Meet Our Clients
We have extensive experience in all aspects of networking:
- Managed IT Services Support in Chicagoland
- Computer LANs
- Computer WANs
- Computer VPNs
- Computer Network Switches
- Data Backup/Business Continuity
- Data Network and Voice Wiring
- Wireless Networks
- Remote Access
- Multiple Locations
- Web/Email Hosting
We can implement and maintain every part of your business network.
If you need:
- Managed IT Services Support in Naperville, IL (60540, 60563, 60564)
- Data Network Setups & Cloud Services in Chicagoland
- Computer Networking in Naperville,IL
- IT Tech Support in Naperville, IL (60540, 60563, 60564)
- Install Servers, Firewalls, Data Security in Naperville,IL
- Internet Network Setup in Chicagoland
- Firewall Network Security in Illinois
- Remote Office data networks in Naperville, IL (60540, 60563, 60564)
...this is where you
need to be!
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
Holy Big Brother! Google Location History: An All Knowing Function You Probably Didn’t Know You’ve Enabled Jul 31, 2017
Technology has changed our world forever. What’s the first thing you do before you get out of bed in the morning? Chances are it has something to do with your smartphone. These items open up worlds of possibilities but they can also bring issues and privacy conflicts with them. For this month’s IT article we bring you an article from our President and CEO Jeff Borello on the intersection of instant access (google) and user privacy (location sharing) – focusing on something called: Google Location History. Without further ado . . .
Holy Big Brother
Have you ever heard of Google Location History?
Yeah, me neither.
Let me start by saying I am not a guy that cares about intrusions on my privacy. I don’t care if the government is listening to my phone calls or reading my Emails. I figure I am not doing anything wrong – so if they are interested in my boring life – so be it. Especially if it helps them catch some bad guys.
Now, with that said, even I was a little freaked out when I discovered how much Google and my Google App know about my daily movements.
These days, almost everyone has a Google login and is quite often signed into their account – especially from a mobile device.
So, let’s play a little game. Where were you on January 17th at 4pm? You probably don’t remember, but if you have location services enabled on your device . . . Google does.
Google Location History is a comprehensive (and by that I mean every detail imaginable) history of places you have visited as tracked and logged by your smartphone’s GPS function. Besides being comprehensive, it also has a very long memory – like years.
Give this a try to see if Google Location History is enabled on your phone.
- From a desktop browser, go to Maps.google.com (from your phone you need to open the Google Maps App)
- Sign in to your Google account (if you aren’t already). Top right-hand corner will either show a Letter (first letter of your login) or a Sign In button.
- Click the 3-bar menu in the top left corner and select “Your Timeline”
- If you see some bar graph data there, click the bar for a given day shown from the last month.
- How long did it take you to get to work that day?
- Where did you have lunch?
- Did you walk anywhere during the day?
- Did you take any pictures? (Yes, those might be logged in there as well)
See a screenshot below of my recent trip to Nashville. Yep, lunch at Monell’s (great place BTW) from 12:25 to 2:06 and dinner at 9:14 at the Peg Leg Porker BBQ
Walking, driving, flying. It knows and records those differently.
So, the obvious question is why on earth would you want something this invasive turned on? The answer is convenience. As often is the case, to gain some convenience you need to give up some privacy.
It is this information that Google uses to help you throughout your day. It will inform you of traffic issues based on your travel habits and places you may visit often. The more information the system has on you, the more helpful an AI-powered app (Google Assistant) can be.
Okay, I have Google Location History turned on. Now what?
The good news is you do have control over this. If you aren’t comfortable being tracked, you can turn this feature off. From the Timeline there is an option to Pause that feature, which in effect disables it until you turn it back on. You can also delete your entire location history as well, or just delete individual entries if you wish.
Of course, as long as the GPS is enabled on your phone, there are still plenty of apps out there that could be tracking you. Only truly private solution is to disable the GPS completely (which probably causes you more issues than you think) or just leave your phone at home (yeah, right).
Is Google Location History too much an invasion on your privacy? That is for you to decide but at least now you’re aware you are under the microscope.
The post Holy Big Brother! Google Location History: An All Knowing Function You Probably Didn’t Know You’ve Enabled appeared first on Andromeda Technology Solutions.Why Good Camera Systems Need Great IT Pros May 15, 2017
Would you be OK with a criminal or competitor watching you and your office via your own CCTV security cameras . . . ?
Didn’t think so.
Security and camera systems, like many other technologies, are becoming more and more integrated within IT networks and infrastructure. This is great for ease of use, capabilities and increased protections. However, it can also open up additional avenues and risks for your company if managed incorrectly.
Imagine all the information someone could snag with limited access to your CCTV system.
You wouldn’t trust your IT to “some guy” (at least we hope not). You should give the same respect to your security systems. It may be a good idea to buy a system from Costco or Amazon. But those off brand systems are easily hacked and they may carry pre-installed malware. Just last year a slew of security camera systems purchased on Amazon were found to be infected and could be hijacked by hackers to access data and camera footage illegally.
In almost all cases, some part of your security camera system needs an IT professional involved to finish the job and configured correctly. You can either trust the camera guy as he fumbles his way around your network, potentially leaving easily accessed holes in your protection, or try to get the camera guy and your IT guy to coordinate and work together (what we call a scheduling nightmare). Or, you can hire a professional technology services firm that does both.
Why Chose Andromeda’s Security Cameras?
Andromeda understands the intricate relationships security technologies have with your IT. We have specialized technicians in each area. They work together with a vast understanding of the security that both your CCTV system and your network need. Also, because we sell only professional grade hardware and software (Honeywell) the chance of a hack on these pieces is much less than the cheaper no-name brands.
Security threats are everywhere these days. You don’t need to make yourself more vulnerable. Do not create a gaping hole in your enterprise via the very thing that is there to help protect you. Reach out to our team today if you are considering any security projects. We ensure that the solution you choose is right for your business needs, but most importantly, we make sure it is installed correctly and you are protected.
The post Why Good Camera Systems Need Great IT Pros appeared first on Andromeda Technology Solutions.FBI Advises Users To Reboot Their Routers Jun 11, 2018
Cisco's Talos Security Team has identified a new threat, and it's a nasty one impacting more than half a million consumer-grade routers in the US.� According to the Talos Team's report, the new malware is impacting a broad cross-section of routers made by TP-Link, QNAP, Netgear, Mikrotik, and Linksys.
Known as "VPNFilter," the malware currently infecting routers appears to be the first stage in a multi-phase attack, with the first segment allowing the hackers to collect a wide range of communications data and slave the device to launch attacks on others.� The code also contains a kill command that allows the hackers to destroy the device at will.
As of now, the FBI has already taken swift action and has seized a domain used by the hackers as a means to deliver the later stages of the attack. They report that the primary and secondary means of further infection have been dismantled.� They also report, however, that the hackers still have a fallback method of infection, which relies on sending "poisoned" data packets to each infected device.
Based on an evaluation of the code and the presence of redundant mechanisms for delivering the later stages of the infection, the code has been traced to a Russian hacking group with deep ties to the Russian government.� The group is known by a variety of names, including Fancy Bear, Sofacy, APT 28, and Pawn Storm.
On the heels of seizing the domain, the FBI released a statement that includes:
"The FBI recommends any owner of small office and home office routers reboot the devices to temporarily disrupt the malware and aid the potential identification of infected devices.� Owners are advised to consider disabling remote management settings on devices and secure with strong passwords and encryption when enabled.� Network devices should be upgraded to the latest available versions of firmware."