Meet Our Clients
We have extensive experience in all aspects of networking:
- Managed IT Services Support in Chicagoland
- Computer LANs
- Computer WANs
- Computer VPNs
- Computer Network Switches
- Data Backup/Business Continuity
- Data Network and Voice Wiring
- Wireless Networks
- Remote Access
- Multiple Locations
- Web/Email Hosting
We can implement and maintain every part of your business network.
If you need:
- Managed IT Services Support in Forest Park, IL (60130)
- Data Network Setups & Cloud Services in Chicagoland
- Computer Networking in Forest Park,IL
- IT Tech Support in Forest Park, IL (60130)
- Install Servers, Firewalls, Data Security in Forest Park,IL
- Internet Network Setup in Chicagoland
- Firewall Network Security in Illinois
- Remote Office data networks in Forest Park, IL (60130)
...this is where you
need to be!
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
Network Security Assessment – The Single Most Important Cyber Security Tool You Are Neglecting Every Year May 01, 2017
Why you should have a network security assessment at least once per year
Let’s face it – our digital world is under constant attack and your corporate network is one of the biggest targets out there. Why? Because it also tends to be an easy mark. Year after year we see large scale attacks against corporations, but did you know that the majority of cyber incidents occur against small business? Ask yourself, when was the last time you had a professional network security assessment? We’d like to share why assessments are an important piece of the multi-layered approach to cyber security for your business.
Let’s start by stating something that you might not expect a tech company to express. At some point, your network and computer systems WILL BE breached by some type of cyber attack. No amount of effort or software can protect you 100%. The key is to take as many steps as you can to make it less likely you will be hacked or more realistically, take as many steps to ensure that a breach can do no real or sustainable harm to your business. No approach on the market can guarantee you will never be breached and if you run into an IT firm or product that tries to make this guarantee . . . run for the hills because it just “ain’t” true.
Now, there are the obvious steps that you can take to protect yourself and make it harder on the criminals:
- good Email habits
- anti-malware software
- employee training
- a professional Disaster Recover (DR) plan/device
However, there is another tool in the arsenal that you should use regularly and that is an annual (at minimum) Network Security Assessment.
How Is A Network Security Assessment Done?
Your IT support company can do an assessment; they should then give you a risk report displaying areas that need to be tightened up. If your IT company does not perform these, it may be time to start looking into someone new. Cyber threats are more prevalent every day and it is important to partner with an IT company that recognizes this and protects your business accordingly.
We find that our assessment usually uncovers security threats and holes; even when a business has the right practices and has done their research. Cyber security is a daily battle. When we run our assessment we use the results to constantly improve the defenses of our clients. And that is why, like most things in tech, an assessment should be a regular event.
The Network Security Assessment Is Done. What’s Next?
The network security assessment itself is not the only thing to request though. It is equally important to make sure that your firm supplies you with a report of their findings. This report should be simple to understand, contain an overall score and give you a breakdown of each issue found, along with how serious those specific issues are. Ask for an action plan detailing fixes for any issues that are found. Why go through the assessment if you aren’t going to DO anything with the data?
How important and helpful are these reports? We are an IT company with a background protecting our partners from risk, we place protections in place for our partners and still find ways to improve our customer cyber safety every time we run an assessment.
Why? Because cyber security is a dynamic, ever changing landscape and you need to proactively search for issues. Don’t let yourself learn the hard way. You never want to discover there is a hole in your cyber security by way of an attack or breach.
Interested in a Network Security Assessment?
If this article has you questioning your current setup, or if you are simply interested in starting a conversation regarding the cyber security protections necessary for your business, a network security assessment with Andromeda is a great place to start. With this in mind, we will be discounting our network security assessment thru 05/31/17. Fill out the form below for access to our promotional rate and begin a discussion with one of our security experts.
Fill out the form below to receive a $500 discount on a Network Security Assessment valid for the month of May
The post Network Security Assessment – The Single Most Important Cyber Security Tool You Are Neglecting Every Year appeared first on Andromeda Technology Solutions.Andromeda’s Top Windows 10 Tips & Tricks for Increased Productivity and Ease of Use Mar 30, 2018
In our business and personal lives, we’re all racing to fit 26 hours into a 24 hour day.
Any tip or trick that shaves off time and saves a few seconds can pay off big time in the long run.
We recently did a poll around the Andromeda office to grab some of our favorite tricks and tips that save time, keep us organized and help with overall productivity.
We kept this list specific to Windows 10 but many of these tricks and features will work on older versions of Windows as well.
So – without further ado –
Andromeda’s Top Windows 10 Tips & Tricks for Increased Productivity and Ease of Use:
The snip tool is very useful when you want to grab a photo or screen shot of a specific element on your screen but don’t want to capture your entire screen.
