What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Account Coordinator(AC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Lockport, IL Businesses:
What A Few Of Our Clients Have To Say
Andromeda IT Service Offerings
Here is just a quick list demonstrating the breadth of IT services you can expect from Andromeda:
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
9 FAQs About Office 365 Nov 04, 2019
When you are trying to decide which programs to purchase for your business, it is important to understand all the benefits of each. Office 365 has so many built in conveniences it is hard to picture any other option coming close.
Here are the 9 most frequently asked questions and answers about Microsoft Office 365 to help you make the best decision for your business:
1. What is the difference between Office 2019 and Office 365?
In Office 365 Business Premium, you get both the cloud and desktop versions of classic Office applications: Word, Excel, PowerPoint, Outlook, Publisher, and Access which will work on various devices (PC, Mac, iOS and Android to name a few). Additional programs/features from applications like OneNote, OneDrive and SharePoint are also included.
Along with new applications, Office 365 allows users to receive the most up to date features and software in “real time”. This means that your cloud applications are updated automatically as Microsoft rolls out updates.
It should be mentioned though, that desktop versions of the O365 suite are updated alongside regular Windows updates. So, those updates occur as your IT team updates your workstations. For Andromeda Managed IT Services clients, this happens weekly.
2. How does live collaboration work in Office 365?
A great productivity boost comes with live collaboration in Office 365. Multiple teammates can open the same document at the same time to work together.
Additionally, you can chat with teammates during editing to keep teammates on the same page. This can be done directly in the documents themselves or using Microsoft’s application Microsoft Teams.
3. Do I need an internet connection to run Office 365?
For Office 365 Business Premium and Enterprise licenses, internet access is required to install and activate all the latest releases of the applications. Once completed, you can download desktop versions of your Office Applications to use both on and offline.
NOTE: The Office 365 Business Essentials subscription includes ONLY cloud–based versions of the Microsoft Office Suite. This subscription does require internet access to use.
4. What security features does Office 365 include?
Office 365 has more than 1,000 security and privacy features available for use. Office 365 offers Advanced Threat Protection to guard your business against some of the sophisticated phishing and ransomware attacks designed to harm your business. Office 365 also includes compliance options/features to help ensure your business meets industry compliance. For more information on specific compliance and security features straight from Microsoft, you can go here.
5. How much OneDrive storage space do I get with my subscription?
By default, 1TB of storage is included with OneDrive. Added storage is available for purchase.
6. Do I have control of my documents with an Office 365 subscription?
Yes. You own and manage all your own documents. You can choose to store them online in OneDrive or locally to your computer or even direct to other Office 365 applications.
If you ever chose to cancel your Office 365 Subscription, make sure to have all staff save any documents in their OneDrive or other applications to a physical drive. You can also purchase OneDrive storage separately, but it is best to consult your IT team on the best solution for your business.
7. Are my documents stored in OneDrive available offline?
Yes. You can access OneDrive files both online and offline. The local offline files will take up some space on your machine but an internet connection is not required. You can also have what is called “on demand” settings enabled that will save certain files locally and others in the cloud as you choose.
If you are working offline, save your changes before exiting your program and OneDrive will update your files in the cloud once you reconnect to the internet.
8. Do the applications work the same on the computer as on my mobile phone?
The answer to this is really a yes and no. Office 365 has desktop, cloud and mobile versions of applications available. They all function the same. Meaning word is still going to create word documents and you will have most functions/features available across all devices.
The difference in functionality comes out in the way you use the applications on different devices. For instance, Word on your mobile device looks slightly different than on desktop, but this is to help with usability.
9. If I need help with my Office 365 set-up, who can I call?
Andromeda Technology Solutions has an entire team of experts in Installing and managing your Office 365 applications and permissions. Give us a call to help with any questions, and we will answer your questions or send out someone to solve your computer issues.
The post 9 FAQs About Office 365 appeared first on Andromeda Technology Solutions.5 Ways Your Information Gets On The Dark Web May 03, 2019
In our last IT article we discussed the Dark Web. Specifically what the Dark Web is and why it is something that matters to just about everyone. If you missed the article make sure to give it a read here.
There are many ways your information can be compromised and inevitably end up in the hands of wrong doers on the dark web. On top of that, there are numerous ways that hackers and criminals can steal your data that are completely out of your control.
It is important that you put defense in place where you can but it is also important that you manage your risk by educating yourself on some of the top vulnerabilities out there.
With that in mind we’ve gathered 5 of the top ways hackers and criminals get around you to steal your data for the Dark Web.
5 Ways Your Information Gets On The Dark Web
1. Visiting & Using Unsecure Websites
If a website isn’t secure, information passed between you and the site can easily be compromised. In a nutshell, websites pass information to your browser (google chrome, firefox etc.) and your browser displays that information for you to look at/use. Without proper security protocols like an SSL or HTTPs, sites don’t secure that information transfer. So, if you enter personal data into a form, make a purchase or put any data on the site that isn’t secured, it is easy enough for a hacker or cyber-criminal to intercept that data and sell it on the Dark Web.
