What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Account Coordinator(AC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Lisle, IL Businesses:
What A Few Of Our Clients Have To Say
Andromeda IT Service Offerings
Here is just a quick list demonstrating the breadth of IT services you can expect from Andromeda:
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
5 Cyber Security Features/Protocols Your Business Needs To Protect Against Scammers, Hackers & Cyber Criminals Jul 31, 2020
Sometimes it sounds like the news and cyber experts are on loop or a broken record. Every day there is a new report about cyber security, threats and the like. But while these stories and warnings may start to seem like white noise in the background, the threats are still here and they are very real.
The upside of all of this coverage and conversation is that business owners are wising up and with the topic of cyber security taking center stage, users and business owners alike are being more proactive when it comes to protecting and educating themselves.
In the spirit of education we’d like to dive a little deeper into 5 features/protocols you can set up at your office to beef up your IT Security.
Top 5 Cyber Security Features/Protocols
Multi Factor Authentication
This feature is nothing new but it is becoming more and more common across all kinds of accounts. Financial services, email, social media and other applications/accounts are making use of multi or dual factor authentication. Essentially you have a password and second form of identification to prove your identity. Sometimes this is a randomly generated code – think Facebook’s code generator.
Another type of multi or dual factor authentication uses biometric data for identity verification. Things like a fingerprint or a retina scan are examples of this type of security measure. In fact, last month we took a look at biometrics, integrated security and banking applications – read more about that.
An Employee Training Program
Statistically over 80% of all breaches and intrusions occur after an employee error. Clicking a link in an email, downloading a malicious file, visiting an infected website . . . there are so many ways this can happen and most of the time it isn’t intentional either. The best way to prevent this from happening is an ongoing security program for yourself and employees. A good program will have a varied focus: compliance standards for personal and customer info (commonly known as pii or personally identifiable information), strategies for recognizing and avoiding email scams, proper security protocols for best practices at the office and more. In 2017 Andromeda recognized this need and released our PII Protection/Cyber Security Training Program. See full details here.
Business Grade Firewall
A good firewall is your first defense against intrusion. With proper intrusion detection and intrusion prevention settings you arm yourself against cyber criminals and hackers. On top of that, a business grade firewall solution is an important piece of hardware when you want to set up public and private networks. You definitely don’t want guests at your building or passersby accessing company documents or networks because of low cyber security protocols.
Regularly Scheduled Updates/Patching
New viruses and threats hit the market every day. On top of that, hackers and criminals discover new vulnerabilities almost as fast as developers can protect against them. This is why keeping up to date and on top of patching and updates is so important. For instance, the WannaCry virus everyone heard so much about this year took advantage of a vulnerability that had already been addressed by a Windows patch. If companies had proactively updated and maintained their updates/patches, they wouldn’t have been as vulnerable to an attack.
This ties into both firewall protocols and employee training but of course, the fewer random emails that make it into your employee inboxes, the fewer links and files you need to worry about employee’s (or even yourself) clicking on. A professional spam tool can be configured to your liking and can do a whole lot to prevent content from making it to those that might accidentally infect your network. See the photos below for a few examples of emails we protect customers from on a daily basis.
As always, Andromeda is here to help you protect yourself and your business from these ongoing threats. Take the first step today and sign up for a cyber security audit with our team of experts.
The post 5 Cyber Security Features/Protocols Your Business Needs To Protect Against Scammers, Hackers & Cyber Criminals appeared first on Andromeda Technology Solutions.3 Ways Data Encryption Can Save You From Unnecessary Stress, Spending & Headaches Jul 03, 2020
When you think of data encryption, you might imagine top-secret files and espionage. Historically, militaries and governments protected messages and sensitive information using encryption. These days encryption has many more uses. With hackers and cyber criminals constantly after your data, it is important that you make use of this security measure.
Encryption is defined as scrambling data or text to make it unreadable. This protects stored data and personal information from displaying to those without a proper clearance or key to decode that information. There are all kinds of pieces of information you have on file that a disgruntled employee or criminal could make use of:
- Home addresses
- Email Addresses
- Drivers Licenses
- Credit Card information
- Social Security Numbers
- Date of birth
- Medical history or records
- Financial information – routing numbers, account numbers etc.
Depending on your industry, this information may be subject to state and federal regulation, hefty fines and, in cases of negligence, even jail time (we’re talking hundreds of thousands of dollars). Businesses close their doors over this stuff.
