What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Service Coordinator(SC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Oak Lawn, IL Businesses:
What A Few Of Our Clients Have To Say
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
Password Quick Tips – 6 Do’s And Don’ts Oct 02, 2017
We’ve been polling our readers recently for topics of interest. Of course, cyber security and ransomware are hot topics but many of you mentioned that you are interested in quick tips you can follow or use yourself.
You ask – we deliver.
Without further ado – check out these 6 quick tips for best password practices
- Create passwords with multiple cases, symbols and numbers. Just be sure to avoid passwords such as “123456”, “qwerty”, “football”, “princess” or “password” – some of the most common passwords in 2016 according to SplashData.
- Don’t create a password based on personal details such as your birth date, an anniversary, phone number, social security number etc. While not everyone may know these details about you, they are among the first a cybercriminal or evildoer will attempt when trying to hack your account. Even worse, if your password data is compromised, imagine what a cybercriminal could do with that social security information if it was exposed.
- Avoid using the same password on multiple sites. We get it, remembering different passwords for all of your different sites and needs is difficult. It is important to create something unique for every login you maintain. Remember, if a hacker gets ahold of your password for one account, the first thing they will do is try that bad boy on bank accounts, social media, emails and anywhere else they can to grab sensitive information or even your hard earned money.
- Change your passwords regularly. We suggest changing passwords every 90 days. This can be a pain but if you maintain this practice you make getting into your accounts that much harder.
- Do Not keep a list of your passwords on your computer. Keeping a list of passwords is dangerous in any format. You open yourself up to great risk in doing so. The worst method for this is keeping a list of your passwords in a file on your computer. Instead, keep a list of each site and next to it write a specific clue that will only make sense to you. This can help jog your memory without spilling the beans if someone stumbles upon the file.
- Use Dual Authentication. Many apps and sites now offer dual authentication as an added security measure. Once you login to your account, you will be prompted for a code (either one you create or a randomly generated code). You put this code into the site as a second proof of your identity. This feature greatly reduces if not eliminates the likelihood of someone breaking into your accounts.
Password protection is difficult. The average Joe has anywhere from 20-200 passwords. We recognize that is a big gap but even memorizing 20 different passwords is a difficult task. With that said, we would like to provide you with a few useful tools that can free up your memory and manage your password security for you.
There are a variety of password managers on the market. We have used and enjoyed LastPass which comes with a free and premium subscription as well as an app for your phone. If you want to check out a variety of password managers and how they stack up – PC Magazine released their “Best Password Managers of 2017” earlier this month.
Password Security Tests
Platforms and websites do exist that will check the security of your password. There are even some websites out there that will tell you how long a hacker would have to spend to crack your code. Check out our recommended tool here .
Email Alias Tools
We’ve found an interesting tool that can help you keep track of your passwords but also creates aliases for your email address. This is useful because without your email address, a password is essentially useless. Now, of course you don’t want someone to have your password at all but this also helps you keep your inbox clear of spam and unwanted mail.
Any of these tools can help you out. If you have any questions feel free to reach the Andromeda Team Today!
The post Password Quick Tips – 6 Do’s And Don’ts appeared first on Andromeda Technology Solutions.5 Ways To Keep Cyber Criminals At Bay This Holiday Dec 04, 2017
The holidays are a magical time. Snow covered trees, festive lights decorating houses, time with family, parties . . . and an incredible increase in cybercrime and cyber criminals.
Didn’t see that one coming did you?
The cyber criminals think and hope so too.
While people hit the web to shop for holiday gifts, deals and plane tickets to visit loved ones, hackers are doing their best to steal your data and use it for their own purposes.
In the spirit of giving, check out these 5 quick tips to keep cyber criminals and hackers at bay during the holiday!
5 quick tips to keep cyber criminals and hackers at bay during the holiday
1. Make sure that you do your shopping at secure websites
Any time you are purchasing something online you want to make sure you are doing so from a secure website. A secure website will encrypt your information. The means that only the authorized parties (the seller) receives that information and it can’t fall into the hands of hackers or criminals.
You can tell if a website is secure by looking at the URL. If the URL begins with https:// that means it is secure. Specifically you are looking for the S after the http portion. You may also see a lock symbol. Make sure that you never enter information into a website without this. Look out for locks with warning symbols like question marks or red lines – this signals that the site is only partially encrypted and you should never trust it. Buy your stuff somewhere else.
