What Is An Andromeda C‑CAT?A C‑CAT (Client-Centric Action Team) is a dedicated team that includes one or more two Remote Service Techs, and one or more IT Field Techs whose activities are curated by a Service Coordinator(SC)—each specifically appointed to service your organization. With cat-like reflexes and precision, your Andromeda C-CAT will pounce on any IT issue, upgrade, or project. It's really the cat's meow for your IT needs!)
Professional IT Services that Andromeda Provides for Worth, IL Businesses:
What A Few Of Our Clients Have To Say
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
Get More Done with 5 Productivity Hacks for Office 365 Aug 31, 2018
The shortest distance between two points is a straight line. You can’t trick the system, you’ve got to travel the distance from point A to point B to get where you want to go – or at least that’s what we’ve all been told by physics and geometry.
In most cases, this concept also applies to our workdays and careers. The grind is long, the work keeps coming, the tasks continue to pile up but at the end of the day, you are consistently working on taking the necessary steps towards point B – whatever that may be for you and your business.
But what if there were tools available to you that might give you and your team an edge. Wouldn’t you want to take advantage of strategies and applications that improved productivity, helped you get more done and saved you time?
Did you know that Microsoft Office builds their tools with time saving, productivity boosting, organization strategies in mind?
Let’s take a look at some of these tools to help you get more done during your 9-5.
5 Productivity Hacks for Office 365
1. The Tell Me Function
Ever wonder how to do something in Word or forget where to find a specific function in a Microsoft Office program? The Tell Me function is located in the main navigation bar and can perform many useful functions for you. This function speeds things up and prevents you from having to Google how to do things like create columns in Word, pull up your recent commands, resend messages in Microsoft Outlook and more.
As mentioned, the Tell Me function is located in your main navigation – to the right of the ‘View’ section. You can see a faint blue lightbulb with the phrase “Tell me what you want to do…” next to it. You can also use the key combination alt + q to pull it up if you want to be even more productive!
For more information on this function and its’ use – check out this quick video
2. Real Time Collaboration
Have you ever tried to open a document at work when a popup informs you that you have to open a ‘read only’ copy because another user is currently in the file?
This can be a pain when you are trying to get work done at the same time as one of your teammates. It can also be frustrating if you have a teammate that regularly forgets to close files when they are done working with them (we’ve all done that right?).
With Office 365 you can take advantage of live collaboration. This means that multiple members of your team can be in a document, editing and making changes at the same time. For instance, if you have an upcoming presentation, your marketing staff can be editing content while your sale staff adds their spin.
Additionally, Microsoft has built other tools such as Microsoft Teams to help departments and teams in your organization collaborate via conversation and shared documents. You can also take collaboration outside of your office to work with vendors, clients and business partners via Inter-Tenant Collaboration which allows you to set up shared calendars, documentation spaces, IMs and more.
For more on how Office 365 can enhance collaboration in the office look here.
3. Microsoft To-Do
Do you have a list of tasks and to-do’s that never seems to end? Or maybe you just have a hard time organizing all of your tasks in one place?
With Microsoft To-Do you have an intelligent, cloud based task management system that is with you no matter where you are and accessibly on a variety of devices. The application is mobile friendly and synchs directly with Outlook.
To-Do allows you to take your larger list of tasks and review them daily to add them to your ‘My Day’ feature. By doing this you are able to locate which of your tasks have priority and knock them out one by one.
Where To-Do really shines is it’s security and compliance features. Microsoft has done a great job with the Outlook integration to make sure that your To-Do list is secure and compliant across the board.
You can also segment your To-Do’s into “steps” meaning you can break down a larger task into the sub-steps required for completion. You can even share your tasks with peers, friends, family or coworkers thanks to a recent update.
4. Automate Key Workflows with Microsoft Flow
Many businesses turn to Sharepoint to securely store, access and manage company documentation, Microsoft Flow can actually help you create workflow automation with integrations to other software as well.
For instance, you can set systems up so that when a document is uploaded, an email is automatically sent to a staff member to review the document. This can be useful for things like Time Off requests but can be applied to larger, more demanding tasks like onboarding or off boarding clients/vendors. Microsoft Flow is also integrated into SharePoint so that you can start flows directly from lists and libraries making it a great productivity booster, time saver and addition to the Microsoft Office Suite.
5. Microsoft Sway
Microsoft Sway is a presentation tool that some believe may replace PowerPoint. It allows users to put together professional presentations quickly with a drag and drop function for photos, documents, text and more.
It should be mentioned though that you cannot create charts or graphs in Sway – it is more geared towards visual presentations. So if you need to share numbers, statistics or charts, probably best to stick with PowerPoint.
You don’t have to have Sway installed on a device to present your work which means it is widely accessible as well as easy to use and intuitive. Sharing your presentation with another is as simple as sharing a link.
Microsoft wants to help you get your job done and they build tools/functions to help you get more accomplished in the office and on the go. With new Office applications and Office 365 you open a variety of doors to your business with respect to collaboration and remote capabilities.
You don’t have to have Office 365 to get the productivity boosts described above. Many of these programs and tools are available in the traditional license model. You may lose out on some of the cloud functions, live collaboration capabilities and accessibility though.
To discuss what migrating to Office 365 would mean for your business, simply give us a call at the office (815) 836 – 0030 or send an email to Contact@WeNetwork.com. You can also feel free to reach us if you want to learn more about a specific application not included in your current Office 365 Subscription.
The post Get More Done with 5 Productivity Hacks for Office 365 appeared first on Andromeda Technology Solutions.Dark Web Series Part 1 – What Is the Dark Web & Why It Matters To You Dec 29, 2017
Ransomware, cybercrime, hackers . . .