While employee training and proper cyber protocols are great at protecting you and your business from user error and data breach – encryption is an added layer of security every business benefits from.
3 Ways Data Encryption Can Save You From Unnecessary Stress, Spending & Headaches
- Encryption Saves Your Reputation – More and more employees are working on the go. With employees working from home, sales staff in the field and the hustle and bustle of every day, you don’t want to hold your employees back or decrease productivity by preventing devices from leaving the office.But imagine your employee runs into the neighborhood Starbucks and leaves their company laptop in their front seat. While they are ordering their venti latte, a criminal breaks into their car and steals their belongings – your laptop included. Now you’re out the hardware but more importantly, you have a criminal at large with sensitive data. If this data has any sensitive personally identifiable information (PII) on it, you are required to report the incident.Do you want your customers losing valuable trust in your company? In fact, this fear of reputation damage is the reason that three out of every four victims to ransomware, data breach or cyber-attack do not report the incident.Think back to 2013 when 41 million people found out Target compromised their sensitive data. You’d probably think twice about shopping there again if you were one of them. If the stolen laptop had been encrypted, you wouldn’t have to report an incident. The criminal would have no way of deciphering any data on the equipment.
- Encryption Keeps Designated Information Private – Let’s bring this example back into your office for a moment. Even if you don’t keep sensitive customer information on file or process credit cards. You have personal information for employees on file: Performance reviews, social security numbers, salary information and more. You don’t need a hacker or even a disgruntled employee gaining access to these records.With encryption you can ensure that even if an employee accidentally or intentionally stumbles into an area they shouldn’t be, they can’t make sense of any of that information.
- Encryption Can Save You From The Unexpected – Whether a device goes missing from the office, you can’t risk having sensitive information at large. Your reputation aside, as mentioned earlier, these types of breaches can result in very large fines, prosecution and years in prison. Nobody needs that on their mind every night. With encryption, you can rest easy that even in the wrong hands your data can’t be manipulated or exposed.To take this a step further, certain encryption management tools have the ability to remotely disable and even wipe devices. This comes in handy in all of the examples we have described. Then, not only is the information on your device useless, but after your IT company takes necessary steps, the device shows nothing but the “blue screen of death”.
Encryption is a powerful tool. It is an incredibly useful piece of your cyber security and data protection plan. It is important that you protect sensitive information. Even if you don’t want to believe it, there are criminals out there that would wreak havoc with the data if given the chance.
For more information on our encryption software and other cyber security training, protocols and plans, give us a call at (815) 836-0030.
And be sure to explore our Security Training Program. Over 80% of data breaches are a result of human error and the first step to prevention is education.
The post 3 Ways Data Encryption Can Save You From Unnecessary Stress, Spending & Headaches appeared first on Andromeda Technology Solutions.Toy Company Mattel Was Latest Victim Of Ransomware Attack Nov 14, 2020
When you were growing up, your parents probably bought you all sorts of toys made by Mattel. From Hotwheels to Barbie to the full line of Toy Story toys and more, Mattel is a global force in the world of toys.
In fact, they are the second largest toy maker in the world, with more than 24,000 employees and gross revenue of nearly six billion dollars in 2019.
On July 28th, 2020, the company's network was successfully breached and a strain of ransomware deployed against them, which encrypted some of the company's files and caused disruptions in the firm's ongoing operations.
The company released an official disclosure about the incident which reads in part, as follows:
"On July 28, 2020, Mattel discovered that it was the victim of a ransomware attack on its information technology systems that caused data on a number of systems to be encrypted. Promptly upon detection of the attack, Mattel began enacting its response protocols and taking a series of measures to stop the attack and restore impacted systems. Mattel believes it has contained the attack and, although some business functions were temporarily impacted, Mattel was able to restore its critical operations."
Part of the company's response was to launch a forensic investigation in cooperation with law enforcement. That process has been completed, and based on its conclusion, Mattel updated their initial disclosure. It now says that it does not appear that any customer, supplier, consumer or employee data was exfiltrated by the hackers.
Of interest, neither the initial disclosure or the update gave any indication of the specific ransomware strain used, or the exact scale of the impact. Although there's circumstantial evidence that suggests the strain in question was Trickbot.
Whatever the strain, the bottom line is that no customer data appears to have been stolen. So if you have an account on Mattel's website, there's nothing you need to do, except be aware that the attack occurred.