If you are interested in how to secure your website or tell if the sites you visit are secure, we have an easy to understand article here.
2. Consumer Database Breach
While hackers and criminals will go after your personal data on a small scale, a larger customer breach is what their dreams are made of. Just think back to the Target, Home Depot and Experian breaches of recent years. Even social media databases are full of rich information that hackers can make use of. If a hacker gets ahold of your Facebook password they might have also gotten ahold of your date of birth, where you live and other personal information that they can use to access financial accounts or other personal accounts.
While you can’t keep hackers out of Target’s database, you can practice your own security protocols to decrease the likelihood of criminals using compromised data to ruin you financially:
- Use different passwords for different sites
- Change passwords often (every 90 days is recommended at minimum)
- Use strong passwords
- Look into a monitoring service that alerts you of suspicious activity on financial accounts
3. Firewall Issues
You don’t necessarily have control over whether someone else secures their website and you definitely don’t have control of the security procedures at your local grocery store, but you do have control over the firewalls you use at your business.
First . . . make sure you are using a professional or business grade solution for your firewall. Consumer grade solutions are meant for home use and will not have adequate protections in place to keep your company’s private data secure.
Additionally, make sure that you have regular updates and software patches scheduled. These devices are only as good as the software they utilize. If your firewall is out of date or your software is out of date, chances are they cannot defend against the latest hacker strategies and viruses.
You will also benefit from a regular system audit to ensure all ports are secure and no user changes are impacting your network security. It is pretty common for businesses to forget these updates and checks and this is an incredibly vulnerable access point into your network if not properly configured.
4. Outdated Systems/Devices On Your Network
While your firewall controls much of the inbound and outbound traffic on your network, there are countless other devices that can create vulnerabilities. For instance, if you consider the Target breach of 2013, it is rumored that the criminals gained access to Target’s network via an HVAC company that monitored temperatures in stores. This brings up the fact that it is not just your own network but anything connected to it and the security of those ancillary devices/networks that you must be aware of.
If you have smart devices in the office, if you subscribe to any type of service that needs access to your network, all of these items and programs open you up to vulnerabilities. Even the smart devices you use at home can cause you trouble on a personal level. Imagine if a smart device on your home network was compromised and used by hackers to get into your work files on your home computer. This stuff happens and your information ends up on the dark web because of it.
5. Downloading untrusted applications/Opening Malicious Email
Email is essential to running your business but it is one of the best ways for hackers and criminals to gain access to your network. All they have to get you to do is click a link or download a file and BAM! your data might be compromised.
Email isn’t the only culprit though.can also give hackers access to your network and in turn your data. There are tools that can help you avoid this as well as training that helps you spot malicious links/sites.
How Can I Prevent My Info From Getting Onto Dark Web
With proper firewall configuration, professional anti-virus software that is updated regularly and employee training, you will dramatically decrease your vulnerability and incident rate.
There are so many ways hackers access your data. They can get to you through stores, websites, your email, the smart devices at your office/home and those are just a few examples. The scary part is that no matter how secure you make things, they will come up with a new approach that no one expects.
All hope isn’t lost though, with certain protections like professional cyber security consulting, monitoring software (both professional and personal), and specific security devices, you can protect yourself from cybercriminals.
If you’d like to discuss your options and make sure you are truly covered, reach out to our team and schedule a network security assessment.
The post 5 Ways Your Information Gets On The Dark Web appeared first on Andromeda Technology Solutions.Some Smart Light Bulbs Are Vulnerable To Hackers Feb 15, 2020
Hackers will take any and every opportunity presented to them, even if it means hacking smart light bulbs. Recently, security researchers at Check Point discovered a bug in the Philips Hue smart bulb that makes it vulnerable.
The bug is being tracked as CVE-2020-6007 and scores an impressive 7.9 out of 10, making it the most serious security flaw in a light bulb we've ever seen.
It sounds funny. After all, who would want to hack a light bulb? But it's actually got serious implications. After all, the light bulb is just the beginning. Once hackers are 'in' the bulb, it gives them a beach head on the network that the bulb is attached to, and from there, they can jump to any other device they can see.
Fortunately, Philips has already published a fix for this, in the form of firmware version 1935144040. If you own one or more Philips Hue bulbs, you'll want to check the firmware version. If yours has not already been updated, take the time to do so.
This underscores the one glaring weakness of the Internet of Things. Very few of the smart products we're connecting to our networks have any security at all. The few devices that do boast some kind of security often have flaws like the one discovered here, which are severe enough to be considered crippling.
The net effect is to make any network that incorporates smart devices much less secure. After all, your network is only as secure as the weakest device on it, and smart devices have notoriously bad security.
That's changing, but it's changing at an incredibly slow rate. If you've got smart devices on your network, consider isolating them and minimizing the amount of contact they have with other devices on your network. That way, at least you can mitigate the impact until security improves.