What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Service Coordinator(SC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Lemont, IL Businesses:
What A Few Of Our Clients Have To Say
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
3 Ways Data Encryption Can Save You From Unnecessary Stress, Spending & Headaches Sep 04, 2017
When you think of data encryption, you might imagine top-secret files and espionage. Historically, militaries and governments protected messages and sensitive information using encryption. These days encryption has many more uses. And with hackers and cyber criminals constantly after your data, it is important that you make use of this security measure.
Encryption is defined as scrambling data or text to make it unreadable. This protects stored data and personal information from displaying to those without a proper clearance or key to decode that information. There are all kinds of pieces of information you have on file that a disgruntled employee or criminal could make use of:
- Home addresses
- Email Addresses
- Drivers Licenses
- Credit Card information
- Social Security Numbers
- Date of birth
- Medical history or records
- Financial information – routing numbers, account numbers etc.
Depending on your industry, this information may be subject to state and federal regulation, hefty fines and, in cases of negligence, even jailtime (we’re talking hundreds of thousands of dollars). Businesses close their doors over this stuff.
While employee training and proper cyber protocols are great at protecting you and your business from user error and data breach – encryption is an added layer of security every business benefits from.
3 Ways Data Encryption Can Save You From Unnecessary Stress, Spending & Headaches
- Encryption Saves Your Reputation – More and more employees are working on the go in 2017. With employees working from home, sales staff in the field and the hustle and bustle of every day, you don’t want to hold your employees back or decrease productivity by preventing devices from leaving the office. But imagine your employee runs into the neighborhood Starbucks and leaves their company laptop in their front seat. While they are ordering their venti latte, a criminal breaks into their car and steals their belongings – your laptop included. Now you’re out the hardware but more importantly, you have a criminal at large with sensitive data. If this data has any sensitive personally identifiable information (PII) on it, you are required to report the incident. Do you want your customers losing valuable trust in your company? In fact, this fear of reputational damage is the reason that three out of every four victims to ransomware, data breach or cyber-attack do not report the incident. Think back to 2013 when 41 million people found out Target compromised their sensitive data. You’d probably think twice about shopping there again if you were one of them. If the stolen laptop had been encrypted, you wouldn’t have to report an incident. The criminal would have no way of deciphering data on the equipment.
- Encryption Keeps Designated Information Private – Let’s bring this example back into your office for a moment. Even if you don’t keep sensitive customer information on file or process credit cards. You have personal information for employees on file: Performance reviews, social security numbers, salary information and more. You don’t need a hacker or even a disgruntled employee gaining access to these records. With encryption you can ensure that even if an employee accidentally or intentionally stumbles into an area they shouldn’t be, they can’t make sense of any of that information.
- Encryption Can Save You From The Unexpected – Whether a device goes missing from the office, is stolen from a front seat or possibly snatched by a disgruntled employee, you can’t have sensitive information at large. Your reputation aside, as mentioned earlier, these types of breaches can result in very large fines, prosecution and years in prison. Nobody needs that on their mind every night. With encryption you can rest easy that even in the wrong hands, your data can’t be manipulated or exposed. To take this a step further, certain encryption management tools have the ability to remotely disable and even wipe devices. This comes in handy in all of the examples we have described. So now, not only is the information on your device useless, but after your IT company takes necessary steps, the device shows nothing but the “blue screen of death”.
Encryption is a powerful tool. It is an incredibly useful and we would say necessary piece of your cyber security and data protection plan. It is important that you protect sensitive information. Even if you don’t want to believe it, there are criminals and people out there that would wreak havoc with that data if given the chance.
For more information on our encryption software and other cyber security training, protocols and plans, give us a call at (815) 836-0030.
And be sure to click here and explore our Unlimited Security Training Program. Over 80% of data breaches are a result of human error and the first step to prevention is education.
Mention this blog and receive 50% off your first annual subscription.
The post 3 Ways Data Encryption Can Save You From Unnecessary Stress, Spending & Headaches appeared first on Andromeda Technology Solutions.Holy Big Brother! Google Location History: An All Knowing Function You Probably Didn’t Know You’ve Enabled Jul 31, 2017
Technology has changed our world forever. What’s the first thing you do before you get out of bed in the morning? Chances are it has something to do with your smartphone. These items open up worlds of possibilities but they can also bring issues and privacy conflicts with them. For this month’s IT article we bring you an article from our President and CEO Jeff Borello on the intersection of instant access (google) and user privacy (location sharing) – focusing on something called: Google Location History. Without further ado . . .
