- Long-term MSP (Managed Services Provider) for all your IT, phone, and security needs
- "Special needs" implementer to augment the day-to-day tasks of an internal technical staff (e.g., initial setup of a new server or new phone system)
- Reliable "go to" solution provider for the occasional break-fix issue (HelpDesk and dispatchable techs)
Managed IT Services
…and your budget!
In an MSP role, Andromeda offers a range of service plans—anything from month-to-month "time & materials" based assistance to fixed service contracts that permit "no-brainer" conformance to an annual budget. We even offer V.I.P. plans which permit you to "jump the queue" for HelpDesk and remote technical support assignments! Beyond the functions you would expect from a full-service MSP:
- Reliable & Fast Hybrid System Backup / Business Continuity Solutions
- Fast Data Recovery
- Network Management including 24/7/365 monitoring
- Virtual CIO role
- Security (spam control, anti-malware, containment & cleansing)
- End-to-End Internet Access & Web Hosting
- Email Account Setups, Mobile Syncing, Hosting, Archiving, and Cloud storage/services in Summit Argo, IL (e.g., Microsoft Office365 setups)
- Software Application Deployment & Database Repair
- Automated Patching
...Andromeda can offer so much more: a single, expert source for a full range of physical security systems which can (and should) freely interact with your data network:
- Telephone systems—both hosted VoIP and traditional on-premises
- Building/Door Access Control
- Security Camera Systems and Video Surveillance
- Burglar Alarm System Installation & Monitoring
So, not only can we provide professional service for the full gamut of physical security needs of your growing organization, we are uniquely positioned to integrate those systems with any elements of your data and voice network. It is this integration that extracts the full power and usefulness of these systems for your organization.
- System design (for new networks or expansion of existing ones)
- Ordering/delivery/installation of network components
- In-wall & in-ceiling wiring & access boxes in new or existing structures
- Integration with your current network, security systems, alarm systems, door access…
- Computer configurations, email/network accounts, firewalls, security software…
- Complete system testing and staff training
But our job doesn't stop there. Once your network is operational, we can continue to support you with preventive maintenance packages, innovative approaches to data backup, virus and Malware control, and anti-spam solutions.
Computer Network Infrastructure – Switches, Routers and Firewalls
Having a solid network infrastructure is critical to keeping your systems running well and with minimal downtime. Truly, a $20 network switch from the retail store down the street or the guy you know that "does some wiring on the side" is not going to get you where you need to be. Neither are onsite-only or Cloud-only backup solutions!
Knowing that IT network wiring and switches are the vital backbones of your operation, Andromeda employs only experienced technicians and uses only business-class networking gear:
HP network switches • Cisco routers • Sonicwall & Netgear firewalls
WANs, VPNs – Multiple Locations and Remote Access
We specialize in extending your network beyond the four walls of your main office. This might include remote or branch offices, mobile employees or remote access from your house for voice, video, file sharing and much more!
Wireless IT networks are quite popular and are fast becoming indispensible. However, they generally cannot achieve the same level of performance as traditional wired networks where security, reliability, and bandwidth are of premium importance. Still, a wireless network is a great solution for a few roaming laptops or tablet PCs overlaying your wired office areas. To overcome the potential shortcomings of wireless, we use HP and Cisco Wireless Access Points, and we can guide you through the do’s and don’ts of implementing a wireless network to avoid the pitfalls.
Computer Network Design and Infrastructure Wiring
Whether you are adding a few offices or doing an entire build-out from the ground up, Andromeda Technology Solutions can help. We can provide infrastructure wiring for your voice, data, TV, cameras, overhead paging, etc. Having one company to handle all your wiring needs eliminates trying to coordinate vendors, minimizes labor overlap, and decreases cost.
We are also available to assist in the design of your wiring. While architects generally do a good job with this layout, we have a unique real-world approach that tends to be more in line with what is actually needed for a working office. Involving us early in the process will minimize the chance of having to run additional wires after your construction is complete…when it's much more expensive to install!
Web/Email Hosting & Web Design
"Commodity" web and email hosting seem like great solutions…until they go down OR you need to add a new account OR remove an ex-employee's access OR countless other items that need attention more regularly than you initially imagined. Ideally, your IT service that performs these functions for you should also host your web and email accounts to avoid delays, transfer issues, and any number of other potential mishaps. Andromeda is pleased to offer comprehensive hosting plans to do just that. Through our plans, you can also choose additional premium services like website hit tracking and statistics reporting.
Andromeda is also pleased to provide web design services—anything from simple informational sites to complete new site designs featuring animation/video, multi-tiered navigation, database-backed forms and social media interaction. We also have proven expertise in the art of SEO (Search Engine Optimization)—a "must" for any company that needs to generate new business leads from its on-line presence!
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
5 Cyber Security Features/Protocols Your Business Needs To Protect Against Scammers, Hackers & Cyber Criminals Oct 30, 2017
Sometimes it sounds like the news and cyber experts are on loop or a broken record. Every day there is a new report about cyber security, threats and the like. But while these stories and warnings may start to seem like white noise in the background, the threats are still here and they are very real.
The upside of all of this coverage and conversation is that business owners are wising up and with the topic of cyber security taking center stage, users and business owners alike are being more proactive when it comes to protecting and educating themselves.
In the spirit of education we’d like to dive a little deeper into 5 features/protocols you can set up at your office to beef up your IT Security.
Top 5 Cyber Security Features/Protocols
Multi Factor Authentication
This feature is nothing new but it is becoming more and more common across all kinds of accounts. Financial services, email, social media and other applications/accounts are making use of multi or dual factor authentication. Essentially you have a password and second form of identification to prove your identity. Sometimes this is a randomly generated code – think Facebook’s code generator.
