Who We Are

Our Company

Since 1994, Andromeda Technology Solutions has kept businesses safe, secure, and running. Whether you need proactive IT services or advanced building security, we're your go-to resource.

Our Team

We've grown from a group of three to a team 50 people strong – all dedicated to the core purpose of helping our customers succeed.

Careers

Andromeda was honored to be named as one of the 2022 Best Places to Work in Illinois. Explore the new frontier of your career and view our open positions.

best-places-to-work
Who We Serve

Our Clients

We’ve served 2,500+ clients in our 28+ year history. Whether you're located near our headquarters in the Chicagoland area or have needs on a national level, we can help you with all your business IT and building security needs.

Industries

logo-tma-blue

Manufacturing Sub-Sectors

What We Do

How We Can Help

Don't let unmet IT and building security needs spin your spacecraft out of control. Discover how our IT services and full suite of building security solutions will keep you grounded.

IT Solutions

Why Andromeda

clutch-2023-it-services top_clutch.co_managed_service_provider_chicago_2023 badge-nist
Resources

Resource Portal

Technology is constantly evolving – and so are building security threats. Stay in orbit with the latest developments via our regularly updated resource library.

Recent Blog Posts

How Can We Help

Are you an existing customer in need of support? Submit a ticket and we'll report to the bridge shortly.

How to Spot Phishing Scams & Protect Your Data

Cyber-Security is a big topic in the news. New businesses fall victim to hackers and cyber criminals daily.

Even high quality security programs and protocols can fall victim to cyber-bullies without proper employee training, awareness and attention to detail.


We believe education is one of the best defenses against cyber criminals.

With that in mind, we want to provide some valuable tips for spotting and avoiding one of the most popular scams/tactics cyber-criminals use against you: the Phishing Scam.

Email is essential to your business and every day communication. It is also one of the prime spaces hackers focus on to steal your information and sneak into your network.

This is because it is SO much easier to get a person to click on a link, input account info or download a corrupt file via an email scam than many other hacker strategies.

You’ve probably heard this but it’s true – “There’s one person in every office that will click on anything.”

Hopefully that person isn’t you!

But – with the information below, you’ll learn how to spot these scams and some strategies to avoid them altogether.

Phishing Scams 101

What are some of the Goals of Phishing Scams?

  • Steal Sensitive Personal Info – Credit Card Info, Account Login Info, Personally Identifiable Information (SSN, Birth Date etc.)
  • Gain control of your computer or network
  • Install malware or other computer viruses

How do cyber-criminals convince you to fall for their plans?

  • Deliver file attachments with harmful software enclosed – viruses/malware/keystroke loggers
  • Trick you into clicking on bad websites that secretly infect your PC with viruses etc.
  • Convincing you to give them username info and password info to desired accounts

Things you should look out for to spot and prevent Phishing Scams

  • Make sure that the “reply to” email address matches the sent address
  • Any message that creates a sense of urgency – especially regarding login info
  • Any message that requests sensitive data
  • Questionable links or links that don’t match the anticipated site/source
  • Random social media messages asking you to click a link to see a video or receive specific info

Keep in mind and remember that legitimate companies won’t email you asking for passwords, sensitive info (social security numbers) or other sensitive data via email.

 Sample Phishing Scams Explained:

Office Example:

phishing scams Microsoft Office example

  1. The ‘From’ email address is suspicious
  2. ‘From’ and ‘Reply-To’ are different and both are suspicious again
  3. When you hover over the ‘Restore Access’ button there is a link that doesn’t match any Microsoft destinations
PayPal Example:

phishing scams PayPal example

  1. Bad sender domain
  2. Suspicious Subject & Content – generic name and sense of urgency to give up account info
  3. Bad grammar
  4. Suspicious link if you hover over the masked link.
Amazon Example:

phishing scams from Amazon Example

  1. Bad domain in ‘From’ section – management@mazoncanada.ca
  2. Generic Greeting
  3. Bad link redirect
  4. Sense of Urgency in message to get your account info

Response Strategies/Protocols for suspected phishing emails:

In the office it is important to have conversations with employees and make sure everyone knows what to do if they suspect a bad email.

  • We recommend alerting your IT partner or IT staff members of the issue.
  • NEVER click any links you think are suspicious.
  • If you are unsure of an email you can always contact the related company direct. For example, with respect to any of the above emails you can always go directly to their official page, grab contact info and call/contact support to confirm that the email is real.
  • NEVER use contact info in a suspicious email to figure out whether it is real or not. Criminals put fake phone numbers and contact info in their messages so of course they will tell you that the email is real.
  • Hold regular cyber security and data security training in your office to make sure employees are up to speed on the latest techniques/red flags.


Keep Your Business Safe, Secure, and Running

We’ll take a proactive approach to your manufacturing IT – and help your business blast off.