Holy Big Brother
Have you ever heard of Google Location History?
Yeah, me neither.
Let me start by saying I am not a guy that cares about intrusions on my privacy. I don’t care if the government is listening to my phone calls or reading my Emails. I figure I am not doing anything wrong – so if they are interested in my boring life – so be it. Especially if it helps them catch some bad guys.
Now, with that said, even I was a little freaked out when I discovered how much Google and my Google App know about my daily movements.
These days, almost everyone has a Google login and is quite often signed into their account – especially from a mobile device.
So, let’s play a little game. Where were you on January 17th at 4pm? You probably don’t remember, but if you have location services enabled on your device . . . Google does.
Google Location History is a comprehensive (and by that I mean every detail imaginable) history of places you have visited as tracked and logged by your smartphone’s GPS function. Besides being comprehensive, it also has a very long memory – like years.
Give this a try to see if Google Location History is enabled on your phone.
- From a desktop browser, go to Maps.google.com (from your phone you need to open the Google Maps App)
- Sign in to your Google account (if you aren’t already). Top right-hand corner will either show a Letter (first letter of your login) or a Sign In button.
- Click the 3-bar menu in the top left corner and select “Your Timeline”
- If you see some bar graph data there, click the bar for a given day shown from the last month.
- How long did it take you to get to work that day?
- Where did you have lunch?
- Did you walk anywhere during the day?
- Did you take any pictures? (Yes, those might be logged in there as well)
See a screenshot below of my recent trip to Nashville. Yep, lunch at Monell’s (great place BTW) from 12:25 to 2:06 and dinner at 9:14 at the Peg Leg Porker BBQ
Walking, driving, flying. It knows and records those differently.
So, the obvious question is why on earth would you want something this invasive turned on? The answer is convenience. As often is the case, to gain some convenience you need to give up some privacy.
It is this information that Google uses to help you throughout your day. It will inform you of traffic issues based on your travel habits and places you may visit often. The more information the system has on you, the more helpful an AI-powered app (Google Assistant) can be.
Okay, I have Google Location History turned on. Now what?
The good news is you do have control over this. If you aren’t comfortable being tracked, you can turn this feature off. From the Timeline there is an option to Pause that feature, which in effect disables it until you turn it back on. You can also delete your entire location history as well, or just delete individual entries if you wish.
Of course, as long as the GPS is enabled on your phone, there are still plenty of apps out there that could be tracking you. Only truly private solution is to disable the GPS completely (which probably causes you more issues than you think) or just leave your phone at home (yeah, right).
Is Google Location History too much an invasion on your privacy? That is for you to decide but at least now you’re aware you are under the microscope.
The post Holy Big Brother! Google Location History: An All Knowing Function You Probably Didn’t Know You’ve Enabled appeared first on Andromeda Technology Solutions.Microsoft Fixes October Windows 10 Update Nov 30, 2018
As you probably heard, Microsoft's October update of Windows 10 was a bit of a disaster.� Sure, it updated your OS, but unfortunately for many users, it also deleted a variety of files. This prompted outrage from the company's massive user base.
Things would have been bad enough if the calamitous October update had been an isolated mis-step. Unfortunately, the last several of Microsoft's updates have been plagued with problems, which has caused the company to take a step back and reassess.
There's good news on a couple of different fronts.� First, Microsoft has just re-released the October update, and this time it updates the OS without deleting your files.� Second, the company has pledged to be more open about their Windows 10 development and testing process, which should help keep the company more accountable and provide a greater degree of transparency.
What we have learned from Microsoft so far is that they track their software using two key metrics: Initial quality and sustained quality.� Initial quality is a measure of the stability and reliability of an update.� A low score here indicates that something was missed in testing. Sustained quality is the reliability and effectiveness of the stream of updates that service each future release.
Obviously then, the last few of Microsoft's updates have suffered from relatively low initial quality, but the company maintains that overall, the trajectory of sustained quality is still quite good.
They pointed to two additional metrics they use to track overall customer satisfaction with the OS. The biggest of these is the "incident rate," which is the number of complaints logged with each new release.� This rate has declined steadily over the life of Windows 10 to this point, which supports the company's contention.� Even so, it's painfully obvious that something has been going wrong where Microsoft's testing is concerned.� Here's hoping the increased transparency will help in that regard.
In any case, the October update is once again available, and this time, it's safe to use.