What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Service Coordinator(SC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Orland Park, IL Businesses:
What A Few Of Our Clients Have To Say
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
4 Cybersecurity Tips For Business Owners & Managers Nov 05, 2018
New cybersecurity stories hit the news every day. You’ve surely heard about large companies getting hacked or ‘breached’, passwords stolen, identities compromised and more.
The topic of cybersecurity gets brought up so much, it’s no surprise that it has become a kind of background noise in the business world. Warnings about security protocols, new viruses and ransomware scams are just the tip of the iceberg when you look into what is happening in the IT security world.
While the news stories keep coming and businesses continue falling victim, there is at least one thing that remains the same . . . the need for cybersecurity training and awareness is here to stay. If you are in business, you have data that cybercriminals want to steal. Simple as that.
Cybersecurity conversations and solutions don’t have to be daunting though. In fact, there are some quick, common-sense tips you can put into place that will make you and your business a harder target for those looking to do you harm.
Top 4 Cybersecurity Tips For Professionals
1. Use Unique and Strong Passwords For All Online Accounts
This tip is one you’ve surely heard many times before but over 85% of all adults reuse their passwords online. On top of that, most people don’t know how to create a truly strong password. Some characteristics of a strong password are:
- Minimum of 8 characters
- A mixture of uppercase and lowercase letters
- At least one number
- At least one special character (!@#$%^&)
- No personal details (pet names, family member names, birth dates, address info etc.)
The average adult has over 100 different accounts online (bank accounts, credit cards, social media, email, apps etc.). It’s understandably difficult to create and remember a different password for everything you do though.
What to do about it? Look into a password manager tool for yourself and your staff. A password manager will store and organize all of your unique passwords securely. Here at Andromeda, we recommend LastPass. It has some great features and is a trustworthy password management tool. If you have questions about that, feel free to reach our team.
2. Run A Network Security Audit At Least Once A Year
You can’t address things if you don’t know they are broken. An annual network security audit done by a third party IT support partner will give you visibility into the small cracks hiding in your network security.
This type of audit should check things like open ports on your firewall, password protocols, your backups, your disaster recovery plan, the status of your warranties, your antivirus and spam protocols and more.
You can engage your current IT services provider for this audit or look for a third party vendor to come in and take a fresh look at your setup.
It never hurts to get a new set of eyes on your setup. Andromeda provides these types of assessments to our clients with our professional 35 point network security assessment. If you’d like to speak with our team about this service, give us a call at (815) 836-0030 or send an email to Contact@WeNetwork.com
3. Regularly Test Your Backups and Disaster Recovery Plan
One of the top methods a cybercriminal uses to make money is ransomware. Ransomware is classified as a cyberattack where a criminal gains access to your network (through brute force or stolen employee email/passwords). After accessing the network, the criminal then encrypts all or a portion of your business data and locks you out of it. The only way to recover the data is to pay a ransom (often in the form of bitcoin or other cryptocurrency). If you don’t pay up – they destroy your data.
These types of attacks cause serious damage. Businesses lose big money due to down time, reputational damage and in some cases, even government fines (in worst cases where evidence that a business intentionally ignored or neglected their data security, victims of ransomware/cybercrime can even face jail time).
Imagine that, you’re the victim of a cyberattack and you have to pay the government fines on top of it all?!
Ransomware and cyberattacks happen, there is almost no way to avoid them 100% of the time. But, with a proper disaster recovery plan including regular data backups (on site, in the cloud and off site) you can quickly and calmly restore your business data and win against cybercrime.
Don’t just accept anyone’s word when it comes to verifying your backups though. You should be sure that whoever is maintaining your backups and disaster recovery is running regular tests and providing you proof of valid backups. You should also run a demo scenario at least twice a year to test how long it would take you to be back up and running in the event of a breach or equipment failure.
4. Employee Cybersecurity Training Is Key To Your Defense
Cyber security is constantly changing and new attack strategies show up regularly. The one thing that shouldn’t change for you though, is your commitment to ongoing employee training.
After all, the #1 threat to your office network security is actually your employees! The staff are the people who will accidentally visit an infected site, click a bad link, download a file with a virus etc. and the only way to help stop those behaviors/accidents is through education and proper training.
A good employee training program will offer ongoing training and support. It may also score and rank your employees/office based on performance etc.
At Andromeda, we offer our clients an employee cyber security training in an online program. This allows employees to go at their own pace and complete training in the office or on the go. This solution provides weekly tech tips, training videos, micro quizzes, individual employee risk scores and more.
Make sure to look into training if your organization isn’t already offering this to employees. This really is a must have solution to protect your office.
These are only 4 tips you can use to improve security at the office. There are many more but if you cover these bases you have a great start.
If you have any questions related to cybersecurity or IT at the office, give our team a call at (815) 836-0030 or send a message to Contact@WeNetwork.com. We are always here to help you!
