- Long-term MSP (Managed Services Provider) for all your IT, phone, and security needs
- "Special needs" implementer to augment the day-to-day tasks of an internal technical staff (e.g., initial setup of a new server or new phone system)
- Reliable "go to" solution provider for the occasional break-fix issue (HelpDesk and dispatchable techs)
Managed IT Services
…and your budget!
In an MSP role, Andromeda offers a range of service plans—anything from month-to-month "time & materials" based assistance to fixed service contracts that permit "no-brainer" conformance to an annual budget. We even offer V.I.P. plans which permit you to "jump the queue" for HelpDesk and remote technical support assignments! Beyond the functions you would expect from a full-service MSP:
- Reliable & Fast Hybrid System Backup / Business Continuity Solutions
- Fast Data Recovery
- Network Management including 24/7/365 monitoring
- Virtual CIO role
- Security (spam control, anti-malware, containment & cleansing)
- End-to-End Internet Access & Web Hosting
- Email Account Setups, Mobile Syncing, Hosting, Archiving, and Cloud storage/services in North Aurora, IL (e.g., Microsoft Office365 setups)
- Software Application Deployment & Database Repair
- Automated Patching
...Andromeda can offer so much more: a single, expert source for a full range of physical security systems which can (and should) freely interact with your data network:
- Telephone systems—both hosted VoIP and traditional on-premises
- Building/Door Access Control
- Security Camera Systems and Video Surveillance
- Burglar Alarm System Installation & Monitoring
So, not only can we provide professional service for the full gamut of physical security needs of your growing organization, we are uniquely positioned to integrate those systems with any elements of your data and voice network. It is this integration that extracts the full power and usefulness of these systems for your organization.
- System design (for new networks or expansion of existing ones)
- Ordering/delivery/installation of network components
- In-wall & in-ceiling wiring & access boxes in new or existing structures
- Integration with your current network, security systems, alarm systems, door access…
- Computer configurations, email/network accounts, firewalls, security software…
- Complete system testing and staff training
But our job doesn't stop there. Once your network is operational, we can continue to support you with preventive maintenance packages, innovative approaches to data backup, virus and Malware control, and anti-spam solutions.
Computer Network Infrastructure – Switches, Routers and Firewalls
Having a solid network infrastructure is critical to keeping your systems running well and with minimal downtime. Truly, a $20 network switch from the retail store down the street or the guy you know that "does some wiring on the side" is not going to get you where you need to be. Neither are onsite-only or Cloud-only backup solutions!
Knowing that IT network wiring and switches are the vital backbones of your operation, Andromeda employs only experienced technicians and uses only business-class networking gear:
HP network switches • Cisco routers • Sonicwall & Netgear firewalls
WANs, VPNs – Multiple Locations and Remote Access
We specialize in extending your network beyond the four walls of your main office. This might include remote or branch offices, mobile employees or remote access from your house for voice, video, file sharing and much more!
Wireless IT networks are quite popular and are fast becoming indispensible. However, they generally cannot achieve the same level of performance as traditional wired networks where security, reliability, and bandwidth are of premium importance. Still, a wireless network is a great solution for a few roaming laptops or tablet PCs overlaying your wired office areas. To overcome the potential shortcomings of wireless, we use HP and Cisco Wireless Access Points, and we can guide you through the do’s and don’ts of implementing a wireless network to avoid the pitfalls.
Computer Network Design and Infrastructure Wiring
Whether you are adding a few offices or doing an entire build-out from the ground up, Andromeda Technology Solutions can help. We can provide infrastructure wiring for your voice, data, TV, cameras, overhead paging, etc. Having one company to handle all your wiring needs eliminates trying to coordinate vendors, minimizes labor overlap, and decreases cost.
We are also available to assist in the design of your wiring. While architects generally do a good job with this layout, we have a unique real-world approach that tends to be more in line with what is actually needed for a working office. Involving us early in the process will minimize the chance of having to run additional wires after your construction is complete…when it's much more expensive to install!
Web/Email Hosting & Web Design
"Commodity" web and email hosting seem like great solutions…until they go down OR you need to add a new account OR remove an ex-employee's access OR countless other items that need attention more regularly than you initially imagined. Ideally, your IT service that performs these functions for you should also host your web and email accounts to avoid delays, transfer issues, and any number of other potential mishaps. Andromeda is pleased to offer comprehensive hosting plans to do just that. Through our plans, you can also choose additional premium services like website hit tracking and statistics reporting.
Andromeda is also pleased to provide web design services—anything from simple informational sites to complete new site designs featuring animation/video, multi-tiered navigation, database-backed forms and social media interaction. We also have proven expertise in the art of SEO (Search Engine Optimization)—a "must" for any company that needs to generate new business leads from its on-line presence!
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
Why Good Camera Systems Need Great IT Pros May 15, 2017
Would you be OK with a criminal or competitor watching you and your office via your own CCTV security cameras . . . ?
Didn’t think so.
Security and camera systems, like many other technologies, are becoming more and more integrated within IT networks and infrastructure. This is great for ease of use, capabilities and increased protections. However, it can also open up additional avenues and risks for your company if managed incorrectly.
Imagine all the information someone could snag with limited access to your CCTV system.
You wouldn’t trust your IT to “some guy” (at least we hope not). You should give the same respect to your security systems. It may be a good idea to buy a system from Costco or Amazon. But those off brand systems are easily hacked and they may carry pre-installed malware. Just last year a slew of security camera systems purchased on Amazon were found to be infected and could be hijacked by hackers to access data and camera footage illegally.
