Meet Our Clients
We have extensive experience in all aspects of networking:
- Managed IT Services Support in Chicagoland
- Computer LANs
- Computer WANs
- Computer VPNs
- Computer Network Switches
- Data Backup/Business Continuity
- Data Network and Voice Wiring
- Wireless Networks
- Remote Access
- Multiple Locations
- Web/Email Hosting
We can implement and maintain every part of your business network.
If you need:
- Managed IT Services Support in Glen Ellyn, IL (60137, 60138)
- Data Network Setups & Cloud Services in Chicagoland
- Computer Networking in Glen Ellyn,IL
- IT Tech Support in Glen Ellyn, IL (60137, 60138)
- Install Servers, Firewalls, Data Security in Glen Ellyn,IL
- Internet Network Setup in Chicagoland
- Firewall Network Security in Illinois
- Remote Office data networks in Glen Ellyn, IL (60137, 60138)
...this is where you
need to be!
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
Your Company Laptop Was Stolen – Now What? May 29, 2018
It’s another Tuesday in the airport, and you just cleared the TSA line and went to the pretzel shop for a quick bite before you catch your plane. You sit your laptop down to get a straw, and the next second…your laptop is gone. It’s not in sight, nor is the thief who stole it.
At first you’re confused, then the confusion starts to fade away and you realize that this wasn’t just a personal laptop. It was your work computer and had company files, sensitive information and access to company data that definitely doesn’t belong in anyone else’s hands.
But what do you do?
What To Do When You Can’t Find Your Stolen Laptop
Stolen Laptop Step 1: Get in touch with your IT team
Whether you outsource, have internal IT staff or a mixture of both, your first step is to alert your IT support teams of the incident. Time is critical on this.
Even if you have a password on your laptop, which will likely prevent the thief from immediately having access to your private documents. It won’t stop someone removing the hard drive from your laptop and connecting it to another computer. Suddenly your hard drive is sitting there, ready to browse – just like any other folder or drive letter.
Your IT Staff/Vendor should be installing encryption and remote management software on all remote devices. With proper encryption, your data is secure AND with remote management, your IT staff can wipe the stolen laptop before any damage is done.
Without this encryption software and remote management, you’d be forced to report any theft like this as a data breach. That means the government knows about it, your employees need to be made aware and worst of all – you have to alert clients.
This is why in this instance, you call your tech staff first.
Stolen Laptop Step 2: Contact the Police and file a report
The next best thing to do in situations like this is to immediately file a police report for the stolen laptop. Having a police case number can help with any insurance and/or recovery endeavors that come up. Plus, having a police report can help catch the criminal who stole your sensitive devices.
Stolen Laptop Step 3: Change Your Passwords
If you don’t have encryption and even if you do – it is smart to change passwords to all personal, professional and financial accounts. Additionally if you used this computer to pay bills, check banking information or for any type of financial transactions, you’ll want to make sure to check those accounts.
Stolen Laptop Step 4: Recover Your data on another device
This step also involves your IT staff/company. Hopefully you’re IT pros have all of your company data backed up and readily available. It is important that you synch your portable devices regularly so that in ANY incident of failure or theft, you can be restored quickly without too much interruption.
To make sure that you’re covered on this front, we’d suggest requesting regular tests of your backups anyway. That way, no matter the issue, you know your data is secured, backed up AND ready to deploy in an emergency or urgent situation.
There are many steps you’ll want to take after a theft occurs but with proactive IT support you won’t have nearly as many headaches to deal with.
These things happen more often than you’d think too.
On average a laptop is stolen every 53 seconds!
So – take the following actions and get ahead of the issue before a stolen laptop happens.
- Find out if your company’s remote devices are encrypted with the ability to wipe all data on command
- Make sure that you train employees with remote devices not to leave them unattended and to lock them in the trunk of their cars instead of leaving them in a front or backseat.
- When travelling put your laptop on the TSA conveyer belt last – that way it is less likely to remain unattended.
- Look into your company backups and business continuity protocols.
- How often are they tested?
- How often are remote users synching and backing up data?
- How long will it take to restore a PC when you need it?
Our team is here to help you set up and manage any of the technical details listed above.
In fact, fill out the form below or call the office to receive 10% off of your initial setup fees for our remote encryption software!
Just mention the code “Encrypt4Me” when you call (815) 836-0030 or fill out the form below.
The post Your Company Laptop Was Stolen – Now What? appeared first on Andromeda Technology Solutions.How to Spot Phishing Scams and Stop Cyber-Criminals from Stealing Your Data Apr 27, 2018
Cyber-Security is a big topic in the news. New businesses fall victim to hackers and cyber criminals daily.
