What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Service Coordinator(SC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Woodridge, IL Businesses:
What A Few Of Our Clients Have To Say
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
Layered Network Security: 5 Components Every Layered Security Solution Should Have & Why Employee Training Is A Must Have Jul 06, 2018
Securing your data and your network is a bigger job in 2018 than it has been in years past – and if you’re looking at trends or the news, you can probably guess that network security is only going to get more important and cumbersome in the future.
Cybersecurity is now a common household term and that’s a good thing. The page has been turned on data security and people regularly recognize that we need to protect ourselves both personally and professionally from cyber crime and related threats.
To illustrate where the cybersecurity and cyber crime industries are moving here are a few stats (full article here):
- Cyber crime damage costs are predicted to hit $6 trillion annually by 2021
- Cybersecurity spending to exceed $1 trillion by 2021
- Global ransomware incidents are predicted to hit a rate of one attack every 14 seconds by 2019
The threats to data and networks are clearly going nowhere so it is important that you have a plan in place to protect your business (and yourself).
Different software applications and hardware solutions are designed to address specific security concerns. This means that while one solution may give you complete protection from one threat, it may not be suited to protect you from another.
The solution for these weak points is to ‘layer’ your security and design a solution that covers and protects your network to the best of its abilities.
What You Should Expect From A Layered Network Security Solution
A good layered security solution for your network is going to include the following components:
1. Professional Firewall Solution –
Your firewall is designed to help protect your network from external threats. It does this by blocking access to your network while allowing your users to communicate outside of the network. While a firewall is a great way to protect your network from intrusions, it can only protect your system from outside activity. A firewall cannot prevent one of your users from giving unauthorized permissions or access to programs or other users.
2. Professional Antivirus Software –
Antivirus software is a standard security solution designed to detect and block malware, viruses and other bugs from taking action against your network. An antivirus solution typically depends on a predefined catalog of known issues. The software uses this catalog to block those known issues from impacting you. The issue with this is that new viruses, malware, spyware and bugs are produced daily. If your solution is not actively updating and monitoring the internet for new incidents, it won’t be able to protect you from new threats in real time. Antivirus solutions also cannot always block a user from disregarding a warning and downloading a bad file/clicking on a bad link.
3. Email Spam Prevention/Filters –
Spam is more than just an annoying thing filling up your inbox. A majority of viruses and bugs that get through your firewall/antivirus do so by hiding in email messages. Cyber criminals know that if they send enough emails, somebody is going to click a bad link or download a compromised attachment. By filtering out spam, you dramatically decrease the opportunity for someone to accidentally introduce a virus to the network. Again though, spam filters don’t catch everything so they cannot prevent a user from making a mistake.
4. DNS Filtering/Protection –
DNS stands for Domain Name System. This piece of your network controls email delivery and is the component that allows you to browse websites. When configured, a DNS filter can prevent your employees from accessing specific types of sites. For example, a DNS filter can be set up to prevent employees from accessing social media or other blacklisted sites. This security also helps keep malware or other viruses from spreading throughout your network by masking your devices and server. This is one element of your network security that isn’t heavily impacted by regular users but if it is not set up properly and managed properly it can’t protect you from much.
5. Employee Training & Education –
You may have noticed that almost any of the security layers mentioned above have specific strengths and weaknesses. Additionally, each component had a weakness related to human or user error. The fact is that users and honest mistakes are the root cause of the majority of data breaches, viruses, downtime and incidents on your network. That doesn’t mean your employees and coworkers are intentionally breaking protocol or doing things wrong. Most of the time these are honest mistakes like clicking a link in an email, downloading a file with a hidden virus or visiting an infected/malicious site and unknowingly giving cyber criminals usernames & password information.
And That’s Just The Beginning…
These are just five common pieces of a layered network security setup. They all work together to help cover different vulnerabilities and behaviors. There are many other software and hardware solutions that can increase your layered network security and reduce vulnerability. Some of those include:
- Dark Web Monitoring Services
- Dual Authentication
- Password Management
- Data Backups
- Disaster Recovery Planning
- Scheduled & Regular Patches/Updates
- Security Protocols for Remote Devices
- Network Security Assessments (at least once a year)
The most important part to a successful layered network security setup is to take your individual needs and environment into account. There is no ‘One Size Fits All’ solution and there is no one solution that is going to guarantee 360 protection for your network. Be wary of any vendor who tries to sell you something like that.
The goal should be to protect your environment to the best of anyone’s ability and to educate/train your staff adequately to mitigate risk.
You will also want to make sure and take any specific compliance requirements or regulations for your industry into account. Most any business that has data needs to maintain certain standards for data protection.
To discuss any of the layers for a layered network security solution listed above or your environment please reach out to our team.
For more information on employee data security training go here.
The post Layered Network Security: 5 Components Every Layered Security Solution Should Have & Why Employee Training Is A Must Have appeared first on Andromeda Technology Solutions.Andromeda’s Top Windows 10 Tips & Tricks for Increased Productivity and Ease of Use Mar 30, 2018
In our business and personal lives, we’re all racing to fit 26 hours into a 24 hour day.
