What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Account Coordinator(AC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Naperville, IL Businesses:
What A Few Of Our Clients Have To Say
Andromeda IT Service Offerings
Here is just a quick list demonstrating the breadth of IT services you can expect from Andromeda:
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
9 FAQs About Office 365 Nov 04, 2019
When you are trying to decide which programs to purchase for your business, it is important to understand all the benefits of each. Office 365 has so many built in conveniences it is hard to picture any other option coming close.
Here are the 9 most frequently asked questions and answers about Microsoft Office 365 to help you make the best decision for your business:
1. What is the difference between Office 2019 and Office 365?
In Office 365 Business Premium, you get both the cloud and desktop versions of classic Office applications: Word, Excel, PowerPoint, Outlook, Publisher, and Access which will work on various devices (PC, Mac, iOS and Android to name a few). Additional programs/features from applications like OneNote, OneDrive and SharePoint are also included.
Along with new applications, Office 365 allows users to receive the most up to date features and software in “real time”. This means that your cloud applications are updated automatically as Microsoft rolls out updates.
It should be mentioned though, that desktop versions of the O365 suite are updated alongside regular Windows updates. So, those updates occur as your IT team updates your workstations. For Andromeda Managed IT Services clients, this happens weekly.
2. How does live collaboration work in Office 365?
A great productivity boost comes with live collaboration in Office 365. Multiple teammates can open the same document at the same time to work together.
Additionally, you can chat with teammates during editing to keep teammates on the same page. This can be done directly in the documents themselves or using Microsoft’s application Microsoft Teams.
3. Do I need an internet connection to run Office 365?
For Office 365 Business Premium and Enterprise licenses, internet access is required to install and activate all the latest releases of the applications. Once completed, you can download desktop versions of your Office Applications to use both on and offline.
NOTE: The Office 365 Business Essentials subscription includes ONLY cloud–based versions of the Microsoft Office Suite. This subscription does require internet access to use.
4. What security features does Office 365 include?
Office 365 has more than 1,000 security and privacy features available for use. Office 365 offers Advanced Threat Protection to guard your business against some of the sophisticated phishing and ransomware attacks designed to harm your business. Office 365 also includes compliance options/features to help ensure your business meets industry compliance. For more information on specific compliance and security features straight from Microsoft, you can go here.
5. How much OneDrive storage space do I get with my subscription?
By default, 1TB of storage is included with OneDrive. Added storage is available for purchase.
6. Do I have control of my documents with an Office 365 subscription?
Yes. You own and manage all your own documents. You can choose to store them online in OneDrive or locally to your computer or even direct to other Office 365 applications.
If you ever chose to cancel your Office 365 Subscription, make sure to have all staff save any documents in their OneDrive or other applications to a physical drive. You can also purchase OneDrive storage separately, but it is best to consult your IT team on the best solution for your business.
7. Are my documents stored in OneDrive available offline?
Yes. You can access OneDrive files both online and offline. The local offline files will take up some space on your machine but an internet connection is not required. You can also have what is called “on demand” settings enabled that will save certain files locally and others in the cloud as you choose.
If you are working offline, save your changes before exiting your program and OneDrive will update your files in the cloud once you reconnect to the internet.
8. Do the applications work the same on the computer as on my mobile phone?
The answer to this is really a yes and no. Office 365 has desktop, cloud and mobile versions of applications available. They all function the same. Meaning word is still going to create word documents and you will have most functions/features available across all devices.
The difference in functionality comes out in the way you use the applications on different devices. For instance, Word on your mobile device looks slightly different than on desktop, but this is to help with usability.
9. If I need help with my Office 365 set-up, who can I call?
Andromeda Technology Solutions has an entire team of experts in Installing and managing your Office 365 applications and permissions. Give us a call to help with any questions, and we will answer your questions or send out someone to solve your computer issues.
The post 9 FAQs About Office 365 appeared first on Andromeda Technology Solutions.What is the Dark Web and why it matters for your business Mar 29, 2019
Ransomware, cybercrime, hackers . . .
It’s safe to say that you’ve at least heard of these terms in the news and if you are like most people, you’ve heard them over and over on the news, in the office and just in everyday conversation for the past few years.
This progression in the cybersecurity world may come with unique phrases and buzzwords but the trend itself is nothing new. Since the internet’s beginning, there have been people working to cause chaos.
Think computer viruses, Trojan horses, scams, spam, malware etc.
Like most technology, the internet is used predominantly for good. But, there are always a few bad apples who take good technology and choose to use it with less than the best intentions. And while there have always been “bad guys” out there trying to disrupt good works from being done, over the last decade and specifically in the last few years we’ve seen an incredible increase in spending, vulnerability and rates of incident for large scale cyber-attacks.
