- Long-term MSP (Managed Services Provider) for all your IT, phone, and security needs
- "Special needs" implementer to augment the day-to-day tasks of an internal technical staff (e.g., initial setup of a new server or new phone system)
- Reliable "go to" solution provider for the occasional break-fix issue (HelpDesk and dispatchable techs)
Managed IT Services
…and your budget!
In an MSP role, Andromeda offers a range of service plans—anything from month-to-month "time & materials" based assistance to fixed service contracts that permit "no-brainer" conformance to an annual budget. We even offer V.I.P. plans which permit you to "jump the queue" for HelpDesk and remote technical support assignments! Beyond the functions you would expect from a full-service MSP:
- Reliable & Fast Hybrid System Backup / Business Continuity Solutions
- Fast Data Recovery
- Network Management including 24/7/365 monitoring
- Virtual CIO role
- Security (spam control, anti-malware, containment & cleansing)
- End-to-End Internet Access & Web Hosting
- Email Account Setups, Mobile Syncing, Hosting, Archiving, and Cloud storage/services in Aurora, IL (e.g., Microsoft Office365 setups)
- Software Application Deployment & Database Repair
- Automated Patching
...Andromeda can offer so much more: a single, expert source for a full range of physical security systems which can (and should) freely interact with your data network:
- Telephone systems—both hosted VoIP and traditional on-premises
- Building/Door Access Control
- Security Camera Systems and Video Surveillance
- Burglar Alarm System Installation & Monitoring
So, not only can we provide professional service for the full gamut of physical security needs of your growing organization, we are uniquely positioned to integrate those systems with any elements of your data and voice network. It is this integration that extracts the full power and usefulness of these systems for your organization.
- System design (for new networks or expansion of existing ones)
- Ordering/delivery/installation of network components
- In-wall & in-ceiling wiring & access boxes in new or existing structures
- Integration with your current network, security systems, alarm systems, door access…
- Computer configurations, email/network accounts, firewalls, security software…
- Complete system testing and staff training
But our job doesn't stop there. Once your network is operational, we can continue to support you with preventive maintenance packages, innovative approaches to data backup, virus and Malware control, and anti-spam solutions.
Computer Network Infrastructure – Switches, Routers and Firewalls
Having a solid network infrastructure is critical to keeping your systems running well and with minimal downtime. Truly, a $20 network switch from the retail store down the street or the guy you know that "does some wiring on the side" is not going to get you where you need to be. Neither are onsite-only or Cloud-only backup solutions!
Knowing that IT network wiring and switches are the vital backbones of your operation, Andromeda employs only experienced technicians and uses only business-class networking gear:
HP network switches • Cisco routers • Sonicwall & Netgear firewalls
WANs, VPNs – Multiple Locations and Remote Access
We specialize in extending your network beyond the four walls of your main office. This might include remote or branch offices, mobile employees or remote access from your house for voice, video, file sharing and much more!
Wireless IT networks are quite popular and are fast becoming indispensible. However, they generally cannot achieve the same level of performance as traditional wired networks where security, reliability, and bandwidth are of premium importance. Still, a wireless network is a great solution for a few roaming laptops or tablet PCs overlaying your wired office areas. To overcome the potential shortcomings of wireless, we use HP and Cisco Wireless Access Points, and we can guide you through the do’s and don’ts of implementing a wireless network to avoid the pitfalls.
Computer Network Design and Infrastructure Wiring
Whether you are adding a few offices or doing an entire build-out from the ground up, Andromeda Technology Solutions can help. We can provide infrastructure wiring for your voice, data, TV, cameras, overhead paging, etc. Having one company to handle all your wiring needs eliminates trying to coordinate vendors, minimizes labor overlap, and decreases cost.
We are also available to assist in the design of your wiring. While architects generally do a good job with this layout, we have a unique real-world approach that tends to be more in line with what is actually needed for a working office. Involving us early in the process will minimize the chance of having to run additional wires after your construction is complete…when it's much more expensive to install!
