Entries by Marcia Spicer

SKY’s the Limit for Website Development

How Anderson Technologies Helped SKY Investment Group Reach a New Audience Have you Googled yourself recently? If you own a business or oversee the marketing of one, an internet search is the first step in evaluating your company’s online presence. Social media marketing and web search optimization can be researched and learned. Functionality and ease-of-use […]

Quotables: How Do I Use the Cloud? (Real Simple)

Check out Anderson Technologies’ recent contribution to the February 2019 edition of Real Simple magazine. Director Farica Chang answers questions about the cloud and how it’s used every day! “In short, the cloud refers to files and applications that are stored or used on the internet,” Chang says in the Real Simplifier feature. Read the […]

Ring, Ring! It’s Voice Over IP!

Is it time to modernize your phone systems? VoIP, or Voice over Internet Protocol, uses your internet connection for phone services. Rather than transmitting a voice signal over separate analog telephone lines, a VoIP user takes advantage of your computer network and the internet already in place to make a voice or video call. You […]

Collection #1 Security Breach

Here at Anderson Technologies we like to keep our clients updated on the latest cyber security news. We’ve covered such breaches as KRACK and the Equifax hack in the past, and now we’re reporting on a breaking data breach called Collection #1, which affects nearly 2.7 billion emails and password combinations. What Exactly Is the […]

HIPAA Part 3: Document! Document! Document!

As you read through the Privacy and Security Rules for HIPAA, you’ll see a pattern that shouldn’t be taken for granted. Nearly all the implementation specifications require some form of policy and procedure documentation. This involves more than the reasoning and justification for how you choose to implement the specifications (though that must be documented […]

HIPAA Part 2: Diving Deep into the Security Rule

In our first HIPAA article, we offered a little history on the Health Insurance Portability and Accountability Act and a general overview of how the Privacy and Security Rules evolved from it. In this post, we’re going deep into the murky depths of the Security Rule from a business standpoint. HIPAA’s Security Rule may seem […]

Infected? A New Phishing Attempt for 2018

Even managed service providers receive scam emails and phone calls. These serve as a reminder that education on phishing, scareware, and ransomware is an ongoing process, one that even IT experts need to stay sharp on. But let’s assume you aren’t an IT expert. How can you best determine the validity of these messages and […]

5 Tasks to Tackle: Prep Your Business for 2019

Don’t wait until the last minute to prepare your small business for 2019! The end of the year is a busy time. Small businesses especially need to have a plan for growth in place well before the New Year. Taking detailed stock of your operations helps uncover improvement opportunities and provides ideas.  Our “5 Tasks […]