What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Account Coordinator(AC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for LaGrange, IL Businesses:
What A Few Of Our Clients Have To Say
Andromeda IT Service Offerings
Here is just a quick list demonstrating the breadth of IT services you can expect from Andromeda:
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
Stop These 3 Hazardous File Sharing Habits Yesterday! Jan 03, 2020
File sharing is an essential portion of any business. It is the way we get information from one person to another. BUT, it can also be the way hackers gain access to your sensitive information – files or, worst of all, confidential data.
If you’re using Dropbox, OneDrive, Google Drive, or other consumer-grade file sharing and cloud sync applications – or if you depend on file sharing of any kind to run your business (hint . . . you do)- listen up!
Here are 3 habits you should break yourself and your staff of immediately.
Top 3 File Sharing Habits to Break
1) Using Consumer Grade Solutions . . .
Consumer grade solutions are just that . . . consumer grade. You aren’t a ‘consumer’, you’re a business owner with sensitive data to protect. With more and more employees/businesses depending on BYOD (Bring Your Own Device) as well as the ability to access files any time & any place, it is important that your file sharing system is professional grade. Look for enterprise grade security options like SSL Encrypted Transfer, Firewall Protection, Password Protection and Virus Scanning.
2) Emailing Files Without Proper Encryption . . .
You may not care if a hacker gets a hold of your grocery list or photos of the family dog, but when it comes to confidential data such as financial statements, medical records or other sensitive materials, it is safe to say you cannot afford criminals sniffing through your files. For this reason, NEVER send files via email without proper encryption. Business grade email and proper practices can nip this in the butt. You’d be amazed how many files fall into the laps of cyber criminals this way though.
3) Using Flash Drives…
You spend time and hard earned resources to protect your network from outside threats . . . only to destroy everything when you innocently plug in an infected flash drive you picked up innocuously enough at a trade show. Flash drives bypass security systems you have in place and may run automatically without being checked for infection by your antivirus solution. If you must continue using flash drives . . . at a minimum update your antivirus to prohibit autorun and mandate scans to all USB-attached devices when plugged into your PCs.
The post Stop These 3 Hazardous File Sharing Habits Yesterday! appeared first on Andromeda Technology Solutions.Ransomware, Disaster Recovery and Business Continuity: What Every Small Business Should Know Aug 30, 2019
The last few years have seen a large increase in ransomware incidents and 2019 has surely followed suit with many industries impacted. In the last few months manufacturing, municipalities, school districts and other small business sectors have all dealt with their share of attacks. Tens of townships in Texas were attacked in August 2019 with a total ransom of over 2.5 million dollars. School districts across the US were targeted for student and faculty data.
It’s been a rough one to say the least.
The best defense against ransomware for yourself and your business is still education and Andromeda can help with that. Read on to learn more about the threat of ransomware to your business and what you can do to prepare yourself.
Ransomware is a type of malicious program that encrypts a segment or all of your data. At that point, the data can only be decrypted with a key. The criminal ransoms your data until you pay them to decrypt it.
This means that whatever they get their hands on, is no longer of use to you until you pay up. Things like accounting information, client information, HR information – anything data related at the business.
With more and more incidents on the rise, it is important that you proactively defend yourself against this threat and have a plan in place to respond in case your business faces a ransomware incident of its own.
Employee Cyber Security Training
Over 90% of cyber security incidents facing businesses today originate with some kind of human error. Your staff and teammates don’t mean to make these mistakes and an honest error can happen to anyone. Clicking on a bad link, falling for a scam online, downloading an infected file – these things happen to the best of us.
Tricking you into downloading malicious files to your PC is still a method criminals use to try and get into your computer but the primary two methods to gain access and do damage to your systems in 2019 are via third party data breaches (learn more about third party breaches here and phishing email attacks (learn more about phishing scams here .
To help your employees stay ahead of criminals and defend your business, you want to invest in regular training for the team. Professional cyber security training programs include simulated phishing email tests, individual scores, weekly quizzes, newsletters and more.
Data Backups & Disaster Recovery Planning
Employee training will do a good job at helping your staff defend the business but there is still always a chance that ransomware can happen.
