What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Account Coordinator(AC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Lisle, IL Businesses:
What A Few Of Our Clients Have To Say
Andromeda IT Service Offerings
Here is just a quick list demonstrating the breadth of IT services you can expect from Andromeda:
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
How A Third-Party Data Breach Impacts Cybersecurity At Your Business Aug 05, 2019
With the average American adult maintaining over 130 different accounts online, the risk of a data breach or data being stolen continues to grow. Between social media, financials, productivity applications, email, business applications, online shopping and countless other accounts online, your “online life” becomes more and more a part of your day to day physical life as time passes.
As more of our lives and data are shared online, criminals are focused on breaking into these databases to steal the valuable info they hold:
- Personal Info such as name, address, dates of birth, social security numbers etc.
- Financial information such as bank info, credit cards etc.
- Social Information on social media accounts
This is a real problem facing consumers globally but the impacts span beyond individual damages and stolen identities (though, those damages are bad enough).
When a criminal steals your password, or the password of a coworker, chances are – they’ve gained access to many pieces of your “online life”.
Here’s an example to illustrate how a third party data breach can lead a criminal back to your business.
Your HR manager helps book travel for employees at the business. He set up a business account at a national hotel chain to book rooms for whatever the business travel needs are. The hotel chain’s database suffers a breach and cybercriminals steal thousands of email/password combos including your HR manager’s credentials.
Your HR manager used the same password he uses for all kinds of sites online when he created the login at the hotel company site. This means that the criminals who have this breached data, now have access to your payroll software, servers and all the other things your HR manager interacts with.
The criminals either use this data themselves or take it to the Dark Web to sell for a few dollars (password/email combinations go for $3-$5 on average on the Dark Web).
Breaches like these happen daily and criminals use the information they steal to do as much damage as they can.
This creates a unique problem for business owners and managers because what can you possibly do to protect yourself from a data breach happening at a hotel chain or some other account online?
Things get even trickier when the average span of time between a data breach and disclosure to the public reaches 15 months. Meaning, criminals have a 15-month head start to get to your business and do damage before your are notified on the 5 o’clock news or your social media feed.
So, how can you defend against this kind of thing?
First, implement a password policy at your business:
- Strong Passwords Required
- Change Passwords Regularly (90 days minimum)
- Dual Authentication
- Lockout Procedures
Second, roll out a password management tool across your organization.
As mentioned earlier, the average adult in America manages over 130 accounts online. It is no wonder that we have a hard time creating strong and unique passwords for each of those accounts. It would be nearly impossible to remember all of that without writing things down – which isn’t secure.
To bridge the gap between security and memory, implement a password management tool. Look for something that is encrypted, secure and be sure to consider mobile capabilities. We recommend LastPass as a great option to start.
Third, invest in Dark Web Monitoring
Dark Web Monitoring is still a newer service offered to businesses and professionals. This is a monitoring solution designed to scrub different areas of the Dark Web (chatrooms, discussion boards etc.) for data connected to your domain.
If we apply Dark Web Monitoring to the example above with the HR Manager for instance – when the criminals stole data from the hotel chain and went to sell/share it on the Dark Web, the monitoring tool would identify your IT company to have the HR manager change passwords. That way, the criminals have useless data and you are protected well before you learn about the breach 15 months later.
The post How A Third-Party Data Breach Impacts Cybersecurity At Your Business appeared first on Andromeda Technology Solutions.4 Reasons Office 365 is the Right Choice for Your Business Aug 03, 2018
By the end of 2017, Microsoft’s Office 365 Suite of applications had over 120 million active business and commercial users. Microsoft projects that in fiscal 2019, approximately two-thirds of all Microsoft Office users will be subscribed to Office 365 instead of the traditional licensing model.*
Cloud applications have made a great impact on business, connectivity, accessibility, and productivity. From the looks of it, more and more applications and even hardware solutions are moving to the cloud.
This is exciting for business and the technology sector because there are many real benefits to business owners and employees built into cloud applications.
Office 365 offers different subscriptions and packages built to suit the specific needs of your business, but across their offering, there are many shared benefits.
Let’s take a look at the top 4 reasons Office 365 is the right choice for your business, and why Andromeda Technology Solutions recommends it.
1. Say Goodbye to Expensive Microsoft Licenses
Licensing for the Microsoft Suite (Word, Excel, PowerPoint, etc.) can be very costly. Depending on which version of Office you are purchasing, each license can set you back hundreds of dollars. Even for the average small or mid-sized business, this adds up to thousands of dollars very quickly.
