What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Service Coordinator(SC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Morris, IL Businesses:
What A Few Of Our Clients Have To Say
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
Holy Big Brother! Google Location History: An All Knowing Function You Probably Didn’t Know You’ve Enabled Jul 31, 2017
Technology has changed our world forever. What’s the first thing you do before you get out of bed in the morning? Chances are it has something to do with your smartphone. These items open up worlds of possibilities but they can also bring issues and privacy conflicts with them. For this month’s IT article we bring you an article from our President and CEO Jeff Borello on the intersection of instant access (google) and user privacy (location sharing) – focusing on something called: Google Location History. Without further ado . . .
Holy Big Brother
Have you ever heard of Google Location History?
Yeah, me neither.
Let me start by saying I am not a guy that cares about intrusions on my privacy. I don’t care if the government is listening to my phone calls or reading my Emails. I figure I am not doing anything wrong – so if they are interested in my boring life – so be it. Especially if it helps them catch some bad guys.
Now, with that said, even I was a little freaked out when I discovered how much Google and my Google App know about my daily movements.
These days, almost everyone has a Google login and is quite often signed into their account – especially from a mobile device.
So, let’s play a little game. Where were you on January 17th at 4pm? You probably don’t remember, but if you have location services enabled on your device . . . Google does.
Google Location History is a comprehensive (and by that I mean every detail imaginable) history of places you have visited as tracked and logged by your smartphone’s GPS function. Besides being comprehensive, it also has a very long memory – like years.
Give this a try to see if Google Location History is enabled on your phone.
- From a desktop browser, go to Maps.google.com (from your phone you need to open the Google Maps App)
- Sign in to your Google account (if you aren’t already). Top right-hand corner will either show a Letter (first letter of your login) or a Sign In button.
- Click the 3-bar menu in the top left corner and select “Your Timeline”
- If you see some bar graph data there, click the bar for a given day shown from the last month.
- How long did it take you to get to work that day?
- Where did you have lunch?
- Did you walk anywhere during the day?
- Did you take any pictures? (Yes, those might be logged in there as well)
See a screenshot below of my recent trip to Nashville. Yep, lunch at Monell’s (great place BTW) from 12:25 to 2:06 and dinner at 9:14 at the Peg Leg Porker BBQ
Walking, driving, flying. It knows and records those differently.
So, the obvious question is why on earth would you want something this invasive turned on? The answer is convenience. As often is the case, to gain some convenience you need to give up some privacy.
It is this information that Google uses to help you throughout your day. It will inform you of traffic issues based on your travel habits and places you may visit often. The more information the system has on you, the more helpful an AI-powered app (Google Assistant) can be.
Okay, I have Google Location History turned on. Now what?
The good news is you do have control over this. If you aren’t comfortable being tracked, you can turn this feature off. From the Timeline there is an option to Pause that feature, which in effect disables it until you turn it back on. You can also delete your entire location history as well, or just delete individual entries if you wish.
Of course, as long as the GPS is enabled on your phone, there are still plenty of apps out there that could be tracking you. Only truly private solution is to disable the GPS completely (which probably causes you more issues than you think) or just leave your phone at home (yeah, right).
Is Google Location History too much an invasion on your privacy? That is for you to decide but at least now you’re aware you are under the microscope.
The post Holy Big Brother! Google Location History: An All Knowing Function You Probably Didn’t Know You’ve Enabled appeared first on Andromeda Technology Solutions.How to Spot Phishing Scams and Stop Cyber-Criminals from Stealing Your Data Apr 27, 2018
Cyber-Security is a big topic in the news. New businesses fall victim to hackers and cyber criminals daily.
Even high quality security programs and protocols can fall victim to cyber-bullies without proper employee training, awareness and attention to detail.
We believe education is one of the best defenses against cyber criminals.
With that in mind, we want to provide some valuable tips for spotting and avoiding one of the most popular scams/tactics cyber-criminals use against you: the Phishing Scam.
Email is essential to your business and every day communication. It is also one of the prime spaces hackers focus on to steal your information and sneak into your network.
This is because it is SO much easier to get a person to click on a link, input account info or download a corrupt file via an email scam than many other hacker strategies.