Web/Email Hosting & Web Design
"Commodity" web and email hosting seem like great solutions…until they go down OR you need to add a new account OR remove an ex-employee's access OR countless other items that need attention more regularly than you initially imagined. Ideally, your IT service that performs these functions for you should also host your web and email accounts to avoid delays, transfer issues, and any number of other potential mishaps. Andromeda is pleased to offer comprehensive hosting plans to do just that. Through our plans, you can also choose additional premium services like website hit tracking and statistics reporting.
Andromeda is also pleased to provide web design services—anything from simple informational sites to complete new site designs featuring animation/video, multi-tiered navigation, database-backed forms and social media interaction. We also have proven expertise in the art of SEO (Search Engine Optimization)—a "must" for any company that needs to generate new business leads from its on-line presence!
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on IT developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
Stop These 3 Hazardous File Sharing Habits Yesterday! Mar 06, 2017
File sharing is an essential portion of any business. It is the way we get information from one person to another. BUT, it can also be the way hackers gain access to your sensitive information – files or, worst of all, confidential data.
If you’re using Dropbox, OneDrive, Google Drive, or other consumer-grade file sharing and cloud sync applications – or if you depend on file sharing of any kind to run your business (hint . . . you do)- listen up!
Here are 3 habits you should break yourself and your staff of immediately.
Top 3 File Sharing Habits to Break
1) Using Consumer Grade Solutions . . .
Consumer grade solutions are just that . . . consumer grade. You aren’t a ‘consumer’, you’re a business owner with sensitive data to protect. With more and more employees/businesses depending on BYOD (Bring Your Own Device) as well as the ability to access files any time & any place, it is important that your file sharing system is professional grade. Look for enterprise grade security options like SSL Encrypted Transfer, Firewall Protection, Password Protection and Virus Scanning.
2) Emailing Files Without Proper Encryption . . .
You may not care if a hacker gets a hold of your grocery list or photos of the family dog, but when it comes to confidential data such as financial statements, medical records or other sensitive materials, it is safe to say you cannot afford criminals sniffing through your files. For this reason, NEVER send files via email without proper encryption. Business grade email and proper practices can nip this in the butt. You’d be amazed how many files fall into the laps of cyber criminals this way though.
3) Using Flash Drives…
You spend time and hard earned resources to protect your network from outside threats . . . only to destroy everything when you innocently plug in an infected flash drive you picked up innocuously enough at a trade show. Flash drives bypass security systems you have in place and may run automatically without being checked for infection by your antivirus solution. If you must continue using flash drives . . . at a minimum update your antivirus to prohibit autorun and mandate scans to all USB-attached devices when plugged into your PCs.
The post Stop These 3 Hazardous File Sharing Habits Yesterday! appeared first on Andromeda Technology Solutions.3 Critical Steps You MUST Take To Avoid WannaCry And Ransomware Like It Jun 05, 2017
Last month the world was hit by one of the largest cyber security attacks in history- affecting more than 200,000 organizations in 150 countries. WannaCry ransomware, the perpetrator of this attack, took advantage of outdated patches and software licenses. Infected computers and business owners risked losing critical data if they didn’t pay the ransom.
As cyber security & prevention experts, we are happy to report that not a single client of Andromeda Technology Solutions was affected by this attack because of our security protocols and procedures. The same can’t be said for Cook County.
Industry experts predict that this ransomware attack will hit again. Tech experts remain unsure how the new approach might be deployed – in a similar fashion or with a new “2.0” virus. While the specifics of future cyber security attacks are uncertain, we know some things for sure. Proper protocol is CRITICAL for data security and the safety of your business.
Ransomware: The Numbers **
- Almost 50% of Small Businesses have experienced some form of cyber attack
- MORE than 70% of attacks target Small Business
- As many as 60% of small businesses that experience a data breach go out of business within 6 months.
These numbers are scary. Cyber security demands the attention of business owners globally and the efforts of hackers/cyber criminals are only increasing. These criminals want your money and they don’t care about the damage left behind.
That being said, there is hope and there are measures you can take to prevent your business from becoming a victim of ransomware.
