- Long-term MSP (Managed Services Provider) for all your IT, phone, and security needs
- "Special needs" implementer to augment the day-to-day tasks of an internal technical staff (e.g., initial setup of a new server or new phone system)
- Reliable "go to" solution provider for the occasional break-fix issue (HelpDesk and dispatchable techs)
Managed IT Services
…and your budget!
In an MSP role, Andromeda offers a range of service plans—anything from month-to-month "time & materials" based assistance to fixed service contracts that permit "no-brainer" conformance to an annual budget. We even offer V.I.P. plans which permit you to "jump the queue" for HelpDesk and remote technical support assignments! Beyond the functions you would expect from a full-service MSP:
- Reliable & Fast Hybrid System Backup / Business Continuity Solutions
- Fast Data Recovery
- Network Management including 24/7/365 monitoring
- Virtual CIO role
- Security (spam control, anti-malware, containment & cleansing)
- End-to-End Internet Access & Web Hosting
- Email Account Setups, Mobile Syncing, Hosting, Archiving, and Cloud storage/services in New Lenox, IL (e.g., Microsoft Office365 setups)
- Software Application Deployment & Database Repair
- Automated Patching
...Andromeda can offer so much more: a single, expert source for a full range of physical security systems which can (and should) freely interact with your data network:
- Telephone systems—both hosted VoIP and traditional on-premises
- Building/Door Access Control
- Security Camera Systems and Video Surveillance
- Burglar Alarm System Installation & Monitoring
So, not only can we provide professional service for the full gamut of physical security needs of your growing organization, we are uniquely positioned to integrate those systems with any elements of your data and voice network. It is this integration that extracts the full power and usefulness of these systems for your organization.
- System design (for new networks or expansion of existing ones)
- Ordering/delivery/installation of network components
- In-wall & in-ceiling wiring & access boxes in new or existing structures
- Integration with your current network, security systems, alarm systems, door access…
- Computer configurations, email/network accounts, firewalls, security software…
- Complete system testing and staff training
But our job doesn't stop there. Once your network is operational, we can continue to support you with preventive maintenance packages, innovative approaches to data backup, virus and Malware control, and anti-spam solutions.
Computer Network Infrastructure – Switches, Routers and Firewalls
Having a solid network infrastructure is critical to keeping your systems running well and with minimal downtime. Truly, a $20 network switch from the retail store down the street or the guy you know that "does some wiring on the side" is not going to get you where you need to be. Neither are onsite-only or Cloud-only backup solutions!
Knowing that IT network wiring and switches are the vital backbones of your operation, Andromeda employs only experienced technicians and uses only business-class networking gear:
HP network switches • Cisco routers • Sonicwall & Netgear firewalls
WANs, VPNs – Multiple Locations and Remote Access
We specialize in extending your network beyond the four walls of your main office. This might include remote or branch offices, mobile employees or remote access from your house for voice, video, file sharing and much more!
Wireless IT networks are quite popular and are fast becoming indispensible. However, they generally cannot achieve the same level of performance as traditional wired networks where security, reliability, and bandwidth are of premium importance. Still, a wireless network is a great solution for a few roaming laptops or tablet PCs overlaying your wired office areas. To overcome the potential shortcomings of wireless, we use HP and Cisco Wireless Access Points, and we can guide you through the do’s and don’ts of implementing a wireless network to avoid the pitfalls.
Computer Network Design and Infrastructure Wiring
Whether you are adding a few offices or doing an entire build-out from the ground up, Andromeda Technology Solutions can help. We can provide infrastructure wiring for your voice, data, TV, cameras, overhead paging, etc. Having one company to handle all your wiring needs eliminates trying to coordinate vendors, minimizes labor overlap, and decreases cost.
We are also available to assist in the design of your wiring. While architects generally do a good job with this layout, we have a unique real-world approach that tends to be more in line with what is actually needed for a working office. Involving us early in the process will minimize the chance of having to run additional wires after your construction is complete…when it's much more expensive to install!
Web/Email Hosting & Web Design
"Commodity" web and email hosting seem like great solutions…until they go down OR you need to add a new account OR remove an ex-employee's access OR countless other items that need attention more regularly than you initially imagined. Ideally, your IT service that performs these functions for you should also host your web and email accounts to avoid delays, transfer issues, and any number of other potential mishaps. Andromeda is pleased to offer comprehensive hosting plans to do just that. Through our plans, you can also choose additional premium services like website hit tracking and statistics reporting.