Even high quality security programs and protocols can fall victim to cyber-bullies without proper employee training, awareness and attention to detail.
We believe education is one of the best defenses against cyber criminals.
With that in mind, we want to provide some valuable tips for spotting and avoiding one of the most popular scams/tactics cyber-criminals use against you: the Phishing Scam.
Email is essential to your business and every day communication. It is also one of the prime spaces hackers focus on to steal your information and sneak into your network.
This is because it is SO much easier to get a person to click on a link, input account info or download a corrupt file via an email scam than many other hacker strategies.
You’ve probably heard this but it’s true – “There’s one person in every office that will click on anything.”
Hopefully that person isn’t you!
But – with the information below, you’ll learn how to spot these scams and some strategies to avoid them altogether.
Phishing Scams 101
What are some of the Goals of Phishing Scams?
- Steal Sensitive Personal Info – Credit Card Info, Account Login Info, Personally Identifiable Information (SSN, Birth Date etc.)
- Gain control of your computer or network
- Install malware or other computer viruses
How do cyber-criminals convince you to fall for their plans?
- Deliver file attachments with harmful software enclosed – viruses/malware/keystroke loggers
- Trick you into clicking on bad websites that secretly infect your PC with viruses etc.
- Convincing you to give them username info and password info to desired accounts
Things you should look out for to spot and prevent Phishing Scams
- Make sure that the “reply to” email address matches the sent address
- Any message that creates a sense of urgency – especially regarding login info
- Any message that requests sensitive data
- Questionable links or links that don’t match the anticipated site/source
- Random social media messages asking you to click a link to see a video or receive specific info
Keep in mind and remember that legitimate companies won’t email you asking for passwords, sensitive info (social security numbers) or other sensitive data via email.
Sample Phishing Scams Explained:
- The ‘From’ email address is suspicious
- ‘From’ and ‘Reply-To’ are different and both are suspicious again
- When you hover over the ‘Restore Access’ button there is a link that doesn’t match any Microsoft destinations
- Bad sender domain
- Suspicious Subject & Content – generic name and sense of urgency to give up account info
- Bad grammar
- Suspicious link if you hover over the masked link.
- Bad domain in ‘From’ section – email@example.com
- Generic Greeting
- Bad link redirect
- Sense of Urgency in message to get your account info
Response Strategies/Protocols for suspected phishing emails:
In the office it is important to have conversations with employees and make sure everyone knows what to do if they suspect a bad email.
- We recommend alerting your IT partner or IT staff members of the issue.
- NEVER click any links you think are suspicious.
- If you are unsure of an email you can always contact the related company direct. For example, with respect to any of the above emails you can always go directly to their official page, grab contact info and call/contact support to confirm that the email is real.
- NEVER use contact info in a suspicious email to figure out whether it is real or not. Criminals put fake phone numbers and contact info in their messages so of course they will tell you that the email is real.
- Hold regular cyber security and data security training in your office to make sure employees are up to speed on the latest techniques/red flags.
The post How to Spot Phishing Scams and Stop Cyber-Criminals from Stealing Your Data appeared first on Andromeda Technology Solutions.Latest IPhone Update Syncs Messages Across All Devices Jun 07, 2018
If you use Apple products, you may have noticed an annoying "feature".� If you're using the messaging app on your phone and texting someone and then you move to your Mac and access the same program there, the conversation you were having on your phone isn't present.� The two devices are messaging islands that can't reliably communicate with each other. Since they can't, you can't start a conversation on one device and then pick it up later on another.
True, Apple fans have found workarounds for the issue, but these are far less than perfect.
There's good news, though.� As of the latest iPhone update, your phone will now synchronize your messages across all Apple devices you own.
It's a small thing, but you'd be amazed at how often it matters.� Back in the "good ol' days" most people just had one computer they used for everything.� We no longer live in that world.� Today, there are more active smartphones than there are people living on the planet, and the smartphone is just one of the many computing devices we use.
The advent of cloud-based technologies made accessing data across multiple devices possible, allowing you to work seamlessly on the same project with whatever device you have in hand at the moment. However, some things (like messaging) have been impossible, or at least highly inconvenient to access across multiple devices. That is, until now.
Granted, this improvement won't change the world, but it will serve to make your world more seamless, convenient, and efficient. That makes it worth talking about.
In a lot of ways, the upgrade is like tabbed browsing.� Until you start using it, you cannot fully appreciate just how awesome it is. By the time you realize how great it is, you're hooked and can't imagine messaging any other way.� Kudos to Apple for an excellent enhancement!