What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Service Coordinator(SC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Palatine, IL Businesses:
What A Few Of Our Clients Have To Say
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
Your Company Laptop Was Stolen – Now What? May 29, 2018
It’s another Tuesday in the airport, and you just cleared the TSA line and went to the pretzel shop for a quick bite before you catch your plane. You sit your laptop down to get a straw, and the next second…your laptop is gone. It’s not in sight, nor is the thief who stole it.
At first you’re confused, then the confusion starts to fade away and you realize that this wasn’t just a personal laptop. It was your work computer and had company files, sensitive information and access to company data that definitely doesn’t belong in anyone else’s hands.
But what do you do?
What To Do When You Can’t Find Your Stolen Laptop
Stolen Laptop Step 1: Get in touch with your IT team
Whether you outsource, have internal IT staff or a mixture of both, your first step is to alert your IT support teams of the incident. Time is critical on this.
Even if you have a password on your laptop, which will likely prevent the thief from immediately having access to your private documents. It won’t stop someone removing the hard drive from your laptop and connecting it to another computer. Suddenly your hard drive is sitting there, ready to browse – just like any other folder or drive letter.
Your IT Staff/Vendor should be installing encryption and remote management software on all remote devices. With proper encryption, your data is secure AND with remote management, your IT staff can wipe the stolen laptop before any damage is done.
Without this encryption software and remote management, you’d be forced to report any theft like this as a data breach. That means the government knows about it, your employees need to be made aware and worst of all – you have to alert clients.
This is why in this instance, you call your tech staff first.
Stolen Laptop Step 2: Contact the Police and file a report
The next best thing to do in situations like this is to immediately file a police report for the stolen laptop. Having a police case number can help with any insurance and/or recovery endeavors that come up. Plus, having a police report can help catch the criminal who stole your sensitive devices.
Stolen Laptop Step 3: Change Your Passwords
If you don’t have encryption and even if you do – it is smart to change passwords to all personal, professional and financial accounts. Additionally if you used this computer to pay bills, check banking information or for any type of financial transactions, you’ll want to make sure to check those accounts.
Stolen Laptop Step 4: Recover Your data on another device
This step also involves your IT staff/company. Hopefully you’re IT pros have all of your company data backed up and readily available. It is important that you synch your portable devices regularly so that in ANY incident of failure or theft, you can be restored quickly without too much interruption.
To make sure that you’re covered on this front, we’d suggest requesting regular tests of your backups anyway. That way, no matter the issue, you know your data is secured, backed up AND ready to deploy in an emergency or urgent situation.
There are many steps you’ll want to take after a theft occurs but with proactive IT support you won’t have nearly as many headaches to deal with.
These things happen more often than you’d think too.
On average a laptop is stolen every 53 seconds!
So – take the following actions and get ahead of the issue before a stolen laptop happens.
- Find out if your company’s remote devices are encrypted with the ability to wipe all data on command
- Make sure that you train employees with remote devices not to leave them unattended and to lock them in the trunk of their cars instead of leaving them in a front or backseat.
- When travelling put your laptop on the TSA conveyer belt last – that way it is less likely to remain unattended.
- Look into your company backups and business continuity protocols.
- How often are they tested?
- How often are remote users synching and backing up data?
- How long will it take to restore a PC when you need it?
Our team is here to help you set up and manage any of the technical details listed above.
In fact, fill out the form below or call the office to receive 10% off of your initial setup fees for our remote encryption software!
Just mention the code “Encrypt4Me” when you call (815) 836-0030 or fill out the form below.
The post Your Company Laptop Was Stolen – Now What? appeared first on Andromeda Technology Solutions.4 Key Questions Any Business Owner Should Ask Before Performing A Cloud Migration Sep 28, 2018
The solutions, procedures and technologies business owners and staff depend on are continuing their move to the cloud at a steady pace.
Predictions and trends point to over 80% of all enterprise workflow to be managed by the cloud by 2020.
While total adoption of cloud in the workplace is still believed to be 10 or more years away, the benefits to business are clearly driving the adoption of cloud technologies and solutions.
This does not mean that you should perform a cloud migration just because everyone else is doing it. You want to make sure that when you migrate different elements of your business to the cloud, you are doing so in the most secure, compliant and pain-free ways.
That being said, there are some questions you should really ask yourself when planning for or considering your migration.
4 Key Questions About Cloud Migration
1. What are the long term costs for my IT when I migrate to the cloud?
There are quite a few different aspects of your budget that a cloud migration can impact. The first thing you will want to consider is the overall cost of the project. For example, if you have a server and you are considering the costs of a cloud migration vs. buying new hardware, there are a few things you want to look into.
- What is the physical cost of the hardware including labor for install and setup?
- What is the initial setup and migration cost if you move to the cloud?
- What are your anticipated maintenance costs for a physical server over the next 3-5 years?
- What are the maintenance costs and recurring costs for your cloud environment for the next 3-5 years?