2. Use Credit Cards instead of Debit Cards online – and probably in general where possible
There are so many different ways scammers attack your data. Think back to the big breaches of the last few years – Target, Home Depot etc. Your data can get stolen both online and at brick and mortar locations.
The most secure thing – aside from cash which obviously cannot be used for shopping online – is to shop with a credit card. Credit card companies are required to protect you from fraudulent purchases, if your account number is stolen or even if you purchase something online and it is never delivered.
The protections a consumer is guaranteed by credit cards far outweighs protections offered with debit cards and obviously, if your info is stolen, you’d much rather have that happen on a credit card than having your bank account liquidated.
3. Sign up for alerts
There are many options out there for alert programs and applications. Some let you know any time your social security number is used, some monitor your credit score and other vital information.
In regard to your credit cards and bank accounts specifically, you can have alerts sent to your email or your smartphone via text for activity. For example, you can have any purchase made on your bank card/credit card alert your phone. If that seems a bit overboard, you can set it up to alert you to purchases over a specific threshold.
Additionally, you want to make sure you are checking your bank account every day or so just to make sure nothing strange is occurring. That goes for holiday season and the rest of the year.
4. Check out third party payment systems
You’ve probably heard of PayPal but have you ever looked into why using a third party payment system like PayPal is beneficial for both the buyer and the seller?
Systems like these are middle men that help protect both sides of a transaction. The seller knows that the funds are verified but the seller also gets NO ACCESS to your account information. This is a great benefit to you. Instead of using your card and spreading your information from site to site and exposing your information to different destinations, your information is shared with one company.
Another benefit is that these third party payment options are readily available at most stores online and even at brick and mortar locations these days.
Some popular options are PayPal as mentioned, Apple Pay, Amazon Payments, Venmo, Samsung Pay and more.
5. Check Reviews and beware of the “Too Good To Be True”
It is the season for deals without a doubt. But be smart when you see an offer for something that is well below the market value.
That new iPhone isn’t going to retail for $200 no matter how great a deal they are giving you. Hate to say it but there is no free lunch and one of the best ways for criminals to get you on their sites is by advertising an incredible price for a product.
Even Amazon isn’t immune to this. Bogus retailers will advertise products that are never delivered or that have no resemblance to the pictures online. Pretty sure we have all fallen victim to that, holiday season or not.
But this time of year, make sure you read reviews. Do your research and take all the steps available to you to ensure you are protected.
We hope you have a great end of year and that you start 2018 without any personal stories about how cybercrime impacted your holidays.
If you have any further questions, feel free to reach our team and shop safe!
The post 5 Ways To Keep Cyber Criminals At Bay This Holiday appeared first on Andromeda Technology Solutions.Google Continues To Battle With Malware In Play Store Dec 06, 2018
In recent months, Google has taken steps to tighten up its processes so that fewer poisoned apps find their way into the Google Play Store.� In addition to that, the company has stepped up its efforts to ruthlessly track down and remove malicious apps whenever and wherever they are found.� By most accounts, that effort has been successful.
Sadly, it hasn't been completely successful, or as successful as they'd like it to be.� Recently, independent security researcher Lukas Stefanko pointed the company to more than a dozen malicious apps still lurking on the Play Store. Worse, taken together, those apps had been downloaded more than half a million times.
Google acted swiftly and removed the offending apps, but based on the number of downloads, the damage has certainly been done.
What's worrisome is that these apps survived for quite a long time and managed to go undetected, even after Google strengthened their processes.� Even worse, all the apps can be traced back to a single author, "Luiz Pinto," which is no doubt a pseudonym.
All of the apps were disguised as games and had interesting looking thumbnails to entice users to download them. None of them actually worked, and would crash when users would try to run them. Then the program would ask to install an additional APK (which would vary from instance to instance), but in no case was something benign installed.
All of the secondary APKs were malicious in their nature, designed to steal data in one form or another and send it back to the app's owner.
Clearly, Google has more work to do in this area, but the number of apps and downloads taken as a percentage of the Play Store as a whole are miniscule.� Even so, it's a disturbing report, especially not long after Google made headlines for improving their processes.