3 Security Protocols You MUST Implement Immediately For The Safety Of Your Data, Your Business AND Your Wallet . . .
- Update ALL Microsoft Licenses to Windows 7 At A Minimum & Maintain Up To Date Security Patching – Cyber criminals are no dummies. WannaCry and other viruses like it take advantage of out of date licenses. Too often, business owners sacrifice the security of their network because they don’t want to go through the grief of updating to the latest Microsoft License. Andromeda recommends updating ALL PC’s to Windows 7 at a minimum and, more importantly, make sure you perform regular patch and security updates.
- Test & Verify ALL Data Backups – When is the last time you tested and verified your backups? Are you backing up your data at all? How long would it take your current IT provider to get you back up in running in the event of a disaster (virtualization time)? It is a FACT . . . you will be hit by some form of ransomware, malware or virus. The real question becomes, do you have the protocols in place to defend and beat the attack? One of the most important things you can do to safeguard yourself is perform regular backups. (We recommend daily at a minimum). A cybercriminal can’t hold your data hostage if you follow this simple practice. AND – don’t accept a verbal confirmation your data continuously remains backed up as proof. Your IT partner should provide you regular, real time, proof that your data is backed up securely and that it can be visualized in an agreed upon length of time. If your IT provider can’t give these stats and proofs to you, time to find a new partner.
- Educate Your Team On How These Attacks Work And Where They Come From – Every office has that one employee that will click on ANYTHING (hopefully it isn’t you). Continued education is one of the first lines of defense against these attacks. Employees should know:
- What to look out for
- What phishing scams look like
- What to do when they suspect an email or link is suspect
- NEVER to check personal email at work
Proper spam filters set by your IT group should prevent the majority of these emails from getting to your inbox. However, it only takes ONE CLICK and an entire network is infected before you know what happened.
Ransomware Prevention constantly changing, be sure to stay on top of newest trends
When all is said and done, cyber security is an everyday battle. Hackers and criminals will keep attacking until you don’t have something they want. These 3 Security protocols are only the tip of the iceberg and should be part of a multiphase approach implemented by your internal staff and your IT partner. If you have any questions, please reach out to a representative at Andromeda today.
If you’ve found this article on ransomware prevention interesting, you might also want to consider attending our upcoming Executive Lunch & Learn Seminar.
**Statistics sourced from the National Cyber Security Alliance
The post 3 Critical Steps You MUST Take To Avoid WannaCry And Ransomware Like It appeared first on Andromeda Technology Solutions.Android Gets Fix For KRACK WiFi Vulnerability Nov 17, 2017
Last month, a new WiFi security vulnerability known as "Krack" was discovered by a security researcher named Mathy Vanhoef. It was about as serious as a security flaw could be, enabling hackers to clone a router and funnel traffic through it, either monitoring all the activity on the network, or, if they wanted to be more destructive, conducting all manner of "man in the middle" attacks against anyone on the network.
The major tech companies were all given advance notice of Vanhoef's research, and as such, not long after it was published, many responded almost immediately with patches. Apple, for example, released a Krack patch at the end of October.
Microsoft was even quicker to respond, releasing a patch to the problem quietly before Vanhoef's research was even published.
In that regard, Google has been a bit behind the curve, but as of the release of this month's Android Security Bulletin, the company has at last provided a fix for the issue.
This month's update is spread over the following three updates:
• And 2017-11-06
The fix for the Krack issue is contained in this last one.
If your Android device is set to automatically receive security updates, then there's nothing for you to do. The patch has already been installed on your phone.
If you tend to take a skeptical view of automatic updates, then at the very least, be sure to grab 2017-11-06. If you don't, you're probably putting your organization at unnecessary risk. If you want to check to see if you're vulnerable before applying the update, you can do that, too. Vanhoef released his proof-of-concept code and detection tools on his GitHub account, and since releasing the data, an interested third-party has developed a tool aptly named "Krack Detector" you can use to see if you need the fix.
Either way, it's worth looking into, and something your team should make a priority.