Any tip or trick that shaves off time and saves a few seconds can pay off big time in the long run.
We recently did a poll around the Andromeda office to grab some of our favorite tricks and tips that save time, keep us organized and help with overall productivity.
We kept this list specific to Windows 10 but many of these tricks and features will work on older versions of Windows as well.
So – without further ado –
Andromeda’s Top Windows 10 Tips & Tricks for Increased Productivity and Ease of Use:
The snip tool is very useful when you want to grab a photo or screen shot of a specific element on your screen but don’t want to capture your entire screen.
This is a pre-installed app you can find in your start menu.
For more information on exactly how to use this function check out this helpful article.
Built In Search with Windows Key
There are a lot of different commands that begin with the ‘Windows Key’ (See above for photo example). We will dive into a few of those later but our staff thought that the built in search tool deserved its own mention.
Simply hit the Windows Key and start typing out what you are looking for. This helps avoid searching and clicking around through files.
For example hit your Windows Key and start typing any program you have installed. For our example, type in iTunes then press the Enter key.
iTunes will start automatically.
Mark Up Feature in Windows Edge
There are many different web browsers out there and most people have their favorite. Windows 10 has their own web browser called Windows Edge (an update to the classic Internet Explorer).
Once you open up a web browser with Windows Edge, locate the Mark Up Feature in the top right hand corner (highlighted below):
Once you click this feature you will notice a purple navigation bar at the top of your screen. You can now markup web pages for whatever purposes you like on any tablet or device with writing capabilities.
Pin Popular Apps to Taskbar
Windows 10 tries to make it as easy as possible to access your favorite applications and software. You can create desktop shortcuts but another accessibility option is pinning commonly used apps to your Taskbar.
Simply locate the app you are looking for and right click on it. You’ll see an option for “Add to Taskbar”. Select that and you are good to go.
This is a great way to make that Snip Tool we mentioned above more accessible.
Start Menu Organization
Some users dislike the Windows 10 start menu – but it has some great organization capabilities.
Similar to pinning apps to your Taskbar as described above, you can pin programs to your start menu. Additionally, you can group applications and software together for quick navigation.
This is all done via drag and drop. Simply click on the program you want, drag it to the right and drop it where you want.
For heavy computer users, brightness settings can cause eye strain and can even contribute to difficulty falling asleep at night.
This is because our computer screens (tablets and smartphones included) emit ‘blue light’. This blue light can be harsh on the eyes over time and messes with your natural sleep rhythms in some cases.
If you’re interested in turning on the Night Light function you can find it in the display settings menu.
“Hot Keys” are just another form of shortcut you can use to perform different functions quickly with only your keyboard.
Depending on your job and needs, you may use some, many, none or all of them (there are a ton).
Here are a few of our favorites for you to try.
Windows + L – Lock your screen
Windows + D – Show Desktop
Windows + Tab – Open Windows between Virtual Desktops
Alt + Tab – Cycle through open apps/windows
Ctrl + Z – Undo
Ctrl + X – Cut
Ctrl + V – Paste
Ctrl + C – Copy
Ctrl + A – Select All
For a more extensive list of Hot Keys check out this article from Windows Central.
We hope you found this article helpful and if you have a favorite shortcut that wasn’t listed, please let us know!
The post Andromeda’s Top Windows 10 Tips & Tricks for Increased Productivity and Ease of Use appeared first on Andromeda Technology Solutions.Researchers Have Found A New Security Issue With Bluetooth Nov 17, 2018
Researchers from the Israeli security firm Armis have discovered a new security flaw in BLE (Bluetooth Low Energy) chips that expose millions of access points and networking devices around the world. This opened the door to a new hack.
The flaw has been dubbed "BleedingBit" and is actually two separate vulnerabilities that could allow a hacker to execute code or take complete control over a vulnerable device without the need of a password.� What makes BleedingBit an especially dangerous flaw is the fact that a wide range of medical devices including pacemakers and insulin pumps can be targeted, along with other IoT devices and point of sale terminals.
According to the research team, the attack works as follows:
"First, the attacker sends multiple benign BLE broadcast messages called Advertising Packets, which will be stored on the memory of the vulnerable BLE chip in the targeted device.
Next, the attacker sends the overflow packet, which is a standard advertising packet with a subtle alteration - a specific bit in its header is turned ON instead of off.� This bit causes the chip to allocate the information from the packet a much larger space than it really needs, triggering an overflow of critical memory in the process."
It should be noted that in order to execute the attack, a hacker would need to be in close proximity to the target device. Of course, once it has been compromised, it can be accessed again at will remotely, monitoring network traffic, conducting man in the middle attacks, or launching additional attacks on other devices connected to the targeted device.
The Armis researchers responsibly reported their findings and the chip manufacturer, Texas Instruments, has confirmed the vulnerabilities and has already released patches for the affected hardware.
If your company uses BLE chips in any aspect of your business, be sure to grab the latest update.