In almost all cases, some part of your security camera system needs an IT professional involved to finish the job and configured correctly. You can either trust the camera guy as he fumbles his way around your network, potentially leaving easily accessed holes in your protection, or try to get the camera guy and your IT guy to coordinate and work together (what we call a scheduling nightmare). Or, you can hire a professional technology services firm that does both.
Why Chose Andromeda’s Security Cameras?
Andromeda understands the intricate relationships security technologies have with your IT. We have specialized technicians in each area. They work together with a vast understanding of the security that both your CCTV system and your network need. Also, because we sell only professional grade hardware and software (Honeywell) the chance of a hack on these pieces is much less than the cheaper no-name brands.
Security threats are everywhere these days. You don’t need to make yourself more vulnerable. Do not create a gaping hole in your enterprise via the very thing that is there to help protect you. Reach out to our team today if you are considering any security projects. We ensure that the solution you choose is right for your business needs, but most importantly, we make sure it is installed correctly and you are protected.
The post Why Good Camera Systems Need Great IT Pros appeared first on Andromeda Technology Solutions.Network Security Assessment – The Single Most Important Cyber Security Tool You Are Neglecting Every Year May 01, 2017
Why you should have a network security assessment at least once per year
Let’s face it – our digital world is under constant attack and your corporate network is one of the biggest targets out there. Why? Because it also tends to be an easy mark. Year after year we see large scale attacks against corporations, but did you know that the majority of cyber incidents occur against small business? Ask yourself, when was the last time you had a professional network security assessment? We’d like to share why assessments are an important piece of the multi-layered approach to cyber security for your business.
Let’s start by stating something that you might not expect a tech company to express. At some point, your network and computer systems WILL BE breached by some type of cyber attack. No amount of effort or software can protect you 100%. The key is to take as many steps as you can to make it less likely you will be hacked or more realistically, take as many steps to ensure that a breach can do no real or sustainable harm to your business. No approach on the market can guarantee you will never be breached and if you run into an IT firm or product that tries to make this guarantee . . . run for the hills because it just “ain’t” true.
Now, there are the obvious steps that you can take to protect yourself and make it harder on the criminals:
- good Email habits
- anti-malware software
- employee training
- a professional Disaster Recover (DR) plan/device
However, there is another tool in the arsenal that you should use regularly and that is an annual (at minimum) Network Security Assessment.
How Is A Network Security Assessment Done?
Your IT support company can do an assessment; they should then give you a risk report displaying areas that need to be tightened up. If your IT company does not perform these, it may be time to start looking into someone new. Cyber threats are more prevalent every day and it is important to partner with an IT company that recognizes this and protects your business accordingly.
We find that our assessment usually uncovers security threats and holes; even when a business has the right practices and has done their research. Cyber security is a daily battle. When we run our assessment we use the results to constantly improve the defenses of our clients. And that is why, like most things in tech, an assessment should be a regular event.
The Network Security Assessment Is Done. What’s Next?
The network security assessment itself is not the only thing to request though. It is equally important to make sure that your firm supplies you with a report of their findings. This report should be simple to understand, contain an overall score and give you a breakdown of each issue found, along with how serious those specific issues are. Ask for an action plan detailing fixes for any issues that are found. Why go through the assessment if you aren’t going to DO anything with the data?
How important and helpful are these reports? We are an IT company with a background protecting our partners from risk, we place protections in place for our partners and still find ways to improve our customer cyber safety every time we run an assessment.
Why? Because cyber security is a dynamic, ever changing landscape and you need to proactively search for issues. Don’t let yourself learn the hard way. You never want to discover there is a hole in your cyber security by way of an attack or breach.
Interested in a Network Security Assessment?
If this article has you questioning your current setup, or if you are simply interested in starting a conversation regarding the cyber security protections necessary for your business, a network security assessment with Andromeda is a great place to start. With this in mind, we will be discounting our network security assessment thru 05/31/17. Fill out the form below for access to our promotional rate and begin a discussion with one of our security experts.
Fill out the form below to receive a $500 discount on a Network Security Assessment valid for the month of May
The post Network Security Assessment – The Single Most Important Cyber Security Tool You Are Neglecting Every Year appeared first on Andromeda Technology Solutions.Virus Spread Through Facebook Messenger Mines For Cryptocurrency Jan 13, 2018
Facebook scams are fairly common occurrences, owing to the sheer size of the platform's user base. It's no surprise that there's a new one making the rounds that you should be aware of.
This latest threat was discovered by researchers at Trend Micro, and makes use of Facebook Messenger.� If you get a message containing an embedded video file saved as a zip (the file name usually appears as "video_xxxx.zip"), don't click on it, even if it's from someone you know.
This file is a modified form of a legitimate piece of software called "XMRig", an open source project that allows users to mine the cryptocurrency called Monero.
When the user clicks on this poisoned version, it will direct them to a website controlled by the hackers, in addition to quietly installing the corrupted software in the background.� Once installed, the hackers put the infected PC's processor to work for them, creating a distributed network of hash power to solve advanced cryptographic puzzles and generate new Monero "coins" for themselves.
The hackers have gone to some lengths to mask their true intentions.� The site appears to be a video streaming service, and users who click on the embedded file will actually see a video playing.� Of course, the website is also part of the C&C structure.
There are several intriguing things to note about this new threat:
- It only affects people who use the Google Chrome web browser
- It only affects PCs and Laptops.� Smartphones are not impacted in any way
- The miner software is actually controlled via the C&C server, meaning that the hackers can upgrade their malware, adding new functionality in the blink of an eye
So far, the virus has been spreading mostly in south east Asia, but has also begun appearing in the Ukraine and Venezuela.� Given the global nature of Facebook's user base, this is wholly unsurprising, so be on the lookout for it. Don't click embedded files in Messenger, even if you think you know the sender.