It’s safe to say that you’ve at least heard of these terms in the news and if you are like most people, you’ve heard them over and over on the news, in the office and just in everyday conversation for the past few years.
This progression in the cybersecurity world may come with unique phrases and buzzwords but the trend itself is nothing new. Since the internet’s beginning, there have been people working to cause chaos.
Think computer viruses, Trojan horses, scams, spam, malware etc.
Like most technology, the internet is used predominantly for good. But, there are always a few bad apples who take good technology and choose to use it with less than the best intentions. And while there have always been “bad guys” out there trying to disrupt good works from being done, over the last decade and specifically in the last few years we’ve seen an incredible increase in spending, vulnerability and rates of incident for large scale cyber-attacks.
To put this in perspective, spending on cybersecurity is projected to exceed 1 trillion dollars by 2021. In 2017, information security (a subset of the cybersecurity industry) spending hit over 86 billion dollars.
On top of this, there has been a dramatic increase of incidents in the small to medium sized business arena. When a local business gets hit, it may not make the 5 o’clock news like Home Depot or Target, but it hurts just the same – and maybe even more.
The crazy thing when it comes to cybercrime, ransomware and other infections is that you can be doing regular updates, implement antivirus etc. and you still can fall victim to identity theft, breaches and other cyber incidents.
All of this cyber-security and cyber-crime discussion lays the groundwork for this Dark Web discussion.
What is the Dark Web?
First, what is the Dark Web? In a simple and brief explanation, the Dark Web is a mostly anonymous space online that you need special software to access. The experience is much like a normal internet browser but the sites and activities available are very different.
Many times the Dark Web is described using an iceberg illustration.
- The internet as we know it is what you can see above sea level.
- There is a larger space just below the surface of the iceberg where the ‘darknet’ lives, this is dominantly used for large data stores. Financial records, academic databases, government records etc. live here.
- Then there is the bottommost layer of the iceberg, this is the Dark Web – here you’ll find illegal activity like drug trafficking, illegal gun sales, and even personal data for sale.
Now, you may be thinking,
“This is interesting information but what in the heck does the Dark Web have to do with me? Why do I care about it? I don’t use it. I don’t know anyone who does. . .” And we get that, but even if you don’t use the Dark Web you may be on it.
The Dark Web is one of the largest sources of stolen data available to criminals. While some may use it to buy goods, other criminals purchase pieces of your information like credit card information, passwords, social security information and more to use for their own purposes.
When cybercriminals go to places like your local grocery store, Experian and other sites to wreak havoc, the information they steal ends up for sale on the Dark Web.
All of this taken into consideration, the everyday consumer and business professional shouldn’t be scanning these areas of the web to try and protect their data.
Instead, a business professional like yourself should make sure that you are following proper security protocols:
- Anti-Virus Software Regularly Updated and on every device
- Proper Firewalls and regular updates
- Employee training
- Regular Professional Backups (also regularly tested and verified)
- Disaster Recovery Plan
- Spam filtering
- Encourage employees to speak up if they see a weird email or link
- Bring in professional cyber security consulting
With all of these items and a few more in place, you make it much more difficult for a cyber-criminal to get into your network and steal your data. This in turn will help keep your data and that of your employees off of the Dark Web. Of course, nothing is foolproof and that is why an exceptional cyber-security partner should offer Dark Web monitoring.
Dark Web monitoring is a program some IT professionals offer businesses where scans are going on constantly in the background and are looking for a specific domain. When the scan recognizes your domain in a database, it flags the software and you are alerted to change passwords or address the breach.
This way, you are always a step ahead of the criminals without lowering yourself to the “Dark Web” itself.
We hope you found this first installment in our Dark Web series helpful. Look out for our next article in February focused on 5 ways you can keep your information off of the Dark Web entirely.
The post Dark Web Series Part 1 – What Is the Dark Web & Why It Matters To You appeared first on Andromeda Technology Solutions.Another Intel Processor Vulnerability Found Nov 12, 2018
Intel just can't seem to catch a break.� By now, almost everyone has heard about the dreaded Spectre and Meltdown vulnerabilities which have been plaguing the chip maker since they were first discovered.� Now, it seems there's a new chip-based threat.
This latest threat has been dubbed PortSmash by the research team from the Tampere University of Technology in Finland and the Technical University of Havana, in Cuba who jointly discovered it.� It works by abusing a weakness in Intel's Hyper-Threading technology, which is Intel's implementation of SMT (Simultaneous Multi Threading).
The researchers had this to say about the attack:
"We recently discovered a new CPU microarchitecture attack vector.� The nature of the leakage is due to execution engine sharing on SMT (e.g., Hyper-Threading) architecture.
More specifically, we detect port contention to construct a timing side channel to exfiltrate information from processes running in parallel on the same physical core."
In plain English, the vulnerability allows hackers to run a PortSmash process alongside a selected process running on the same CPU core. In doing so, the ProtSmash process can spy on that application and even lift data from it as desired by the hackers.
The team released a proof of concept on Github and demonstrated their ability to steal private decryption keys.
So far, the team has confirmed that the exploit works on Intel's Skylake and Kaby Lake processors, but there's strong circumstantial evidence that with modifications, the exploit would work on other chipsets as well, including those developed by rival AMD.
The reason for this is because the researchers believe SMT to be fundamentally flawed. It shares resources between two CPU instances while not providing any form of security differentiators between the two instances.
The research team responsibly reported the flaw to Intel, but the company did not respond in a timely manner, so the team published their findings, which prompted action by Intel.� The company released a security patch on November 1.