To put this in perspective, spending on cybersecurity is projected to exceed 1 trillion dollars by 2021. In 2017, information security (a subset of the cybersecurity industry) spending hit over 86 billion dollars.
On top of this, there has been a dramatic increase of incidents in the small to medium sized business arena. When a local business gets hit, it may not make the 5 o’clock news like Home Depot or Target, but it hurts just the same – and maybe even more.
The crazy thing when it comes to cybercrime, ransomware and other infections is that you can be doing regular updates, implement antivirus etc. and you still can fall victim to identity theft, breaches and other cyber incidents.
All of this cyber-security and cyber-crime discussion lays the groundwork for this Dark Web discussion.
What is the Dark Web?
First, what is the Dark Web? In a simple and brief explanation, the Dark Web is a mostly anonymous space online that you need special software to access. The experience is much like a normal internet browser but the sites and activities available are very different.
Many times the Dark Web is described using an iceberg illustration.
- The internet as we know it is what you can see above sea level.
- There is a larger space just below the surface of the iceberg where the ‘darknet’ lives, this is dominantly used for large data stores. Financial records, academic databases, government records etc. live here.
- Then there is the bottommost layer of the iceberg, this is the Dark Web – here you’ll find illegal activity like drug trafficking, illegal gun sales, and even personal data for sale.
Now, you may be thinking,
“This is interesting information but what in the heck does the Dark Web have to do with me? Why do I care about it? I don’t use it. I don’t know anyone who does. . .” And we get that, but even if you don’t use the Dark Web you may be on it.
The Dark Web is one of the largest sources of stolen data available to criminals. While some may use it to buy goods, other criminals purchase pieces of your information like credit card information, passwords, social security information and more to use for their own purposes.
When cybercriminals go to places like your local grocery store, Experian and other sites to wreak havoc, the information they steal ends up for sale on the Dark Web.
All of this taken into consideration, the everyday consumer and business professional shouldn’t be scanning these areas of the web to try and protect their data.
Instead, a business professional like yourself should make sure that you are following proper security protocols:
- Anti-Virus Software Regularly Updated and on every device
- Proper Firewalls and regular updates
- Employee training
- Regular Professional Backups (also regularly tested and verified)
- Disaster Recovery Plan
- Spam filtering
- Encourage employees to speak up if they see a weird email or link
- Bring in professional cyber security consulting
With all of these items and a few more in place, you make it much more difficult for a cyber-criminal to get into your network and steal your data. This in turn will help keep your data and that of your employees off of the Dark Web. Of course, nothing is foolproof and that is why an exceptional cyber-security partner should offer Dark Web monitoring.
Dark Web monitoring is a program some IT professionals offer businesses where scans are going on constantly in the background and are looking for a specific domain. When the scan recognizes your domain in a database, it flags the software and you are alerted to change passwords or address the breach.
This way, you are always a step ahead of the criminals without lowering yourself to the “Dark Web” itself.
We hope you found this first installment in our Dark Web series helpful. Look out for our next article in February focused on 5 ways you can keep your information off of the Dark Web entirely.
The post What is the Dark Web and why it matters for your business appeared first on Andromeda Technology Solutions.FBI Sheds New Light On Ransomware Tactics Jan 07, 2020
According to a recent FBI alert marked "TLP: AMBER," businesses should be on high alert for ransomware attacks.
The alert reads, in part, as follows:
"Since January 2019, LockerGoga ransomware has targeted large corporations and organizations in the United States, United Kingdom, France, Norway, and the Netherlands. The MegaCortex ransomware, first identified in May 2019, exhibits Indicators of Compromise (IOCs), command and control (C2) infrastructure, and targeting similar to LockerGoga.
The actors behind LockerGoga and MegaCortex will gain a foothold on a corporate network using exploits, phishing attacks, SQL injections and stolen login credentials."
The alert also states that the attackers behind these two ransomware strains often wield Cobalt Strike tools, including Cobalt beacons to gain remote access.
Once the attackers gain a toehold inside a target network, they'll carefully explore and map the target network, seeking out the most sensitive information including proprietary company data, payment card information and other customer details and the like.
The goal here is to identify the highest value information that can be exfiltrated to the command and control server for sale on the black market. Finally, when all of the most valuable information has been siphoned from the network, the hackers will trigger the ransomware itself, which they'll use to gain an additional payment, extorting the affected organization.
The FBI also reports that hacking operations carried out by nation-states often deploy ransomware to make it appear that the attack is the work of traditional cybercriminals, throwing forensic investigators off of their trail.
The process of network mapping and exfiltrating valuable data can take weeks or even months, depending on the size of the network. So, organizations may be infected long before the visible signs of the attack become evident. Given that, it's more important than ever to have robust security system in place. You should have remote backups taken at regular intervals and a rapid response plan in place in the event of a breach.