The post 4 Cybersecurity Tips For Business Owners & Managers appeared first on Andromeda Technology Solutions.Your Company Laptop Was Stolen – Now What? May 29, 2018
It’s another Tuesday in the airport, and you just cleared the TSA line and went to the pretzel shop for a quick bite before you catch your plane. You sit your laptop down to get a straw, and the next second…your laptop is gone. It’s not in sight, nor is the thief who stole it.
At first you’re confused, then the confusion starts to fade away and you realize that this wasn’t just a personal laptop. It was your work computer and had company files, sensitive information and access to company data that definitely doesn’t belong in anyone else’s hands.
But what do you do?
What To Do When You Can’t Find Your Stolen Laptop
Stolen Laptop Step 1: Get in touch with your IT team
Whether you outsource, have internal IT staff or a mixture of both, your first step is to alert your IT support teams of the incident. Time is critical on this.
Even if you have a password on your laptop, which will likely prevent the thief from immediately having access to your private documents. It won’t stop someone removing the hard drive from your laptop and connecting it to another computer. Suddenly your hard drive is sitting there, ready to browse – just like any other folder or drive letter.
Your IT Staff/Vendor should be installing encryption and remote management software on all remote devices. With proper encryption, your data is secure AND with remote management, your IT staff can wipe the stolen laptop before any damage is done.
Without this encryption software and remote management, you’d be forced to report any theft like this as a data breach. That means the government knows about it, your employees need to be made aware and worst of all – you have to alert clients.
This is why in this instance, you call your tech staff first.
Stolen Laptop Step 2: Contact the Police and file a report
The next best thing to do in situations like this is to immediately file a police report for the stolen laptop. Having a police case number can help with any insurance and/or recovery endeavors that come up. Plus, having a police report can help catch the criminal who stole your sensitive devices.
Stolen Laptop Step 3: Change Your Passwords
If you don’t have encryption and even if you do – it is smart to change passwords to all personal, professional and financial accounts. Additionally if you used this computer to pay bills, check banking information or for any type of financial transactions, you’ll want to make sure to check those accounts.
Stolen Laptop Step 4: Recover Your data on another device
This step also involves your IT staff/company. Hopefully you’re IT pros have all of your company data backed up and readily available. It is important that you synch your portable devices regularly so that in ANY incident of failure or theft, you can be restored quickly without too much interruption.
To make sure that you’re covered on this front, we’d suggest requesting regular tests of your backups anyway. That way, no matter the issue, you know your data is secured, backed up AND ready to deploy in an emergency or urgent situation.
There are many steps you’ll want to take after a theft occurs but with proactive IT support you won’t have nearly as many headaches to deal with.
These things happen more often than you’d think too.
On average a laptop is stolen every 53 seconds!
So – take the following actions and get ahead of the issue before a stolen laptop happens.
- Find out if your company’s remote devices are encrypted with the ability to wipe all data on command
- Make sure that you train employees with remote devices not to leave them unattended and to lock them in the trunk of their cars instead of leaving them in a front or backseat.
- When travelling put your laptop on the TSA conveyer belt last – that way it is less likely to remain unattended.
- Look into your company backups and business continuity protocols.
- How often are they tested?
- How often are remote users synching and backing up data?
- How long will it take to restore a PC when you need it?
Our team is here to help you set up and manage any of the technical details listed above.
In fact, fill out the form below or call the office to receive 10% off of your initial setup fees for our remote encryption software!
Just mention the code “Encrypt4Me” when you call (815) 836-0030 or fill out the form below.
The post Your Company Laptop Was Stolen – Now What? appeared first on Andromeda Technology Solutions.Yahoo Is Compensating Victims Of Their Massive Data Breach Nov 07, 2018
Yahoo has the dubious honor of having been on the receiving end of the largest data breach in history. As a consequence, the company has recently agreed to pay $50 million in damages and provide free credit monitoring services to its impacted users.
The company actually suffered a pair of breaches in 2013 and in 2014, although this information was not disclosed by the company until 2016.� All of the company's 3 billion users were impacted, and more than 200 million of them saw losses arising from that breach.
The compromised data included: usernames, email addresses, dates of birth, security questions (and their answers) backup email addresses, and phone numbers exposed.
The particulars of the settlement are as follows:
- Yahoo pays $50 million to users whose accounts were compromised
- Yahoo pays $35 million in legal fees
- People who paid for a $20 or $50 a year for a Yahoo Premium account will be eligible for a 25 percent refund
- People who had their email accounts compromised will be compensated $25 per hour for the time they spent handling issues related to the breach. Although in this case, users with documentation will see their compensation limited to a maximum of fifteen hours, while users without documentation will be limited to a maximum of five hours of compensation
- Any impacted user can request free credit monitoring, which the company will offer for two years
Verizon, which acquired Yahoo in 2017, will pay for half of the settlement cost. Meanwhile, Altaba (the company that arose from the remainder of the original Yahoo business) will pay the $35 million fine imposed by the US Securities and Exchange Commission for the company's failure to disclose the breach to its investors.
It's a landmark case, and once the deal gets final approval, notices will be emailed to affected account holders and published in People and National Geographic magazines.