Meet Our Clients
We have extensive experience in all aspects of networking:
- Managed IT Services Support in Chicagoland
- Computer LANs
- Computer WANs
- Computer VPNs
- Computer Network Switches
- Data Backup/Business Continuity
- Data Network and Voice Wiring
- Wireless Networks
- Remote Access
- Multiple Locations
- Web/Email Hosting
We can implement and maintain every part of your business network.
If you need:
- Managed IT Services Support in Flossmoor, IL (60422)
- Data Network Setups & Cloud Services in Chicagoland
- Computer Networking in Flossmoor, IL 60422
- IT Tech Support in Flossmoor, IL (60422)
- Install Servers, Firewalls, Data Security in Flossmoor, IL 60422
- Internet Network Setup in Chicagoland
- Firewall Network Security in Illinois
- Remote Office data networks in Flossmoor, IL (60422)
...this is where you
need to be!
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
Why Good Camera Systems Need Great IT Pros May 15, 2017
Would you be OK with a criminal or competitor watching you and your office via your own CCTV security cameras . . . ?
Didn’t think so.
Security and camera systems, like many other technologies, are becoming more and more integrated within IT networks and infrastructure. This is great for ease of use, capabilities and increased protections. However, it can also open up additional avenues and risks for your company if managed incorrectly.
Imagine all the information someone could snag with limited access to your CCTV system.
You wouldn’t trust your IT to “some guy” (at least we hope not). You should give the same respect to your security systems. It may be a good idea to buy a system from Costco or Amazon. But those off brand systems are easily hacked and they may carry pre-installed malware. Just last year a slew of security camera systems purchased on Amazon were found to be infected and could be hijacked by hackers to access data and camera footage illegally.
In almost all cases, some part of your security camera system needs an IT professional involved to finish the job and configured correctly. You can either trust the camera guy as he fumbles his way around your network, potentially leaving easily accessed holes in your protection, or try to get the camera guy and your IT guy to coordinate and work together (what we call a scheduling nightmare). Or, you can hire a professional technology services firm that does both.
Why Chose Andromeda’s Security Cameras?
Andromeda understands the intricate relationships security technologies have with your IT. We have specialized technicians in each area. They work together with a vast understanding of the security that both your CCTV system and your network need. Also, because we sell only professional grade hardware and software (Honeywell) the chance of a hack on these pieces is much less than the cheaper no-name brands.
Security threats are everywhere these days. You don’t need to make yourself more vulnerable. Do not create a gaping hole in your enterprise via the very thing that is there to help protect you. Reach out to our team today if you are considering any security projects. We ensure that the solution you choose is right for your business needs, but most importantly, we make sure it is installed correctly and you are protected.
The post Why Good Camera Systems Need Great IT Pros appeared first on Andromeda Technology Solutions.Holy Big Brother! Google Location History: An All Knowing Function You Probably Didn’t Know You’ve Enabled Jul 31, 2017
Technology has changed our world forever. What’s the first thing you do before you get out of bed in the morning? Chances are it has something to do with your smartphone. These items open up worlds of possibilities but they can also bring issues and privacy conflicts with them. For this month’s IT article we bring you an article from our President and CEO Jeff Borello on the intersection of instant access (google) and user privacy (location sharing) – focusing on something called: Google Location History. Without further ado . . .
Holy Big Brother
Have you ever heard of Google Location History?
Yeah, me neither.
Let me start by saying I am not a guy that cares about intrusions on my privacy. I don’t care if the government is listening to my phone calls or reading my Emails. I figure I am not doing anything wrong – so if they are interested in my boring life – so be it. Especially if it helps them catch some bad guys.
Now, with that said, even I was a little freaked out when I discovered how much Google and my Google App know about my daily movements.
These days, almost everyone has a Google login and is quite often signed into their account – especially from a mobile device.
So, let’s play a little game. Where were you on January 17th at 4pm? You probably don’t remember, but if you have location services enabled on your device . . . Google does.
Google Location History is a comprehensive (and by that I mean every detail imaginable) history of places you have visited as tracked and logged by your smartphone’s GPS function. Besides being comprehensive, it also has a very long memory – like years.
Give this a try to see if Google Location History is enabled on your phone.
- From a desktop browser, go to Maps.google.com (from your phone you need to open the Google Maps App)
- Sign in to your Google account (if you aren’t already). Top right-hand corner will either show a Letter (first letter of your login) or a Sign In button.
- Click the 3-bar menu in the top left corner and select “Your Timeline”
- If you see some bar graph data there, click the bar for a given day shown from the last month.
- How long did it take you to get to work that day?
- Where did you have lunch?
- Did you walk anywhere during the day?
- Did you take any pictures? (Yes, those might be logged in there as well)
See a screenshot below of my recent trip to Nashville. Yep, lunch at Monell’s (great place BTW) from 12:25 to 2:06 and dinner at 9:14 at the Peg Leg Porker BBQ
Walking, driving, flying. It knows and records those differently.
So, the obvious question is why on earth would you want something this invasive turned on? The answer is convenience. As often is the case, to gain some convenience you need to give up some privacy.
It is this information that Google uses to help you throughout your day. It will inform you of traffic issues based on your travel habits and places you may visit often. The more information the system has on you, the more helpful an AI-powered app (Google Assistant) can be.
Okay, I have Google Location History turned on. Now what?
The good news is you do have control over this. If you aren’t comfortable being tracked, you can turn this feature off. From the Timeline there is an option to Pause that feature, which in effect disables it until you turn it back on. You can also delete your entire location history as well, or just delete individual entries if you wish.
Of course, as long as the GPS is enabled on your phone, there are still plenty of apps out there that could be tracking you. Only truly private solution is to disable the GPS completely (which probably causes you more issues than you think) or just leave your phone at home (yeah, right).
Is Google Location History too much an invasion on your privacy? That is for you to decide but at least now you’re aware you are under the microscope.
The post Holy Big Brother! Google Location History: An All Knowing Function You Probably Didn’t Know You’ve Enabled appeared first on Andromeda Technology Solutions.Almost Half Of Top Ranking Websites Are Vulnerable Feb 17, 2018
Menlo Security just released their third annual "State of the Web" report and it's not pretty.� The headline finding is that 42% of the top 100,000 sites as ranked by Alexa are more dangerous than you think.
The report defines a risky site as one that meets one of three criteria:
- The site, or one of its associated background sites (from which news articles or video is pulled), is running software with a known security vulnerability
- The site has been used to launch attacks or distribute malware
- The site has suffered a security breach in the past twelve months
This first point is key, and often overlooked by security professionals.� Any time your website is pulling content from another source, it creates an opening that a hacker could potentially exploit.� Worse, most security professionals lack the tools to properly monitor those connections.
As bad as that sounds, there's an even worse detail lurking in the pages of the report, and that concerns emails.
Hackers are increasingly moving away from setting up their own domains. �Instead, they're preferring to create a subdomain of a compromised, legitimate domain, which makes it harder to spot.� Amir Ben-Efraim, the CEO of Menlo Security, had this to say about the issue:
"It is far easier to set up a subdomain on a legitimate hosting service than use other alternatives - such as trying to hack a popular, well-defended site or to set up a brand-new domain and use it until it is blocked by web security firms. �Legitimate domains are often whitelisted by companies and other organizations out of a false sense of security, giving cover to phishing sites.
Also, hosting services typically allow customers to set up multiple subdomains.� For example, researchers found 15 phishing sites hosted on the world's 10 most popular domains."
The bottom line is:� The web and even the most popular sites on it, aren't nearly as safe as you think.