You’ve probably heard this but it’s true – “There’s one person in every office that will click on anything.”
Hopefully that person isn’t you!
But – with the information below, you’ll learn how to spot these scams and some strategies to avoid them altogether.
Phishing Scams 101
What are some of the Goals of Phishing Scams?
- Steal Sensitive Personal Info – Credit Card Info, Account Login Info, Personally Identifiable Information (SSN, Birth Date etc.)
- Gain control of your computer or network
- Install malware or other computer viruses
How do cyber-criminals convince you to fall for their plans?
- Deliver file attachments with harmful software enclosed – viruses/malware/keystroke loggers
- Trick you into clicking on bad websites that secretly infect your PC with viruses etc.
- Convincing you to give them username info and password info to desired accounts
Things you should look out for to spot and prevent Phishing Scams
- Make sure that the “reply to” email address matches the sent address
- Any message that creates a sense of urgency – especially regarding login info
- Any message that requests sensitive data
- Questionable links or links that don’t match the anticipated site/source
- Random social media messages asking you to click a link to see a video or receive specific info
Keep in mind and remember that legitimate companies won’t email you asking for passwords, sensitive info (social security numbers) or other sensitive data via email.
Sample Phishing Scams Explained:
- The ‘From’ email address is suspicious
- ‘From’ and ‘Reply-To’ are different and both are suspicious again
- When you hover over the ‘Restore Access’ button there is a link that doesn’t match any Microsoft destinations
- Bad sender domain
- Suspicious Subject & Content – generic name and sense of urgency to give up account info
- Bad grammar
- Suspicious link if you hover over the masked link.
- Bad domain in ‘From’ section – email@example.com
- Generic Greeting
- Bad link redirect
- Sense of Urgency in message to get your account info
Response Strategies/Protocols for suspected phishing emails:
In the office it is important to have conversations with employees and make sure everyone knows what to do if they suspect a bad email.
- We recommend alerting your IT partner or IT staff members of the issue.
- NEVER click any links you think are suspicious.
- If you are unsure of an email you can always contact the related company direct. For example, with respect to any of the above emails you can always go directly to their official page, grab contact info and call/contact support to confirm that the email is real.
- NEVER use contact info in a suspicious email to figure out whether it is real or not. Criminals put fake phone numbers and contact info in their messages so of course they will tell you that the email is real.
- Hold regular cyber security and data security training in your office to make sure employees are up to speed on the latest techniques/red flags.
The post How to Spot Phishing Scams and Stop Cyber-Criminals from Stealing Your Data appeared first on Andromeda Technology Solutions.New Malware Is Coming Through Messaging Apps Mar 19, 2019
As if your stressed IT staff didn't have enough to deal with, there's a new threat to be on the lookout for.
Researchers at the antivirus company Avast have discovered a new strain of malware that can spread by way of Skype and Facebook Messenger spam messages. The malware, called "Rietspoof" is described as a multi-stage malware strain.
It was first discovered back in August of last year, and until recently, didn't raise any eyebrows because it was seldom used. That has now changed.� There's been a notable uptick in the number of instances of Rietspoof detected on the web.
As malware goes, Rietspoof by itself isn't all that threatening.� Its goal is merely to infect as many devices as possible, serving as a bridge between an infected device and a command and control server that allows other strains of malware to be systematically injected onto infected systems.
Rietspoof accomplishes this goal by placing a shortcut (LNK file) in the Windows Startup Folder. This is one of the critical folders that Avast and other major antivirus programs monitor rigorously. However, Rietspoof has managed to slip through the cracks, bypassing security checks because it is signed with legitimate certificates.
The malware's infection cycle consists of four discrete steps. Three of them are dedicated to establishing a Rietspoof beachhead on a target system, and the fourth is reserved for the downloading of more intrusive and destructive malware strains.
According to the research team that discovered it, since they first began tracking the malware, it has undergone a number of incremental changes. That lead them to the conclusion that Rietspoof is a work in progress and currently undergoing testing and further development.
Although it may have limited functionality now, that could very easily change as the hackers behind the code continue to modify it.� Be sure your IT staff is aware, and stay vigilant!