Microsoft also phases out legacy software over time, which means that your current professional Microsoft Office license will no longer be supported, maintained, or updated at some point. For example – Microsoft Office 2010 will reach end of life in 2020, and businesses with these licenses will need to purchase new ones for all machines or migrate to Office 365.
With Office 365, your software is always up to date and there are no licenses to worry about. Whenever a new version of the product becomes available, it is automatically pushed out across the cloud applications and your employees keep working without issue. Any documents, presentations, spreadsheets, or other items you’ve created within Office 365 will automatically update to the latest version of Office.
2. Office 365 is Budget-Friendly
Office 365 is a subscription-based cloud application. As mentioned before, there are several different subscription levels with multiple applications. This offers flexibility to suit most any business needs and budget. You can easily calculate and anticipate your annual budget with Office 365 and build it into your regular expenses.
The solution is billed per user. It should be mentioned as well that each user can install the application on multiple devices. This means that you only pay for one subscription per user – even if they access Office 365 on multiple computers, a tablet, and even their smart phone.
3. Work from Anywhere
While you’ll need an internet connection to collaborate with your coworkers in real time, or use certain applications, Office 365 lets you work from just about anywhere. You need an internet connection for the initial setup, migration, and sign up. After that, you have the option to install the latest Microsoft Office Suite directly on your computer. You can save your files directly onto your PC and host them in the cloud for accessibility on the go.
The real productivity magic with Office 365 lives in your ability to access and work on things from anywhere with an internet connection.
Whether you are in the airport, at home, drinking coffee on the go, or in your car before a big meeting, you can login to Office 365 to review your files or make last minute changes at any time: you can even do it from your smartphone.
You can also work with multiple teammates in the same documents from multiple locations. For example – teammates in 2 different locations can work together to complete presentations, spreadsheets, and other deliverables in real time without locking one another out of documents.
4. Increased Storage & Security
Microsoft knows that to make Office 365 attractive to businesses like yours, they have to make sure that the cloud environment and application is secure and trustworthy. There are many features and add-on security settings available to you like encrypted email, spam filters, data loss prevention services, mobile device management, and more (some may require additional fees).
On top of built-in security features, Office 365 subscribers benefit from increased storage capacity in Outlook and OneDrive. The Office 365 Enterprise E3 license offers 100GB mailbox storage and unlimited personal cloud storage as a standard. If that isn’t enough for your environment, or you outgrow any of your storage over time, Office 365 is built to scale and grow with you. This is possible by offering additional storage, security, and application options specific to your needs.
When it comes to accessibility, ease of use, budgeting, and ongoing support, Office 365 is the leading option for business. We anticipate it will continue to dominate the market for both small to mid-size businesses and enterprise.
If you are interested in Office 365 for your business, a great first step is a consultation with one of Andromeda’s local account managers. There are many different subscription levels, applications, and migration details that you will want to go over before making the switch. Additionally, you will want to make sure you are working with an IT Services Professional to make your project and migration as seamless as possible.
Simply reach our team by phone (815) 836-0030 or email: Contact@WeNetwork.com to schedule a conversation. You’ll be glad you did!
*For more on Office 365 users and statistics, check out this article from zdnet.com.
The post 4 Reasons Office 365 is the Right Choice for Your Business appeared first on Andromeda Technology Solutions.LeapPad Kids Tablet Found To Have Security Issues Aug 21, 2019
Researchers at CheckMarx recently discovered some serious security flaws in the popular LeapPad Ultimate tablet.
The tablet was designed by LeapFrog to provide kids in the UK and Europe with a safe environment to access games, videos and educational apps.
The researchers had this to say about their discovery:
"The first thing we found is that some of LeapFrog's communications aren't encrypted.� It's using very simple HTTP protocol, storing information in clear text and allowing an attacker to become a man-in-the-middle."
The researchers built a proof of concept app that allowed them to spoof the existing connection and force the device onto a rogue network.� From there, they were able to inject malicious scripts into the rogue network and use them to access a variety of sensitive information from the system, such as the child's name, gender, birth year and birth month.
The researchers also noted that this attack methodology could allow hackers to steal information about the parents of the kids using the device, including their email addresses, phone numbers and access to payment card information.
Mari Sunderland, the VP of Digital Product Management at LeapFrog, issued a formal statement for the company, which read, in part, as follows:
"We thank CheckMarx for bringing these security issues to our attention, as the safety of the children who use our products is our top priority. When you know that the main users of your device will be children, the standards you need to put on your R&D need to be the highest:� Military grade.� Vendors should be very responsible and understand that privacy issues for children are much worse.� All this needs to be taken into account to make sure your solution is as safe as possible."
It's a wonderful sentiment, and one hopes that LeapFrog's next solution will be more robust.