What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Service Coordinator(SC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Forest Park, IL Businesses:
What A Few Of Our Clients Have To Say
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
Your Company Laptop Was Stolen – Now What? May 29, 2018
It’s another Tuesday in the airport, and you just cleared the TSA line and went to the pretzel shop for a quick bite before you catch your plane. You sit your laptop down to get a straw, and the next second…your laptop is gone. It’s not in sight, nor is the thief who stole it.
At first you’re confused, then the confusion starts to fade away and you realize that this wasn’t just a personal laptop. It was your work computer and had company files, sensitive information and access to company data that definitely doesn’t belong in anyone else’s hands.
But what do you do?
What To Do When You Can’t Find Your Stolen Laptop
Stolen Laptop Step 1: Get in touch with your IT team
Whether you outsource, have internal IT staff or a mixture of both, your first step is to alert your IT support teams of the incident. Time is critical on this.
Even if you have a password on your laptop, which will likely prevent the thief from immediately having access to your private documents. It won’t stop someone removing the hard drive from your laptop and connecting it to another computer. Suddenly your hard drive is sitting there, ready to browse – just like any other folder or drive letter.
Your IT Staff/Vendor should be installing encryption and remote management software on all remote devices. With proper encryption, your data is secure AND with remote management, your IT staff can wipe the stolen laptop before any damage is done.
Without this encryption software and remote management, you’d be forced to report any theft like this as a data breach. That means the government knows about it, your employees need to be made aware and worst of all – you have to alert clients.
This is why in this instance, you call your tech staff first.
Stolen Laptop Step 2: Contact the Police and file a report
The next best thing to do in situations like this is to immediately file a police report for the stolen laptop. Having a police case number can help with any insurance and/or recovery endeavors that come up. Plus, having a police report can help catch the criminal who stole your sensitive devices.
Stolen Laptop Step 3: Change Your Passwords
If you don’t have encryption and even if you do – it is smart to change passwords to all personal, professional and financial accounts. Additionally if you used this computer to pay bills, check banking information or for any type of financial transactions, you’ll want to make sure to check those accounts.
Stolen Laptop Step 4: Recover Your data on another device
This step also involves your IT staff/company. Hopefully you’re IT pros have all of your company data backed up and readily available. It is important that you synch your portable devices regularly so that in ANY incident of failure or theft, you can be restored quickly without too much interruption.
To make sure that you’re covered on this front, we’d suggest requesting regular tests of your backups anyway. That way, no matter the issue, you know your data is secured, backed up AND ready to deploy in an emergency or urgent situation.
There are many steps you’ll want to take after a theft occurs but with proactive IT support you won’t have nearly as many headaches to deal with.
These things happen more often than you’d think too.
On average a laptop is stolen every 53 seconds!
So – take the following actions and get ahead of the issue before a stolen laptop happens.
- Find out if your company’s remote devices are encrypted with the ability to wipe all data on command
- Make sure that you train employees with remote devices not to leave them unattended and to lock them in the trunk of their cars instead of leaving them in a front or backseat.
- When travelling put your laptop on the TSA conveyer belt last – that way it is less likely to remain unattended.
- Look into your company backups and business continuity protocols.
- How often are they tested?
- How often are remote users synching and backing up data?
- How long will it take to restore a PC when you need it?
Our team is here to help you set up and manage any of the technical details listed above.
In fact, fill out the form below or call the office to receive 10% off of your initial setup fees for our remote encryption software!
Just mention the code “Encrypt4Me” when you call (815) 836-0030 or fill out the form below.
The post Your Company Laptop Was Stolen – Now What? appeared first on Andromeda Technology Solutions.3 Ways Data Encryption Can Save You From Unnecessary Stress, Spending & Headaches Sep 04, 2017
When you think of data encryption, you might imagine top-secret files and espionage. Historically, militaries and governments protected messages and sensitive information using encryption. These days encryption has many more uses. And with hackers and cyber criminals constantly after your data, it is important that you make use of this security measure.
Encryption is defined as scrambling data or text to make it unreadable. This protects stored data and personal information from displaying to those without a proper clearance or key to decode that information. There are all kinds of pieces of information you have on file that a disgruntled employee or criminal could make use of:
- Home addresses
- Email Addresses
- Drivers Licenses
- Credit Card information
- Social Security Numbers
- Date of birth
- Medical history or records
- Financial information – routing numbers, account numbers etc.
Depending on your industry, this information may be subject to state and federal regulation, hefty fines and, in cases of negligence, even jailtime (we’re talking hundreds of thousands of dollars). Businesses close their doors over this stuff.
