What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Service Coordinator(SC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Woodridge, IL Businesses:
What A Few Of Our Clients Have To Say
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
Andromeda’s Top Windows 10 Tips & Tricks for Increased Productivity and Ease of Use Mar 30, 2018
In our business and personal lives, we’re all racing to fit 26 hours into a 24 hour day.
Any tip or trick that shaves off time and saves a few seconds can pay off big time in the long run.
We recently did a poll around the Andromeda office to grab some of our favorite tricks and tips that save time, keep us organized and help with overall productivity.
We kept this list specific to Windows 10 but many of these tricks and features will work on older versions of Windows as well.
So – without further ado –
Andromeda’s Top Windows 10 Tips & Tricks for Increased Productivity and Ease of Use:
The snip tool is very useful when you want to grab a photo or screen shot of a specific element on your screen but don’t want to capture your entire screen.
This is a pre-installed app you can find in your start menu.
For more information on exactly how to use this function check out this helpful article.
Built In Search with Windows Key
There are a lot of different commands that begin with the ‘Windows Key’ (See above for photo example). We will dive into a few of those later but our staff thought that the built in search tool deserved its own mention.
Simply hit the Windows Key and start typing out what you are looking for. This helps avoid searching and clicking around through files.
For example hit your Windows Key and start typing any program you have installed. For our example, type in iTunes then press the Enter key.
iTunes will start automatically.
Mark Up Feature in Windows Edge
There are many different web browsers out there and most people have their favorite. Windows 10 has their own web browser called Windows Edge (an update to the classic Internet Explorer).
Once you open up a web browser with Windows Edge, locate the Mark Up Feature in the top right hand corner (highlighted below):
Once you click this feature you will notice a purple navigation bar at the top of your screen. You can now markup web pages for whatever purposes you like on any tablet or device with writing capabilities.
Pin Popular Apps to Taskbar
Windows 10 tries to make it as easy as possible to access your favorite applications and software. You can create desktop shortcuts but another accessibility option is pinning commonly used apps to your Taskbar.
Simply locate the app you are looking for and right click on it. You’ll see an option for “Add to Taskbar”. Select that and you are good to go.
This is a great way to make that Snip Tool we mentioned above more accessible.
Start Menu Organization
Some users dislike the Windows 10 start menu – but it has some great organization capabilities.
Similar to pinning apps to your Taskbar as described above, you can pin programs to your start menu. Additionally, you can group applications and software together for quick navigation.
This is all done via drag and drop. Simply click on the program you want, drag it to the right and drop it where you want.
For heavy computer users, brightness settings can cause eye strain and can even contribute to difficulty falling asleep at night.
This is because our computer screens (tablets and smartphones included) emit ‘blue light’. This blue light can be harsh on the eyes over time and messes with your natural sleep rhythms in some cases.
If you’re interested in turning on the Night Light function you can find it in the display settings menu.
“Hot Keys” are just another form of shortcut you can use to perform different functions quickly with only your keyboard.
Depending on your job and needs, you may use some, many, none or all of them (there are a ton).
Here are a few of our favorites for you to try.
Windows + L – Lock your screen
Windows + D – Show Desktop
Windows + Tab – Open Windows between Virtual Desktops
Alt + Tab – Cycle through open apps/windows
Ctrl + Z – Undo
Ctrl + X – Cut
Ctrl + V – Paste
Ctrl + C – Copy
Ctrl + A – Select All
For a more extensive list of Hot Keys check out this article from Windows Central.
We hope you found this article helpful and if you have a favorite shortcut that wasn’t listed, please let us know!
The post Andromeda’s Top Windows 10 Tips & Tricks for Increased Productivity and Ease of Use appeared first on Andromeda Technology Solutions.3 Critical Steps You MUST Take To Avoid WannaCry And Ransomware Like It Jun 05, 2017
Last month the world was hit by one of the largest cyber security attacks in history- affecting more than 200,000 organizations in 150 countries. WannaCry ransomware, the perpetrator of this attack, took advantage of outdated patches and software licenses. Infected computers and business owners risked losing critical data if they didn’t pay the ransom.
As cyber security & prevention experts, we are happy to report that not a single client of Andromeda Technology Solutions was affected by this attack because of our security protocols and procedures. The same can’t be said for Cook County.
Industry experts predict that this ransomware attack will hit again. Tech experts remain unsure how the new approach might be deployed – in a similar fashion or with a new “2.0” virus. While the specifics of future cyber security attacks are uncertain, we know some things for sure. Proper protocol is CRITICAL for data security and the safety of your business.
