What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Account Coordinator(AC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for McHenry, IL Businesses:
What A Few Of Our Clients Have To Say
Andromeda IT Service Offerings
Here is just a quick list demonstrating the breadth of IT services you can expect from Andromeda:
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
How A Third-Party Data Breach Impacts Cybersecurity At Your Business Aug 05, 2019
With the average American adult maintaining over 130 different accounts online, the risk of a data breach or data being stolen continues to grow. Between social media, financials, productivity applications, email, business applications, online shopping and countless other accounts online, your “online life” becomes more and more a part of your day to day physical life as time passes.
As more of our lives and data are shared online, criminals are focused on breaking into these databases to steal the valuable info they hold:
- Personal Info such as name, address, dates of birth, social security numbers etc.
- Financial information such as bank info, credit cards etc.
- Social Information on social media accounts
This is a real problem facing consumers globally but the impacts span beyond individual damages and stolen identities (though, those damages are bad enough).
When a criminal steals your password, or the password of a coworker, chances are – they’ve gained access to many pieces of your “online life”.
Here’s an example to illustrate how a third party data breach can lead a criminal back to your business.
Your HR manager helps book travel for employees at the business. He set up a business account at a national hotel chain to book rooms for whatever the business travel needs are. The hotel chain’s database suffers a breach and cybercriminals steal thousands of email/password combos including your HR manager’s credentials.
Your HR manager used the same password he uses for all kinds of sites online when he created the login at the hotel company site. This means that the criminals who have this breached data, now have access to your payroll software, servers and all the other things your HR manager interacts with.
The criminals either use this data themselves or take it to the Dark Web to sell for a few dollars (password/email combinations go for $3-$5 on average on the Dark Web).
Breaches like these happen daily and criminals use the information they steal to do as much damage as they can.
This creates a unique problem for business owners and managers because what can you possibly do to protect yourself from a data breach happening at a hotel chain or some other account online?
Things get even trickier when the average span of time between a data breach and disclosure to the public reaches 15 months. Meaning, criminals have a 15-month head start to get to your business and do damage before your are notified on the 5 o’clock news or your social media feed.
So, how can you defend against this kind of thing?
First, implement a password policy at your business:
- Strong Passwords Required
- Change Passwords Regularly (90 days minimum)
- Dual Authentication
- Lockout Procedures
Second, roll out a password management tool across your organization.
As mentioned earlier, the average adult in America manages over 130 accounts online. It is no wonder that we have a hard time creating strong and unique passwords for each of those accounts. It would be nearly impossible to remember all of that without writing things down – which isn’t secure.
To bridge the gap between security and memory, implement a password management tool. Look for something that is encrypted, secure and be sure to consider mobile capabilities. We recommend LastPass as a great option to start.
Third, invest in Dark Web Monitoring
Dark Web Monitoring is still a newer service offered to businesses and professionals. This is a monitoring solution designed to scrub different areas of the Dark Web (chatrooms, discussion boards etc.) for data connected to your domain.
If we apply Dark Web Monitoring to the example above with the HR Manager for instance – when the criminals stole data from the hotel chain and went to sell/share it on the Dark Web, the monitoring tool would identify your IT company to have the HR manager change passwords. That way, the criminals have useless data and you are protected well before you learn about the breach 15 months later.
The post How A Third-Party Data Breach Impacts Cybersecurity At Your Business appeared first on Andromeda Technology Solutions.HOW YOU CAN PROTECT YOURSELF FROM THE PERSONAL AND PROFESSIONAL LOSSES RELATED TO DATA THEFT & THE DARK WEB May 31, 2019
We’ve spent some time over the last two months dedicating our articles to the Dark Web. Specifically, what it is and how your information is stolen and sold on the elusive Dark Web.
Part 1 – What Is The Dark Web & Why It Matters To You
Part 2 – 5 Ways Your Information Gets On The Dark Web
In this final article in our three part series, we thought it would be valuable to introduce our readers to some of the popular strategies and tools used both professionally and personally to reduce risk and protect you from losses related to data theft and the Dark Web.
One of the things we make sure to talk about with our clients in regard to cyber security and the Dark Web is that no matter how secure you make yourself and your business, these criminals are always going to come up with something new. It’s what they do.
With that in mind, there are still things you can do and one tool that you should put in place as your failsafe against all cybercrime and data theft.
How To Protect Yourself From The Dark Web
Identity Theft Protection
You invest time and money into data security at the office, but what do you do to make sure that your personal data is secure?
Personal data is very valuable to hackers and criminals. They can use it to steal your identity, open up lines of credit, purchase goods and more.
This isn’t a new story . . .
According to the Department of Justice, the average identity theft victim incurs over $1300 in personal damages. Not to mention reputational damage, time, stress and credit damages.
Because of how big of an issue personal identity theft is, there are services available that monitor your personal information for suspicious activity.
Services like LifeLock, IDWatchdog or IdentityForce are available to you among many others.
These services provide monitoring tools and alerts so when a criminal gets ahold of your info and attempts to use it, you are alerted and can cut them off before the damage is done. Some of them also provide insurance as well.
Andromeda doesn’t provide consumer solutions for identity theft protection but these services are a great asset to you for your personal protections.
Password Management Service
Password management is a necessity when it comes to keeping track of and maintaining strong passwords.