While employee training and proper cyber protocols are great at protecting you and your business from user error and data breach – encryption is an added layer of security every business benefits from.
3 Ways Data Encryption Can Save You From Unnecessary Stress, Spending & Headaches
- Encryption Saves Your Reputation – More and more employees are working on the go in 2017. With employees working from home, sales staff in the field and the hustle and bustle of every day, you don’t want to hold your employees back or decrease productivity by preventing devices from leaving the office. But imagine your employee runs into the neighborhood Starbucks and leaves their company laptop in their front seat. While they are ordering their venti latte, a criminal breaks into their car and steals their belongings – your laptop included. Now you’re out the hardware but more importantly, you have a criminal at large with sensitive data. If this data has any sensitive personally identifiable information (PII) on it, you are required to report the incident. Do you want your customers losing valuable trust in your company? In fact, this fear of reputational damage is the reason that three out of every four victims to ransomware, data breach or cyber-attack do not report the incident. Think back to 2013 when 41 million people found out Target compromised their sensitive data. You’d probably think twice about shopping there again if you were one of them. If the stolen laptop had been encrypted, you wouldn’t have to report an incident. The criminal would have no way of deciphering data on the equipment.
- Encryption Keeps Designated Information Private – Let’s bring this example back into your office for a moment. Even if you don’t keep sensitive customer information on file or process credit cards. You have personal information for employees on file: Performance reviews, social security numbers, salary information and more. You don’t need a hacker or even a disgruntled employee gaining access to these records. With encryption you can ensure that even if an employee accidentally or intentionally stumbles into an area they shouldn’t be, they can’t make sense of any of that information.
- Encryption Can Save You From The Unexpected – Whether a device goes missing from the office, is stolen from a front seat or possibly snatched by a disgruntled employee, you can’t have sensitive information at large. Your reputation aside, as mentioned earlier, these types of breaches can result in very large fines, prosecution and years in prison. Nobody needs that on their mind every night. With encryption you can rest easy that even in the wrong hands, your data can’t be manipulated or exposed. To take this a step further, certain encryption management tools have the ability to remotely disable and even wipe devices. This comes in handy in all of the examples we have described. So now, not only is the information on your device useless, but after your IT company takes necessary steps, the device shows nothing but the “blue screen of death”.
Encryption is a powerful tool. It is an incredibly useful and we would say necessary piece of your cyber security and data protection plan. It is important that you protect sensitive information. Even if you don’t want to believe it, there are criminals and people out there that would wreak havoc with that data if given the chance.
For more information on our encryption software and other cyber security training, protocols and plans, give us a call at (815) 836-0030.
And be sure to click here and explore our Unlimited Security Training Program. Over 80% of data breaches are a result of human error and the first step to prevention is education.
Mention this blog and receive 50% off your first annual subscription.
The post 3 Ways Data Encryption Can Save You From Unnecessary Stress, Spending & Headaches appeared first on Andromeda Technology Solutions.Another Intel Processor Vulnerability Found Nov 12, 2018
Intel just can't seem to catch a break.� By now, almost everyone has heard about the dreaded Spectre and Meltdown vulnerabilities which have been plaguing the chip maker since they were first discovered.� Now, it seems there's a new chip-based threat.
This latest threat has been dubbed PortSmash by the research team from the Tampere University of Technology in Finland and the Technical University of Havana, in Cuba who jointly discovered it.� It works by abusing a weakness in Intel's Hyper-Threading technology, which is Intel's implementation of SMT (Simultaneous Multi Threading).
The researchers had this to say about the attack:
"We recently discovered a new CPU microarchitecture attack vector.� The nature of the leakage is due to execution engine sharing on SMT (e.g., Hyper-Threading) architecture.
More specifically, we detect port contention to construct a timing side channel to exfiltrate information from processes running in parallel on the same physical core."
In plain English, the vulnerability allows hackers to run a PortSmash process alongside a selected process running on the same CPU core. In doing so, the ProtSmash process can spy on that application and even lift data from it as desired by the hackers.
The team released a proof of concept on Github and demonstrated their ability to steal private decryption keys.
So far, the team has confirmed that the exploit works on Intel's Skylake and Kaby Lake processors, but there's strong circumstantial evidence that with modifications, the exploit would work on other chipsets as well, including those developed by rival AMD.
The reason for this is because the researchers believe SMT to be fundamentally flawed. It shares resources between two CPU instances while not providing any form of security differentiators between the two instances.
The research team responsibly reported the flaw to Intel, but the company did not respond in a timely manner, so the team published their findings, which prompted action by Intel.� The company released a security patch on November 1.