This is a pre-installed app you can find in your start menu.
For more information on exactly how to use this function check out this helpful article.
Built In Search with Windows Key
There are a lot of different commands that begin with the ‘Windows Key’ (See above for photo example). We will dive into a few of those later but our staff thought that the built in search tool deserved its own mention.
Simply hit the Windows Key and start typing out what you are looking for. This helps avoid searching and clicking around through files.
For example hit your Windows Key and start typing any program you have installed. For our example, type in iTunes then press the Enter key.
iTunes will start automatically.
Mark Up Feature in Windows Edge
There are many different web browsers out there and most people have their favorite. Windows 10 has their own web browser called Windows Edge (an update to the classic Internet Explorer).
Once you open up a web browser with Windows Edge, locate the Mark Up Feature in the top right hand corner (highlighted below):
Once you click this feature you will notice a purple navigation bar at the top of your screen. You can now markup web pages for whatever purposes you like on any tablet or device with writing capabilities.
Pin Popular Apps to Taskbar
Windows 10 tries to make it as easy as possible to access your favorite applications and software. You can create desktop shortcuts but another accessibility option is pinning commonly used apps to your Taskbar.
Simply locate the app you are looking for and right click on it. You’ll see an option for “Add to Taskbar”. Select that and you are good to go.
This is a great way to make that Snip Tool we mentioned above more accessible.
Start Menu Organization
Some users dislike the Windows 10 start menu – but it has some great organization capabilities.
Similar to pinning apps to your Taskbar as described above, you can pin programs to your start menu. Additionally, you can group applications and software together for quick navigation.
This is all done via drag and drop. Simply click on the program you want, drag it to the right and drop it where you want.
For heavy computer users, brightness settings can cause eye strain and can even contribute to difficulty falling asleep at night.
This is because our computer screens (tablets and smartphones included) emit ‘blue light’. This blue light can be harsh on the eyes over time and messes with your natural sleep rhythms in some cases.
If you’re interested in turning on the Night Light function you can find it in the display settings menu.
“Hot Keys” are just another form of shortcut you can use to perform different functions quickly with only your keyboard.
Depending on your job and needs, you may use some, many, none or all of them (there are a ton).
Here are a few of our favorites for you to try.
Windows + L – Lock your screen
Windows + D – Show Desktop
Windows + Tab – Open Windows between Virtual Desktops
Alt + Tab – Cycle through open apps/windows
Ctrl + Z – Undo
Ctrl + X – Cut
Ctrl + V – Paste
Ctrl + C – Copy
Ctrl + A – Select All
For a more extensive list of Hot Keys check out this article from Windows Central.
We hope you found this article helpful and if you have a favorite shortcut that wasn’t listed, please let us know!
The post Andromeda’s Top Windows 10 Tips & Tricks for Increased Productivity and Ease of Use appeared first on Andromeda Technology Solutions.Passwords May Be Dead Soon If Microsoft Gets Its Way� Jun 06, 2018
Karanbir Singh (a program manager at Microsoft) is on a mission:
Kill the password.
As he said in a recent blog post:
"Nobody likes passwords.� They are inconvenient, insecure, and expensive.� In fact, we dislike them so much that we've been busy at work trying to create a world without them--a world without passwords."
The company's stated goal is to make it possible that an end user will never have to bother with passwords on a day to day basis and would instead provide credentials that are virtually impossible for hackers to crack or breach.
To accomplish this goal, the company is looking at a number of options, including biometrics and multi-factor authentication schemes.
Singh notes that this isn't just blue-sky thinking, either.� Already, more than 47 million users and more than five thousand businesses are utilizing "Windows Hello for Business."� Another solution currently in use is the Microsoft Authenticator app, which allows users to access their Microsoft accounts via their smartphones.
Additionally, as part of the Windows 10 update issued in April (2018), any user with a Managed Service Account or Azure Active Directory can now access their Windows 10 PC without having to enter their password, via the authenticator app and Windows Hello (provided that S-mode is enabled).
The company is also taking advantage of the newly ratified Fast Identity Online (FIDO2) security protocol, and is in the process of updating Windows Hello to enable secure authentication across a wider range of scenarios.� For example:� The company is currently working on a proof of concept for shared PCs that will allow users to log on via FIDO2 security keys, which will allow employees to carry their credentials with them.
They envision a scenario in which any user can simply walk up to any device the organization controls and authenticate without ever having to enter their username or password. This would be especially useful for analysts, help desk personnel, and anyone working in the medical profession.
Obviously no firm timeframes have been given, but as mentioned, some of these technologies are already in use and will be refined in the months ahead.