Andromeda is also pleased to provide web design services—anything from simple informational sites to complete new site designs featuring animation/video, multi-tiered navigation, database-backed forms and social media interaction. We also have proven expertise in the art of SEO (Search Engine Optimization)—a "must" for any company that needs to generate new business leads from its on-line presence!
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
Dark Web Series Part 1 – What Is the Dark Web & Why It Matters To You Dec 29, 2017
Ransomware, cybercrime, hackers . . .
It’s safe to say that you’ve at least heard of these terms in the news and if you are like most people, you’ve heard them over and over on the news, in the office and just in everyday conversation for the past few years.
This progression in the cybersecurity world may come with unique phrases and buzzwords but the trend itself is nothing new. Since the internet’s beginning, there have been people working to cause chaos.
Think computer viruses, Trojan horses, scams, spam, malware etc.
Like most technology, the internet is used predominantly for good. But, there are always a few bad apples who take good technology and choose to use it with less than the best intentions. And while there have always been “bad guys” out there trying to disrupt good works from being done, over the last decade and specifically in the last few years we’ve seen an incredible increase in spending, vulnerability and rates of incident for large scale cyber-attacks.
To put this in perspective, spending on cybersecurity is projected to exceed 1 trillion dollars by 2021. In 2017, information security (a subset of the cybersecurity industry) spending hit over 86 billion dollars.
On top of this, there has been a dramatic increase of incidents in the small to medium sized business arena. When a local business gets hit, it may not make the 5 o’clock news like Home Depot or Target, but it hurts just the same – and maybe even more.
The crazy thing when it comes to cybercrime, ransomware and other infections is that you can be doing regular updates, implement antivirus etc. and you still can fall victim to identity theft, breaches and other cyber incidents.
All of this cyber-security and cyber-crime discussion lays the groundwork for this Dark Web discussion.
What is the Dark Web?
First, what is the Dark Web? In a simple and brief explanation, the Dark Web is a mostly anonymous space online that you need special software to access. The experience is much like a normal internet browser but the sites and activities available are very different.
Many times the Dark Web is described using an iceberg illustration.
- The internet as we know it is what you can see above sea level.
- There is a larger space just below the surface of the iceberg where the ‘darknet’ lives, this is dominantly used for large data stores. Financial records, academic databases, government records etc. live here.
- Then there is the bottommost layer of the iceberg, this is the Dark Web – here you’ll find illegal activity like drug trafficking, illegal gun sales, and even personal data for sale.
Now, you may be thinking,
“This is interesting information but what in the heck does the Dark Web have to do with me? Why do I care about it? I don’t use it. I don’t know anyone who does. . .” And we get that, but even if you don’t use the Dark Web you may be on it.
The Dark Web is one of the largest sources of stolen data available to criminals. While some may use it to buy goods, other criminals purchase pieces of your information like credit card information, passwords, social security information and more to use for their own purposes.
When cybercriminals go to places like your local grocery store, Experian and other sites to wreak havoc, the information they steal ends up for sale on the Dark Web.
All of this taken into consideration, the everyday consumer and business professional shouldn’t be scanning these areas of the web to try and protect their data.
Instead, a business professional like yourself should make sure that you are following proper security protocols:
- Anti-Virus Software Regularly Updated and on every device
- Proper Firewalls and regular updates
- Employee training
- Regular Professional Backups (also regularly tested and verified)
- Disaster Recovery Plan
- Spam filtering
- Encourage employees to speak up if they see a weird email or link
- Bring in professional cyber security consulting
With all of these items and a few more in place, you make it much more difficult for a cyber-criminal to get into your network and steal your data. This in turn will help keep your data and that of your employees off of the Dark Web. Of course, nothing is foolproof and that is why an exceptional cyber-security partner should offer Dark Web monitoring.
Dark Web monitoring is a program some IT professionals offer businesses where scans are going on constantly in the background and are looking for a specific domain. When the scan recognizes your domain in a database, it flags the software and you are alerted to change passwords or address the breach.
This way, you are always a step ahead of the criminals without lowering yourself to the “Dark Web” itself.
We hope you found this first installment in our Dark Web series helpful. Look out for our next article in February focused on 5 ways you can keep your information off of the Dark Web entirely.
The post Dark Web Series Part 1 – What Is the Dark Web & Why It Matters To You appeared first on Andromeda Technology Solutions.Password Quick Tips – 6 Do’s And Don’ts Oct 02, 2017
We’ve been polling our readers recently for topics of interest. Of course, cyber security and ransomware are hot topics but many of you mentioned that you are interested in quick tips you can follow or use yourself.
