What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Account Coordinator(AC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Dupage County, IL Businesses:
What A Few Of Our Clients Have To Say
Andromeda IT Service Offerings
Here is just a quick list demonstrating the breadth of IT services you can expect from Andromeda:
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
5 Cyber Security Features/Protocols Your Business Needs To Protect Against Scammers, Hackers & Cyber Criminals Jul 31, 2020
Sometimes it sounds like the news and cyber experts are on loop or a broken record. Every day there is a new report about cyber security, threats and the like. But while these stories and warnings may start to seem like white noise in the background, the threats are still here and they are very real.
The upside of all of this coverage and conversation is that business owners are wising up and with the topic of cyber security taking center stage, users and business owners alike are being more proactive when it comes to protecting and educating themselves.
In the spirit of education we’d like to dive a little deeper into 5 features/protocols you can set up at your office to beef up your IT Security.
Top 5 Cyber Security Features/Protocols
Multi Factor Authentication
This feature is nothing new but it is becoming more and more common across all kinds of accounts. Financial services, email, social media and other applications/accounts are making use of multi or dual factor authentication. Essentially you have a password and second form of identification to prove your identity. Sometimes this is a randomly generated code – think Facebook’s code generator.
Another type of multi or dual factor authentication uses biometric data for identity verification. Things like a fingerprint or a retina scan are examples of this type of security measure. In fact, last month we took a look at biometrics, integrated security and banking applications – read more about that.
An Employee Training Program
Statistically over 80% of all breaches and intrusions occur after an employee error. Clicking a link in an email, downloading a malicious file, visiting an infected website . . . there are so many ways this can happen and most of the time it isn’t intentional either. The best way to prevent this from happening is an ongoing security program for yourself and employees. A good program will have a varied focus: compliance standards for personal and customer info (commonly known as pii or personally identifiable information), strategies for recognizing and avoiding email scams, proper security protocols for best practices at the office and more. In 2017 Andromeda recognized this need and released our PII Protection/Cyber Security Training Program. See full details here.
Business Grade Firewall
A good firewall is your first defense against intrusion. With proper intrusion detection and intrusion prevention settings you arm yourself against cyber criminals and hackers. On top of that, a business grade firewall solution is an important piece of hardware when you want to set up public and private networks. You definitely don’t want guests at your building or passersby accessing company documents or networks because of low cyber security protocols.
Regularly Scheduled Updates/Patching
New viruses and threats hit the market every day. On top of that, hackers and criminals discover new vulnerabilities almost as fast as developers can protect against them. This is why keeping up to date and on top of patching and updates is so important. For instance, the WannaCry virus everyone heard so much about this year took advantage of a vulnerability that had already been addressed by a Windows patch. If companies had proactively updated and maintained their updates/patches, they wouldn’t have been as vulnerable to an attack.
This ties into both firewall protocols and employee training but of course, the fewer random emails that make it into your employee inboxes, the fewer links and files you need to worry about employee’s (or even yourself) clicking on. A professional spam tool can be configured to your liking and can do a whole lot to prevent content from making it to those that might accidentally infect your network. See the photos below for a few examples of emails we protect customers from on a daily basis.
As always, Andromeda is here to help you protect yourself and your business from these ongoing threats. Take the first step today and sign up for a cyber security audit with our team of experts.
The post 5 Cyber Security Features/Protocols Your Business Needs To Protect Against Scammers, Hackers & Cyber Criminals appeared first on Andromeda Technology Solutions.Importance of Segmenting Your Network in Manufacturing and Logistics Jul 17, 2020
There are likely many kinds of devices and many different elements that makeup the unique network infrastructure at your manufacturing, logistics, transportation or distribution (MLTD) business. You probably have many of the standard devices we see across most of our IT clients – firewalls, routers, access points, switches etc.
Not to mention any connected devices related to your production, staging or shipping processes.
In recent years, the MLTD industries have been heavy targets for cybercrime and cybercriminals. This has been largely attributed to the way these businesses use technology and the fact that many businesses in these industries are leaning on older systems and technologies that are specific to their business models.
Criminals have caught onto this issue and are attacking known weak points, disrupting production, and grinding businesses to a halt.
One important step you can take to defend against this is to segment your networks and add layers to protect the different networks of your business.
What does it mean to segment my network?
Essentially, all this means is separating different groups or functions at your business into different networks so that you can control them individually.
The most common network segmentation we perform and encounter in the MLTD market is between the operations network (back office) and the production network (on ‘the floor’ of your facility) and the BYOD Network (for guests and staff devices).
Why do I want to segment my network?
Segmenting your network helps to keep all of the appropriate activities in their appropriate lanes. For instance, you don’t want your employees surfing the web on their cell phones on the same network that your primary business functions on.
Imagine an employee accidentally clicked a bad link and infected/shut down the whole network – you’d likely want this to happen in an area that didn’t impact the entire business. Instead, if you segment properly, the impact would be restricted to the BYOD or Guest network and your employees couldn’t use WIFI on their personal devices until you got things cleaned up.
Now, imagine this same example hits your back office. An employee opens an email and unknowingly gets infected with ransomware. That ransomware now spreads throughout the office and all PCs are down. With proper network segmentation, you have an added layer that will help protect your production floor from being infected. With a good <<business continuity plan – Link to that other article on business continuity>> your team can work on resolving the issues in the office but the production network would not be impacted.
The post Importance of Segmenting Your Network in Manufacturing and Logistics appeared first on Andromeda Technology Solutions.Some NAS Devices Are Being Exploited By Remote Hackers Sep 12, 2020
Do you have any network-attached storage (NAS) devices attached to your home or corporate network? If so, be advised that they've become the new favorite inroad for hackers around the world. According to a report recently published by researchers at 360 Netlab, hacking groups are increasingly exploiting weaknesses in some NAS devices running a variety of QNAP firmware versions that suffer from command injection vulnerabilities.
The good news is that this vulnerability has already been addressed by QNAP with their release of firmware version 4.3.3. The better news is that the company addressed this back in July of 2017.
Unfortunately, not many people are good about keeping their firmware up to date, so you may have one or more vulnerable devices and not even realize it. Both QNAP and the researchers at 360 Netlab recommend checking the version number of the firmware you're using, and upgrading immediately if you are at risk.
If you're looking for additional technical details about what caused the problem and how it was addressed, see below.
QNAP had this to say about version 4.3.3 of their firmware:
"This release replaced the system function with qnap_exec, and the qnap_exec function is defined in the /usr/lib/libuLinux_Util.so.0," 360 Netlab said. By using the execv to execute custom command, command injection has been avoided."
Sadly, this isn't the first time QNAP has been the target of hackers. In fact, there's an ongoing ransomware campaign that utilizes eChoraix ransomware to encrypt NAS devices. Just last month, the US's CISA and the UK's NCSC issued a joint malware alert about a malware strain called QSnatch that also targets QNAP NAS devices.
In any event, although this issue has long been resolved, it's clear that there are a great number of vulnerable devices out there, both on home and office networks. Kudos to 360 Netlab for shining a light on them, and to QNAP for moving swiftly to correct the issue.