When it comes to ransomware, there is little you can do to remove the damages. There is no ‘debug’ or troubleshooting technique that will make it go away. To get the encrypted data, you have to have the decryption code.
The only alternate solution available to you would be to restore from a backup. That way, you don’t need to decrypt anything. Of course, this is dependent on the quality and safety of your existing backups.
We recommend looking for a backup solution with an on premises copy as well as a secure cloud copy of your data backups.
The best data backup and recovery solutions take regular snapshots of your environment. Even better solutions can spin up a virtual ‘copy’ of your environment so you can keep working while your IT team works in the background to get systems back up and running like normal.
Make sure to ask the team or individual who handles your backups how often they test them. It’s also good to have a clear understanding of what it takes to get you back up and running in the event of an incident (what does it look like if we have an equipment failure? How do you respond if we are hit with ransomware?).
Training staff on how to avoid scams and criminal tactics online is a great way to defend against Ransomware and other incidents.
Having a good data backup and disaster recovery plan is what you want to do to make sure your business can handle this type of attack.
The final piece of the Ransomware puzzle for now is going to be your business continuity plan.
When it’s said and done, you are most likely going to experience some amount of downtime in the event of a Ransomware attack. It’ll take time to recognize what is happening, to contact the proper parties (IT staff or your outsourced team and decision makers), respond to the incident etc.
All of this time costs your business money, productivity and opportunities. This is why many vendors suggest coming up with Business Continuity plans for different types of incidents at the office.
Have a plan for equipment failure (like a server crash), a plan for a major cybersecurity incident (ransomware across the network), have a plan for minor cybersecurity incidents (single user hit with malware or a virus). You get the idea.
Some great questions for Business Continuity plans:
- How does my business or staff respond to this incident?
- Do you unplug workstations?
- Does the employee call you first or IT?
- Is there anything you should do on site while your IT team gets to work?
- How long will it take to get us back up and running? (this will differ depending on what you face)
- How do we keep the business running while designated teams respond?
- Can we make use of the cloud?
- Do we need to work from pen and paper while things resolve?
A professional team will help you work through these questions and come up with the solutions your specific business and business model needs to keep things running in the event of a disaster, accident or incident.
The key is really in the preparation.
If you have any questions about any of the topics above or want to discuss your own disaster recover, data backups or business continuity plans, please give us a call at (815) 836-0030 or contact our team via email at Contact@wenetwork.com.
The post Ransomware, Disaster Recovery and Business Continuity: What Every Small Business Should Know appeared first on Andromeda Technology Solutions.Update Fix For VLC Media Player Security Bug Now Available Jun 25, 2020
Do you use the VLC Media Player to watch downloaded movies and other videos?
If so, be aware that researchers have discovered a serious security flaw in the code that allows for remote code execution, which could compromise your system.
The vulnerability is being tracked as CVE-2020-13428 and is described as a buffer overflow issue.
This could allow an attacker to execute commands under the same security level as the currently logged in user.
Fortunately, VideoLan, the company behind the media player, has rushed to fix the issue and released a patch. Version 3.0.11 of the program is currently available for Windows, Mac and Linux.
VLC Media Player is one of the most popular and flexible media players on the market today, and boasts an impressive number of installs. Even if you only make use of it occasionally, if you've got it installed on your system, it is strongly recommended that you take a few moments to install the latest update. The company also took the time to address a few other issues with the code.
Installing the update will also address the following issues:
- Fixes HLS regressions
- Fixes a potential crash on startup on macOS
- Fixes imprecise seeking in m4a files
- Fixes resampling on Android
- Fixes a crash when listing bluray mountpoints on macOS
- Avoid unnecessary permission warnings on macOS
- Fixes permanent silence on macOS after pausing playback
- Fixes AAC playback regression
Video playback is something that many of us simply take for granted. Unfortunately, an unpatched version of whatever program you're using could leave the door open to an attack by hackers that could lead to a total system compromise. It's definitely worth checking to see if you've got the player installed, and then verifying that you're running the latest version.