Brush Up on Your HIPAA Training

hipaa

By HIPAA Privacy Officer Shana Scott Does anyone like talking about HIPAA? That’s a rhetorical question, as I’m sure there’s someone out there who does. While HIPAA isn’t exactly fun, it is necessary for any HIPAA-regulated industries and the vendors who service them. During our company’s annual HIPAA compliance training, I was struck by just […]

SoPhishTicated Attack: An Analysis

credit card hooked

By Founding Principal Mark Ian Anderson In July, one of our general business inboxes received the email below. Initial review gave the recipient some pause, but there was enough legitimacy to prompt further investigation. Here’s a breakdown of what I looked at and the conclusion I came to. First, let’s review some items in this […]

Compliance, Automation, and More: An Interview with IT Director Luke Bragg

IT Director Luke Bragg

By Client Success Manager Ryenn Gaebler With giant data breaches perpetually in the news, it can be overwhelming to sift through cybersecurity information and updates. Once you think you’re caught up on the latest threats, a dozen more appear. I wanted to learn more about the IT issues our clients are facing in the current […]

Moments With Mark: Break/Fix or Managed IT Services?

https://vimeo.com/718797364 In another in our new series, “Moments With Mark,” Founding Principal Mark Anderson discusses the important differences between the break/fix model of IT services, and why, ultimately, Anderson Technologies chose to become a managed IT services provider instead. If video isn’t for you, the transcript is below. Related Reading Threads of Connection: An Interview […]

Updated for 2022! Our Most Popular Ebook

Is your business one click away from disaster? When it comes to cybersecurity, your defenses are only as good as your employees. Even a well-meaning click could provide network access to cybercriminals. What can you do about it? At Anderson Technologies, we know the importance of employee training as a vital part of your business […]

MFA – An Extra Layer of Digital Protection [Updated for 2022]

Dog on a laptop

What do logging into Netflix from a new device, updating your PayPal account information, answering questions about your first car before accessing your iTunes account, and withdrawing money at an ATM all have in common? Authentication! The National Institute of Standards and Technology (NIST) creates guidelines for passwords and the software that requires them, which […]

Moments With Mark: How I Got Started

Mark Anderson Systems Administration

https://vimeo.com/696953376 In the first of our new series, “Moments With Mark,” Founding Principal Mark Anderson shares how he went from a history major to the roots of what would become Anderson Technologies. If video isn’t for you, the transcript is below. Related Reading Threads of Connection: An Interview with Mark Anderson [Anderson Archival] Learn: What […]

What Is Your Data Worth?

What is your data worth?

Is your undivided attention worth the price of a movie ticket? Is the convenience of a mobile app worth the information and behavior it tracks? Technology is more reliant on data than it’s ever been. Whether it is gathered through surveys or automated tracking, data drives business and technology. If huge chunks of data can […]

What Ingredient Is Your Cybersecurity Sandwich Missing?

By Founding Principal Amy Anderson When was the last time you had a great sandwich? Not just any sandwich, but a truly divine sandwich: The right amount of crunch, spices, and condiments. Every flavor balanced and complemented perfectly by the other ingredients. Each bite singing with all your favorite tastes. Your business’s cybersecurity should be […]