What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Account Coordinator(AC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Oak Brook, IL Businesses:
What A Few Of Our Clients Have To Say
Andromeda IT Service Offerings
Here is just a quick list demonstrating the breadth of IT services you can expect from Andromeda:
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
Ransomware, Disaster Recovery and Business Continuity: What Every Small Business Should Know Aug 30, 2019
The last few years have seen a large increase in ransomware incidents and 2019 has surely followed suit with many industries impacted. In the last few months manufacturing, municipalities, school districts and other small business sectors have all dealt with their share of attacks. Tens of townships in Texas were attacked in August 2019 with a total ransom of over 2.5 million dollars. School districts across the US were targeted for student and faculty data.
It’s been a rough one to say the least.
The best defense against ransomware for yourself and your business is still education and Andromeda can help with that. Read on to learn more about the threat of ransomware to your business and what you can do to prepare yourself.
Ransomware is a type of malicious program that encrypts a segment or all of your data. At that point, the data can only be decrypted with a key. The criminal ransoms your data until you pay them to decrypt it.
This means that whatever they get their hands on, is no longer of use to you until you pay up. Things like accounting information, client information, HR information – anything data related at the business.
With more and more incidents on the rise, it is important that you proactively defend yourself against this threat and have a plan in place to respond in case your business faces a ransomware incident of its own.
Employee Cyber Security Training
Over 90% of cyber security incidents facing businesses today originate with some kind of human error. Your staff and teammates don’t mean to make these mistakes and an honest error can happen to anyone. Clicking on a bad link, falling for a scam online, downloading an infected file – these things happen to the best of us.
Tricking you into downloading malicious files to your PC is still a method criminals use to try and get into your computer but the primary two methods to gain access and do damage to your systems in 2019 are via third party data breaches (learn more about third party breaches here and phishing email attacks (learn more about phishing scams here .
To help your employees stay ahead of criminals and defend your business, you want to invest in regular training for the team. Professional cyber security training programs include simulated phishing email tests, individual scores, weekly quizzes, newsletters and more.
Data Backups & Disaster Recovery Planning
Employee training will do a good job at helping your staff defend the business but there is still always a chance that ransomware can happen.
When it comes to ransomware, there is little you can do to remove the damages. There is no ‘debug’ or troubleshooting technique that will make it go away. To get the encrypted data, you have to have the decryption code.
The only alternate solution available to you would be to restore from a backup. That way, you don’t need to decrypt anything. Of course, this is dependent on the quality and safety of your existing backups.
We recommend looking for a backup solution with an on premises copy as well as a secure cloud copy of your data backups.
The best data backup and recovery solutions take regular snapshots of your environment. Even better solutions can spin up a virtual ‘copy’ of your environment so you can keep working while your IT team works in the background to get systems back up and running like normal.
Make sure to ask the team or individual who handles your backups how often they test them. It’s also good to have a clear understanding of what it takes to get you back up and running in the event of an incident (what does it look like if we have an equipment failure? How do you respond if we are hit with ransomware?).
Training staff on how to avoid scams and criminal tactics online is a great way to defend against Ransomware and other incidents.
Having a good data backup and disaster recovery plan is what you want to do to make sure your business can handle this type of attack.
The final piece of the Ransomware puzzle for now is going to be your business continuity plan.
When it’s said and done, you are most likely going to experience some amount of downtime in the event of a Ransomware attack. It’ll take time to recognize what is happening, to contact the proper parties (IT staff or your outsourced team and decision makers), respond to the incident etc.
All of this time costs your business money, productivity and opportunities. This is why many vendors suggest coming up with Business Continuity plans for different types of incidents at the office.
Have a plan for equipment failure (like a server crash), a plan for a major cybersecurity incident (ransomware across the network), have a plan for minor cybersecurity incidents (single user hit with malware or a virus). You get the idea.
Some great questions for Business Continuity plans:
- How does my business or staff respond to this incident?
- Do you unplug workstations?
