Anderson Technologies’ Junior System Administrator Quentin Topping sits down with Libby Powers to talk about the little things a managed IT services provider does every day to protect from big disasters. Sometimes, things like insurance and maintenance can seem useless, but insuring your business against potential disaster is something you’ll wish you’d done before […]
About Marcia Spicer
This author has yet to write their bio.
Meanwhile lets just say that we are proud Marcia Spicer contributed a whooping 88 entries.
After nearly a year of pandemic-related roadblocks, business owners may feel like circumstances have taught them everything about telework and managing employees both near and far. On the other hand, some business owners may still gravitate towards a strictly on-site model for better collaboration and simpler secure IT. As workers slowly shift to the “new […]
Mark Anderson and Libby Powers chat about Zoom best practices and share the story of a client who recently got Zoom-bombed after posting the details of their call publicly. Zoom has some security features baked in, but be sure to toggle them and use the tips Mark and Libby share to ensure you have […]
Last year when the COVID-19 pandemic restricted our ability to connect in person, we all became very familiar with the video conferencing software Zoom. No one could have predicted that a significant chunk of business in 2020 would be conducted through webcams and video calls. Schools, universities, and businesses have chosen Zoom out of the […]
Mark Anderson and Libby Powers chat about the importance of employee training when it comes to your business’s cybersecurity. Even the most protected network is vulnerable when bad actors are unwittingly given access. Libby shares a personal story of getting phished, and the consequences of a single click. Free Ebook: Cybersecurity Business Training: A […]
Mark Anderson and Libby Powers of Anderson Technologies share background on ransomware, and what happened when Anderson Technologies encountered a ransomware attack happening to one of their clients! Spoiler alert: all of the data was saved. How to Protect Your Data from Ransomware Ransomware as a Service: When Criminals Mimic Corporations Tired of Waiting […]
Microsoft and Google are two of the most common technology foundations. Which one you choose can fundamentally change the way you and your employees operate. The decision is a big one and will impact your company for years to come.
Anderson Technologies has been featured by Small Business Monthly as one of St. Louis’s Best IT Firms or Best Cyber Security Firms for the past four years, and this year we are pleased to make that count five! We’ve been named a Best Cyber Security Firm for 2021. A core tenant of Anderson Technologies’ 25 […]
Libby Powers and Amy Anderson sit down to discuss the importance of 360 Security and Infrastructure Audits to reveal hidden issues. What is a Network Security Audit? Taking Network Security Audits and More: An Interview How to Determine if You Need a Computer Security Audit (Amy Anderson in Lady Boss Blogger)
In cyber security circles, Ubiquiti Networks, manufacturer of wired and wireless network devices, is infamous for more than their products. Over a period of 17 days and 14 wire transfers in 2015, $46.7 million was transferred out of Ubiquiti’s coffers to criminals’ bank accounts based on a made-up acquisition in an elaborate Business Email Compromise […]