As you probably know, you want to have a unique password for every account you login to. So that means you should have a different password for Facebook, your personal email, your professional email, your primary bank account, any other bank accounts, Netflix . . . you get the idea.
On top of making sure your passwords are different, you should also make sure that they are STRONG.
- No Personal/Guessable Phrases
- Both Upper and Lower cases
- At least 8 Characters
- Include numbers
- Include other characters – !@#$%&
Do you think that you’d be able to keep track of all of your passwords if each one were unique? Do you think that you’d be able to keep track of them AND change them every 90 days (at a minimum)?
If you answered no, you aren’t alone.
That is why so many people use the same passwords across many accounts.
But that is also how a hacker can get access to your Facebook or Gmail password and then log in to your bank account.
To avoid this, get your hands on a professional password management solution.
There are a lot of options out there and they offer different features. Some are free and some are subscription based.
If you want a great comparison of the leading options, check out this side by side comparison from PCMag here.
Add Cyber Security Tools to Your Data Security Arsenal
The previous two tools are great for protecting you both personally and professionally but Andromeda specializes in protecting and service your business so of course, we need to pay attention to professional tools too.
In respect to cyber security and your business, there are many different tools you need in place. Things like a professional firewall solution, spam filtering and professional anti-virus software (NOT Freeware) are the basics. Nonetheless, there are added layers of security you should request from your IT Service Provider.
Some of these might include:
- Professional Disaster Recovery/Data Backup & Recovery Solutions
- Dual Authentication Software
- Patch and Update Management (we recommend weekly updates)
- Employee Cyber Security Training
These are just a few things you can have a professional technology partner handle for your business. Once you have these in place, you’ll be more secure and hopefully you’ll sleep a little better knowing you are proactively fighting off the criminals who want to ruin your day, interrupt (or even destroy) your business and steal your data.
Dark Web Monitoring Services
The Dark Web is an area of the web most people can’t or don’t regularly access. As discussed in previous articles, the Dark Web is an area where cyber criminals go to sell and purchase digital credentials (email addresses, passwords, personal information).
You won’t know a criminal has access to this data or whether they are using it against you until it is too late.
Unfortunately, with all of the different ways hackers and criminals can steal your data (Read our previous article for more on that – here), it is pretty much impossible to guarantee your data will NEVER be breached.
You should invest in password management, superior cyber security tools and identity theft monitoring. All of those services and tools will build up a strong defense system. However, you want to make sure that you are also proactively defending yourself from the attacks and strategies of tomorrow. You want to make sure you are defending yourself from the threats that haven’t hit the market just yet.
A tool that can help you defend yourself in this way is a Dark Web Monitoring Service.
In a nutshell, this tool scans the Dark Web for your businesses domain.
When an email address with your domain is found, an alert is sent out to your technology partner and appropriate actions are taken.
Password information changes before a criminal can get into your network and compromise data.
Andromeda Technology Solutions provides Dark Web Monitoring services to clients. We would love to discuss how we can help secure your info before compromise turns into catastrophe.
If you’re interested in taking a look at your current cyber security solutions and figuring out whether you are truly protected, give us a call or send us an email at Contact@WeNetwork.com. Mention this article when you contact our team and you’ll receive special pricing.
Interested in reading more? Check out:
Part 1 Part 2
The post HOW YOU CAN PROTECT YOURSELF FROM THE PERSONAL AND PROFESSIONAL LOSSES RELATED TO DATA THEFT & THE DARK WEB appeared first on Andromeda Technology Solutions.Thanos Ransomware May Get Around Certain Security Systems Jun 22, 2020
In 2019, a new strain of ransomware called Thanos burst onto the scene and has since been spreading quietly and seeing increased adoption by hackers around the world.
The code has been traced to a Russian hacker going by the name Nosophorus, who has been offering the software as 'Ransomeware-as-a-service' on Russian-speaking forums on the Dark Web since February 2020.
The reason for Thanos' increasing popularity is that Nosophorus has monetized its spread, creating an affiliate program that shares revenue from any ransom payments collected. This is only one of a number of interesting and alarming features about the code, however.
Most of the ransomware written in C# isn't very robust or sophisticated. However, Thanos is an exception, sporting a modular design that makes it easy to upgrade or reconfigure based on each hacker's specific needs.
In addition to that, Thanos is the first ransomware strain that makes use of RIPlace anti-ransomware evasion techniques, which makes it notoriously difficult to detect and prevent. The technique was first discovered by a security researcher going by the name of Nyotron. He duly reported it to security companies around the world, only to be told that the technique, while interesting, was purely theoretical and would never be seen in the wild.
Sadly, those predictions have now been proved to be incorrect. Thanos is actively making use of the evasion technology, which leaves security companies scrambling to catch up. Unfortunately, when RIPlace was described to Microsoft, a spokesman for the company had something to say.
"The technique described is not a security vulnerability and does not satisfy our Security Servicing Criteria. Controlled folder access is a defense-in-depth feature and the reported technique requires elevated permissions on the target machine."
Given this and the other advanced features Thanos sports, you can bet that it's going to see increasingly widespread use. Ultimately, this will force big tech firms to take action, but not before the malware has the opportunity to do serious damage. Be on the alert for this one. Thanos is a serious threat.