Another type of multi or dual factor authentication uses biometric data for identity verification. Things like a fingerprint or a retina scan are examples of this type of security measure. In fact, last month we took a look at biometrics, integrated security and banking applications – read more about that here.
An Employee Training Program
Statistically over 80% of all breaches and intrusions occur after an employee error. Clicking a link in an email, downloading a malicious file, visiting an infected website . . . there are so many ways this can happen and most of the time it isn’t intentional either. The best way to prevent this from happening is an ongoing security program for yourself and employees. A good program will have a varied focus: compliance standards for personal and customer info (commonly known as pii or personally identifiable information), strategies for recognizing and avoiding email scams, proper security protocols for best practices at the office and more. In 2017 Andromeda recognized this need and released our PII Protection/Cyber Security Training Program. See full details here.
Business Grade Firewall
A good firewall is your first defense against intrusion. With proper intrusion detection and intrusion prevention settings you arm yourself against cyber criminals and hackers. On top of that, a business grade firewall solution is an important piece of hardware when you want to set up public and private networks. You definitely don’t want guests at your building or passersby accessing company documents or networks because of low cyber security protocols.
Regularly Scheduled Updates/Patching
New viruses and threats hit the market every day. On top of that, hackers and criminals discover new vulnerabilities almost as fast as developers can protect against them. This is why keeping up to date and on top of patching and updates is so important. For instance, the WannaCry virus everyone heard so much about this year took advantage of a vulnerability that had already been addressed by a Windows patch. If companies had proactively updated and maintained their updates/patches, they wouldn’t have been as vulnerable to an attack.
This ties into both firewall protocols and employee training but of course, the fewer random emails that make it into your employee inboxes, the fewer links and files you need to worry about employee’s (or even yourself) clicking on. A professional spam tool can be configured to your liking and can do a whole lot to prevent content from making it to those that might accidentally infect your network. See the photos below for a few examples of emails we protect customers from on a daily basis.
As always, Andromeda is here to help you protect yourself and your business from these ongoing threats. Take the first step today and sign up for a cyber security audit with our team of experts.
The post 5 Cyber Security Features/Protocols Your Business Needs To Protect Against Scammers, Hackers & Cyber Criminals appeared first on Andromeda Technology Solutions.Stop These 3 Hazardous File Sharing Habits Yesterday! Mar 06, 2017
File sharing is an essential portion of any business. It is the way we get information from one person to another. BUT, it can also be the way hackers gain access to your sensitive information – files or, worst of all, confidential data.
If you’re using Dropbox, OneDrive, Google Drive, or other consumer-grade file sharing and cloud sync applications – or if you depend on file sharing of any kind to run your business (hint . . . you do)- listen up!
Here are 3 habits you should break yourself and your staff of immediately.
Top 3 File Sharing Habits to Break
1) Using Consumer Grade Solutions . . .
Consumer grade solutions are just that . . . consumer grade. You aren’t a ‘consumer’, you’re a business owner with sensitive data to protect. With more and more employees/businesses depending on BYOD (Bring Your Own Device) as well as the ability to access files any time & any place, it is important that your file sharing system is professional grade. Look for enterprise grade security options like SSL Encrypted Transfer, Firewall Protection, Password Protection and Virus Scanning.
2) Emailing Files Without Proper Encryption . . .
You may not care if a hacker gets a hold of your grocery list or photos of the family dog, but when it comes to confidential data such as financial statements, medical records or other sensitive materials, it is safe to say you cannot afford criminals sniffing through your files. For this reason, NEVER send files via email without proper encryption. Business grade email and proper practices can nip this in the butt. You’d be amazed how many files fall into the laps of cyber criminals this way though.
3) Using Flash Drives…
You spend time and hard earned resources to protect your network from outside threats . . . only to destroy everything when you innocently plug in an infected flash drive you picked up innocuously enough at a trade show. Flash drives bypass security systems you have in place and may run automatically without being checked for infection by your antivirus solution. If you must continue using flash drives . . . at a minimum update your antivirus to prohibit autorun and mandate scans to all USB-attached devices when plugged into your PCs.
The post Stop These 3 Hazardous File Sharing Habits Yesterday! appeared first on Andromeda Technology Solutions.Electronic Health Record Company “Allscripts” Hit By Ransomware Feb 07, 2018
Another day, another high-profile ransomware attack.� This time, the victim was Allscripts, an EHR (Electronic Health Record) company that hospitals, pharmacies, and ambulatory centers around the country rely on.
The company's data was thought to be safe on the cloud, but that proved not to be the case. Disruptions of services were felt by Allscripts clients around the country.
At this point, reports are sketchy, incomplete, and in many cases, contradictory.� According to Allscripts, the attack only impacted "a limited number" of applications, and that they were working to restore them.� The company's statement continued with, "most importantly, to ensure our clients' data is protected.� Although our investigation is ongoing, there is currently no evidence that any data has been removed from our systems.� We regret any inconvenience caused by this temporary outage."
According to Twitter, where many of Allscripts' customers have been talking about the issue, the problem goes much deeper. Some clients reported an inability to access critical patient data now stretching into its third day, with predictable impacts on health care delivery.
To complicate matters further, some heath care providers preemptively disconnected from Allscripts servers in a bid to protect their own networks.� Northwell Health, based out of New York, is an example.
In any case, as of the time of the writing of this piece, most, but not all of the disrupted services seem to have been restored. You can bet, based on the contradictory information surrounding the attack, that Allscripts' handling of the incident will be discussed for a long while to come. �This will probably filed under "how not to handle a ransomware attack."
The company's communication was spotty and their business continuity plan seems to have failed them.� There are lessons here for all business owners.� Take heed.