- If you stick with an on-prem solution, how long until you have to replace your new hardware on average?
All of these questions you should ask yourself and your IT vendor/department when considering the cloud. Often, when you take long term maintenance and hardware replacement into consideration, you will end up being more cost effective with a cloud solution. But, this is not always the case.
2. What areas of our business will see benefit from a cloud migration?
The cloud has offered many benefits to business. The cloud environment lends itself to collaboration in many ways. Staff will likely enjoy the ability to access data, software and systems remotely. Departments will notice that different integrations are easier when software is in the cloud as well. Companies like Zapier, IFTTT and even Microsoft with Microsoft Flow are in the business of helping you integrate workflows and get a whole lot more done.
This means more productivity, automating repetitive tasks and hopefully better results for both your employees and clients.
3. Do you have specific security/compliance requirements?
Different industries have specific security requirements and compliance standards for data. This means that you will want to consult with experts in your industry to make sure that the solutions you choose are above board.
For instance, if you chose to migrate your email server to a hosted cloud solution, you still need to make sure that the email service is secure. Solutions like G Suite and Office 365 state in their user agreements that they are responsible for the security of the cloud environment but that YOU are responsible for all of your data.
Meaning – Microsoft or Google makes sure the cloud is secure, YOU make sure that you have backups of your emails and all of your data in case of emergency.
Additionally, if your industry has requirements for sending secure/encrypted emails, you’ll want to make sure that the solution you choose meets said requirements.
This was just an example of how security and compliance can impact your choice of cloud email solution. Depending on what you want to move to the cloud (infrastructure, software, OS etc.), you will want to consult with industry experts to ensure success.
4. Public, Private or Hybrid Cloud Solutions?
On the surface, the concept of public or private cloud solution is straight forward.
A public cloud is owned by a company like Microsoft (Azure) or Amazon (AWS). This company owns the physical space where the ‘cloud’ is hosted. In a public cloud, your business essentially leases space to host your environment. This space is technically shared but can be segmented for security purposes.
This decreases your overall time and material cost for maintenance of the environment. You access services and can manage your account by logging in from your internet browser. These public solutions are best for email solutions, office software, applications, testing environments, development environments and more.
A private cloud is owned and managed by one specific entity (either you or your IT service provider). There are no other businesses sharing your space or stored on the equipment. This is definitely a more secure solution for highly regulated industries.
A benefit with privately hosted cloud environments is that they are more customizable for specific business needs. Additionally, a private cloud is easily scaled to grow with your needs – you will just have to account for any additional hardware or bandwidth needs as you grow.
A hybrid cloud solution is a mixture of any or all solutions including: on-premises solutions, public cloud and/or private cloud.
For some industries, there may be specific elements of the business that must remain on site. In other instances, you may have proprietary software that just isn’t cloud compatible or doesn’t make sense to migrate.
You may also have certain needs that make sense to offload into a public environment where you aren’t responsible for maintenance.
The beauty of cloud migration solutions for business is that they are highly customizable. They help you get more done and stay connected in innovative ways. There is a reason that technology is steadily migrating to the cloud across our professional and personal lives.
If you have any questions about the cloud or want to discuss how the cloud can elevate your business, please give us a call at (815) 836 – 0030 or send an email to Contact@WeNetwork.com. Our team is ready and eager to help you.
The post 4 Key Questions Any Business Owner Should Ask Before Performing A Cloud Migration appeared first on Andromeda Technology Solutions.Many Android VPN Apps Contain Malware�Or Exploitable Weaknesses Feb 08, 2019
If you're like many seasoned 'Netizins, you probably rely on some type of VPN to help ensure your digital privacy.�Unfortunately, based on research conducted by Simon Migliano, you could very well be wasting your time.
Mr. Migliano is the head of research at Metric Labs and is a respected name in the industry.
He and his team have conducted an extensive survey of the top 150 VPN Android apps on Google's Play Store, and the results are depressing to say the least.� A full twenty percent of those apps have been flagged as potential sources of malware, and more than a quarter of them have deal-breaking privacy bugs including DNS leaks. Those leaks expose user DNS queries to their ISPs.
Perhaps most troubling of all, however, is the fact that taken together, these problematic apps have been downloaded more than 260 million times. That means there are legions of people who probably think they are secure, who simply aren't.
Granted, some of the issues Migliano's team found were relatively minor.� Many of the apps in question are guilty of asking for highly aggressive permissions, which give the app (and the company controlling it) more information than they need about you. This includes how, when and where you use your device.� Even so, of the top ten free VPN apps currently available on the Play Store, seven of them have DNS leaks, including popular titles like:
- Super VPN
- Hi VPN
- Turbo VPN
- VPN Master
- Snap VPN
In fact, of the top ten, the only app tested that had neither VPN leaks nor risky functions was Hotspot Shield Basic.� It's worth keeping the name of that app in mind if you are currently using something else, and it may be worth your time to make the switch.
Kudos to Migliano's team for their diligent research!