- Does the employee call you first or IT?
- Is there anything you should do on site while your IT team gets to work?
- How long will it take to get us back up and running? (this will differ depending on what you face)
- How do we keep the business running while designated teams respond?
- Can we make use of the cloud?
- Do we need to work from pen and paper while things resolve?
A professional team will help you work through these questions and come up with the solutions your specific business and business model needs to keep things running in the event of a disaster, accident or incident.
The key is really in the preparation.
If you have any questions about any of the topics above or want to discuss your own disaster recover, data backups or business continuity plans, please give us a call at (815) 836-0030 or contact our team via email at Contact@wenetwork.com.
The post Ransomware, Disaster Recovery and Business Continuity: What Every Small Business Should Know appeared first on Andromeda Technology Solutions.Stop These 3 Hazardous File Sharing Habits Yesterday! Jan 03, 2020
File sharing is an essential portion of any business. It is the way we get information from one person to another. BUT, it can also be the way hackers gain access to your sensitive information – files or, worst of all, confidential data.
If you’re using Dropbox, OneDrive, Google Drive, or other consumer-grade file sharing and cloud sync applications – or if you depend on file sharing of any kind to run your business (hint . . . you do)- listen up!
Here are 3 habits you should break yourself and your staff of immediately.
Top 3 File Sharing Habits to Break
1) Using Consumer Grade Solutions . . .
Consumer grade solutions are just that . . . consumer grade. You aren’t a ‘consumer’, you’re a business owner with sensitive data to protect. With more and more employees/businesses depending on BYOD (Bring Your Own Device) as well as the ability to access files any time & any place, it is important that your file sharing system is professional grade. Look for enterprise grade security options like SSL Encrypted Transfer, Firewall Protection, Password Protection and Virus Scanning.
2) Emailing Files Without Proper Encryption . . .
You may not care if a hacker gets a hold of your grocery list or photos of the family dog, but when it comes to confidential data such as financial statements, medical records or other sensitive materials, it is safe to say you cannot afford criminals sniffing through your files. For this reason, NEVER send files via email without proper encryption. Business grade email and proper practices can nip this in the butt. You’d be amazed how many files fall into the laps of cyber criminals this way though.
3) Using Flash Drives…
You spend time and hard earned resources to protect your network from outside threats . . . only to destroy everything when you innocently plug in an infected flash drive you picked up innocuously enough at a trade show. Flash drives bypass security systems you have in place and may run automatically without being checked for infection by your antivirus solution. If you must continue using flash drives . . . at a minimum update your antivirus to prohibit autorun and mandate scans to all USB-attached devices when plugged into your PCs.
The post Stop These 3 Hazardous File Sharing Habits Yesterday! appeared first on Andromeda Technology Solutions.New Google Translate Feature Rolled Out For Android Users Mar 31, 2020
Google Translate is one of the company's most popular services, and most of the people who use it dream of the day when it's a full blown Universal Translator. While that's obviously still quite some distance away yet, the company has been steadily improving their offering. They recently upped the ante further with a new "almost real time" transcription feature that takes recorded audio and turns it into translated text.
The company showed off an early version of this new AI-powered feature in January, and after a few additional rounds of tweaks and improvements is now rolling it out for their Android customers. Sorry Apple users, you'll have to wait a bit to test drive the new feature!
At present, the new transcription service only works with the following languages:
Given that, it's quite a bit more limited than the text to text translate service, but Google promises that more languages will be added as time goes by.
Essentially, the Google engineers behind the new feature stacked an AI driven translation routine on top of a real time speech recognition engine to create the new service. Our initial tests of it have been impressive indeed.
No matter what business you're in, if you have partners or customers around the world, this is an incredibly handy service, and one you'll enjoy playing around with. We think you'll love it and it won't be difficult at all to find any number of real world use cases for something like this.
We can hardly wait to see what further enhancements the folks at Google have in store for the service but even in its current form, we're sure you'll be impressed. Check it out today.