You ask – we deliver.
Without further ado – check out these 6 quick tips for best password practices
- Create passwords with multiple cases, symbols and numbers. Just be sure to avoid passwords such as “123456”, “qwerty”, “football”, “princess” or “password” – some of the most common passwords in 2016 according to SplashData.
- Don’t create a password based on personal details such as your birth date, an anniversary, phone number, social security number etc. While not everyone may know these details about you, they are among the first a cybercriminal or evildoer will attempt when trying to hack your account. Even worse, if your password data is compromised, imagine what a cybercriminal could do with that social security information if it was exposed.
- Avoid using the same password on multiple sites. We get it, remembering different passwords for all of your different sites and needs is difficult. It is important to create something unique for every login you maintain. Remember, if a hacker gets ahold of your password for one account, the first thing they will do is try that bad boy on bank accounts, social media, emails and anywhere else they can to grab sensitive information or even your hard earned money.
- Change your passwords regularly. We suggest changing passwords every 90 days. This can be a pain but if you maintain this practice you make getting into your accounts that much harder.
- Do Not keep a list of your passwords on your computer. Keeping a list of passwords is dangerous in any format. You open yourself up to great risk in doing so. The worst method for this is keeping a list of your passwords in a file on your computer. Instead, keep a list of each site and next to it write a specific clue that will only make sense to you. This can help jog your memory without spilling the beans if someone stumbles upon the file.
- Use Dual Authentication. Many apps and sites now offer dual authentication as an added security measure. Once you login to your account, you will be prompted for a code (either one you create or a randomly generated code). You put this code into the site as a second proof of your identity. This feature greatly reduces if not eliminates the likelihood of someone breaking into your accounts.
Password protection is difficult. The average Joe has anywhere from 20-200 passwords. We recognize that is a big gap but even memorizing 20 different passwords is a difficult task. With that said, we would like to provide you with a few useful tools that can free up your memory and manage your password security for you.
There are a variety of password managers on the market. We have used and enjoyed LastPass which comes with a free and premium subscription as well as an app for your phone. If you want to check out a variety of password managers and how they stack up – PC Magazine released their “Best Password Managers of 2017” earlier this month.
Password Security Tests
Platforms and websites do exist that will check the security of your password. There are even some websites out there that will tell you how long a hacker would have to spend to crack your code. Check out our recommended tool here .
Email Alias Tools
We’ve found an interesting tool that can help you keep track of your passwords but also creates aliases for your email address. This is useful because without your email address, a password is essentially useless. Now, of course you don’t want someone to have your password at all but this also helps you keep your inbox clear of spam and unwanted mail.
Any of these tools can help you out. If you have any questions feel free to reach the Andromeda Team Today!
The post Password Quick Tips – 6 Do’s And Don’ts appeared first on Andromeda Technology Solutions.Weird Sounds Coming From Your Speakers? Could Be A Hacker Jan 18, 2018
Have you been hearing strange, otherworldly sounds on your Bose or Sonos speakers? If so, rest assured that your speakers aren't haunted. They've likely been hijacked by hackers.
Researchers at Trend Micro have confirmed that some models (the Sonos Play:1, the Sonos One and the Bose SoundTouch) of both brands of speakers are vulnerable to hacking if the speaker is connected to a misconfigured network.
If the hackers find such a speaker, they can take control of the speaker and direct to play any audio file hosted at a specific URL.
It should be noted that this is an extremely exotic, fairly elaborate hack, and one that's not likely to gain the hacker much, if anything in the way of useful information about the target network.� Overwhelmingly, if and where this hack is seen at all, it will be used to play pranks on the target. About the worst thing that could happen is that the hacker would play a particularly annoying or alarming sound (a woman screaming, glass breaking, a baby crying or similar), which might lead to some sleepless nights or confusion, but not much else.
Even so, it's worth making note of, because if a hacker is able to take control of a speaker connected to your network, it means that there's a misconfiguration somewhere that could lead to a more serious hack down the road. If it happens to you, it's well worth reviewing your network setup and security settings.
A spokesman for Sonos had this to say about the hack: "...looking into this more, but what you are referencing is a misconfiguration of a user's network that impacts a very small number of customers that may have exposed their device to a public network. We do not recommend this type of set-up for our customers."
Interestingly, this isn't the first time such a hack has been seen. In 2014, a developer created a hack that went by the name "Ghosty" that did more or less the same thing.