox clear of spam and unwanted mail.
Any of these tools can help you out. If you have any questions feel free to reach the Andromeda Team Today!
The post Password Quick Tips – 6 Do’s And Don’ts appeared first on Andromeda Technology Solutions.Another Point Of Sale Data Breach Hits Retailers Mar 15, 2019
Another week, another data breach. This time, the target of the breach was North Country Business Products (NCBP), a company that makes point of sale (POS) terminals for businesses.
Although NCBP was the target, they weren't the ultimate victims of the breach. Hackers infiltrated NCBP's network and installed malware onto the company's POS terminals.
These were then sold to businesses around the country. In all, according to the latest information published by NCBP about the incident, a total of 139 business locations received these poisoned POS terminals. This allowed hackers to gain control of any payment information processed through those terminals.
In all, NCBP POS systems are installed in more than 6500 locations nationwide, meaning the scope and scale of this breach was approximately 2 percent of the company's installed terminal base.
So far, North Country's handling of the incident has been admirable. The breach occurred on January 3rd, 2019. The company discovered it on January 30th, but noted that the attackers ceased all activity on January 24th when they began detecting investigators probing for their presence.
NCBP has informed law enforcement, enlisted the aid of a third-party forensic investigator, and have published a list of all infected POS terminals on their website. All of the invested terminals are bars, coffee shops, or restaurants, with an even mix of standalone businesses and franchises.
The investigation into the matter is still ongoing. As yet, NCBP and the agencies assisting them have not determined exactly what the impact is or has been for each of the affected businesses.
All that to say, if you own an NCBP POS device, be sure to head to the company's website to find out if your business is on the list of impacted customers. If so, you may have already been contacted by the company.