Ransomware: The Numbers **
- Almost 50% of Small Businesses have experienced some form of cyber attack
- MORE than 70% of attacks target Small Business
- As many as 60% of small businesses that experience a data breach go out of business within 6 months.
These numbers are scary. Cyber security demands the attention of business owners globally and the efforts of hackers/cyber criminals are only increasing. These criminals want your money and they don’t care about the damage left behind.
That being said, there is hope and there are measures you can take to prevent your business from becoming a victim of ransomware.
3 Security Protocols You MUST Implement Immediately For The Safety Of Your Data, Your Business AND Your Wallet . . .
- Update ALL Microsoft Licenses to Windows 7 At A Minimum & Maintain Up To Date Security Patching – Cyber criminals are no dummies. WannaCry and other viruses like it take advantage of out of date licenses. Too often, business owners sacrifice the security of their network because they don’t want to go through the grief of updating to the latest Microsoft License. Andromeda recommends updating ALL PC’s to Windows 7 at a minimum and, more importantly, make sure you perform regular patch and security updates.
- Test & Verify ALL Data Backups – When is the last time you tested and verified your backups? Are you backing up your data at all? How long would it take your current IT provider to get you back up in running in the event of a disaster (virtualization time)? It is a FACT . . . you will be hit by some form of ransomware, malware or virus. The real question becomes, do you have the protocols in place to defend and beat the attack? One of the most important things you can do to safeguard yourself is perform regular backups. (We recommend daily at a minimum). A cybercriminal can’t hold your data hostage if you follow this simple practice. AND – don’t accept a verbal confirmation your data continuously remains backed up as proof. Your IT partner should provide you regular, real time, proof that your data is backed up securely and that it can be visualized in an agreed upon length of time. If your IT provider can’t give these stats and proofs to you, time to find a new partner.
- Educate Your Team On How These Attacks Work And Where They Come From – Every office has that one employee that will click on ANYTHING (hopefully it isn’t you). Continued education is one of the first lines of defense against these attacks. Employees should know:
- What to look out for
- What phishing scams look like
- What to do when they suspect an email or link is suspect
- NEVER to check personal email at work
Proper spam filters set by your IT group should prevent the majority of these emails from getting to your inbox. However, it only takes ONE CLICK and an entire network is infected before you know what happened.
Ransomware Prevention constantly changing, be sure to stay on top of newest trends
When all is said and done, cyber security is an everyday battle. Hackers and criminals will keep attacking until you don’t have something they want. These 3 Security protocols are only the tip of the iceberg and should be part of a multiphase approach implemented by your internal staff and your IT partner. If you have any questions, please reach out to a representative at Andromeda today.
If you’ve found this article on ransomware prevention interesting, you might also want to consider attending our upcoming Executive Lunch & Learn Seminar.
**Statistics sourced from the National Cyber Security Alliance
The post 3 Critical Steps You MUST Take To Avoid WannaCry And Ransomware Like It appeared first on Andromeda Technology Solutions.Hacker Requests For Wire Transfers Are Topping Email Scams Sep 12, 2018
Business Email Compromise (BEC) attacks are a major threat, costing business nearly three billion dollars a year.
This form of attack primarily targets the C-Suite in order to impersonate them.
In the world of BEC attacks, those that employ requests for wire transfers are almost devastatingly effective.
Asaf Cidon, the Vice President of Content Security at Barracuda Networks, explains why:
"Criminals use business email compromise attacks to obtain access to a business email account and imitate the owner's identity, in order to defraud the company and its employees, customers, or partners. In most cases, scammers focus efforts on employees with access to company finances or payroll data and other personally identifiable information."
The attack unfolds when the hacker, pretending to be a company CEO or other high-ranking official requests immediate payment, usually via wire transfer.
Again, per Asaf Cidon:
"The sense of urgency, a request for action, or a financial implication used in BEC schemes tricks targets into falling for the trap. For example, an accountant may receive a fraudulent email request for a wire transfer from the company CEO, which includes a spoofed version of the CEO's email address and even the CEO's own email signature."
According to a 2016 report published by Trend Micro, a successful BEC attack nets the hacker an average of $140,000. Given how easy they are to pull off (and how low-tech), don't expect this type of attack to show any signs of decline in the foreseeable future.
What makes BEC attacks even more troublesome is the fact that law enforcement officials believe that few attacks of this type are ever reported, and that the losses to business could be up to four times the figure we cited earlier.
Worst of all, these types of attacks appear to be increasing in their frequency. Unfortunately, C-Suite employees are notoriously resistant to basic security training, meaning that there are no easy solutions to this large and growing problem.