What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Account Coordinator(AC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Harvey, IL Businesses:
What A Few Of Our Clients Have To Say
Andromeda IT Service Offerings
Here is just a quick list demonstrating the breadth of IT services you can expect from Andromeda:
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
3 Teams Updates You Might Have Missed & How To Use Or Access Them Aug 28, 2020
Microsoft Teams helps professionals connect and stay productive by bringing all documentation, communication and collaboration into one space. If you are like us, most of your day-to-day communication and activity is somehow tied to Microsoft Teams. Like many other software as a service programs, Teams users benefit from real-time product updates and feature rollouts. That means that the software responds to user needs and is constantly being updated with new features.
Here are the awesome new features that have been added to your Teams app that you might not have heard about.
1 New Meeting and Call Pop-outs – When you join a call/meeting in the desktop app, it will pop out into a secondary window instead of confining your meeting to the main Teams interface. This allows you to have a meeting on one screen and the full Teams app open on another screen etc. It should be noted though, to use this Teams setting, you must turn it on in your general settings.
2 Book appointments with Bookings. The Bookings app inside Teams is an easy way to schedule virtual appointments. You can manage multiple calendars, as well as communications with internal and external attendees, from a single source. The virtual appointments are then held via Microsoft Teams Meetings.
3 Raise your hand in a meeting. This is especially handy when you have a large gathering and don’t want to interrupt the speaker. You let people know you have something to say with the new raise hand feature in Teams. While in a meeting, select the hand icon in your control bar. This will highlight your hand icon on your video feed to let the rest of the attendees know that you’d like to speak. Once you have been allowed to share, you just click the icon again to lower your hand.
If your team is ready to start using the full Office 365 suite of products and you need a partner to help implement it at your office, give us a call and we can help manage the process and installation.
The post 3 Teams Updates You Might Have Missed & How To Use Or Access Them appeared first on Andromeda Technology Solutions.Layered Network Security: 5 Components Every Layered Security Solution Should Have & Why Employee Training Is A Must Have Nov 02, 2020
Securing your data and your network is a big job. If you’re looking at trends or the news, you can probably guess that network security is only going to get more important and cumbersome in the future.
Cybersecurity is now a common household term and that’s a good thing. The page has been turned on data security and people regularly recognize that we need to protect ourselves both personally and professionally from cyber crime and related threats.
To illustrate where the cybersecurity and cyber crime industries are moving here are a few stats (full article here):
- Cyber crime damage costs are predicted to hit $6 trillion annually by 2021
- Cybersecurity spending to exceed $1 trillion by 2021
- Global ransomware incidents hit a rate of one attack every 14 seconds in 2019
The threats to data and networks are clearly going nowhere so it is important that you have a plan in place to protect your business (and yourself).
Different software applications and hardware solutions are designed to address specific security concerns. This means that while one solution may give you complete protection from one threat, it may not be suited to protect you from another.
The solution for these weak points is to ‘layer’ your security and design a solution that covers and protects your network to the best of its abilities.
What You Should Expect From A Layered Network Security Solution
A good layered security solution for your network is going to include the following components:
1. Professional Firewall Solution –
Your firewall is designed to help protect your network from external threats. It does this by blocking access to your network while allowing your users to communicate outside of the network. While a firewall is a great way to protect your network from intrusions, it can only protect your system from outside activity. A firewall cannot prevent one of your users from giving unauthorized permissions or access to programs or other users.
2. Professional Antivirus Software –
Antivirus software is a standard security solution designed to detect and block malware, viruses and other bugs from taking action against your network. An antivirus solution typically depends on a predefined catalog of known issues. The software uses this catalog to block those known issues from impacting you. The issue with this is that new viruses, malware, spyware and bugs are produced daily. If your solution is not actively updating and monitoring the internet for new incidents, it won’t be able to protect you from new threats in real time. Antivirus solutions also cannot always block a user from disregarding a warning and downloading a bad file/clicking on a bad link.
3. Email Spam Prevention/Filters –
Spam is more than just an annoying thing filling up your inbox. A majority of viruses and bugs that get through your firewall/antivirus do so by hiding in email messages. Cyber criminals know that if they send enough emails, somebody is going to click a bad link or download a compromised attachment. By filtering out spam, you dramatically decrease the opportunity for someone to accidentally introduce a virus to the network. Again though, spam filters don’t catch everything so they cannot prevent a user from making a mistake.
4. DNS Filtering/Protection –
DNS stands for Domain Name System. This piece of your network controls email delivery and is the component that allows you to browse websites. When configured, a DNS filter can prevent your employees from accessing specific types of sites. For example, a DNS filter can be set up to prevent employees from accessing social media or other blacklisted sites. This security also helps keep malware or other viruses from spreading throughout your network by masking your devices and server. This is one element of your network security that isn’t heavily impacted by regular users but if it is not set up properly and managed properly it can’t protect you from much.
5. Employee Training & Education –
You may have noticed that almost any of the security layers mentioned above have specific strengths and weaknesses. Additionally, each component had a weakness related to human or user error. The fact is that users and honest mistakes are the root cause of the majority of data breaches, viruses, downtime and incidents on your network. That doesn’t mean your employees and coworkers are intentionally breaking protocol or doing things wrong. Most of the time these are honest mistakes like clicking a link in an email, downloading a file with a hidden virus or visiting an infected/malicious site and unknowingly giving cyber criminals usernames & password information.
And That’s Just The Beginning…
These are just five common pieces of a layered network security setup. They all work together to help cover different vulnerabilities and behaviors. There are many other software and hardware solutions that can increase your layered network security and reduce vulnerability. Some of those include:
- Dark Web Monitoring Services
- Dual Authentication
- Password Management
- Data Backups
- Disaster Recovery Planning
- Scheduled & Regular Patches/Updates
- Security Protocols for Remote Devices
- Network Security Assessments (at least once a year)
The goal should be to protect your environment to the best of anyone’s ability and to educate/train your staff adequately to mitigate risk.
You will also want to make sure and take any specific compliance requirements or regulations for your industry into account. Most any business that has data needs to maintain certain standards for data protection.
To discuss any of the layers for a layered network security solution listed above or your environment please reach out to our team.
For more information on employee data security training go here.
The post Layered Network Security: 5 Components Every Layered Security Solution Should Have & Why Employee Training Is A Must Have appeared first on Andromeda Technology Solutions.Hackers Stole User Information From Popular Gold Dealer Nov 17, 2020
Do you own gold? If so, and if you purchased it online, then odds are good that you bought it from JM Bullion, which is one of the largest precious metal retailers on the web.
If so, be aware that the company recently announced that their network was breached, and as a result, some customer credit card information was stolen.
It turns out that this issue dates back to February of this year (2020) although the company only became aware of the problem on July 6th, when they were alerted to suspicious activity on their website. By July 17th, they had identified a malicious script that had been injected into their site, which, according to the company's disclosure notification "had the ability to capture customer information entered into the website in limited scenarios while making a purchase."
The notification goes on to stress that the limited scenarios represented a small fraction of the total transactions processed by JM Bullion during the period, but the company has so far declined to give any information regarding the exact scope and scale of the incident.
By now, all impacted customers will have received an official notification by mail from the company, which includes next steps. If you haven't gotten such a notification, then odds are excellent that your payment card information wasn't compromised and there's nothing for you to do.
Either way, it pays to be mindful of the event and keep a sharp eye on the payment card you used to make your purchases on JM Bullion's site, just in case.
Needless to say, the offending script has been removed, and at present, there are no known issues with the site. Still, this serves as yet another reminder that no matter where you go on the web and no matter what you do, you are not safe. Stay vigilant.