Moments With Mark: How I Got Started

Mark Anderson Systems Administration In the first of our new series, “Moments With Mark,” Founding Principal Mark Anderson shares how he went from a history major to the roots of what would become Anderson Technologies. If video isn’t for you, the transcript is below. Related Reading Threads of Connection: An Interview with Mark Anderson [Anderson Archival] Learn: What […]

What Is Your Data Worth?

What is your data worth?

Is your undivided attention worth the price of a movie ticket? Is the convenience of a mobile app worth the information and behavior it tracks? Technology is more reliant on data than it’s ever been. Whether it is gathered through surveys or automated tracking, data drives business and technology. If huge chunks of data can […]

What Ingredient Is Your Cybersecurity Sandwich Missing?

By Founding Principal Amy Anderson When was the last time you had a great sandwich? Not just any sandwich, but a truly divine sandwich: The right amount of crunch, spices, and condiments. Every flavor balanced and complemented perfectly by the other ingredients. Each bite singing with all your favorite tastes. Your business’s cybersecurity should be […]

Byte-Size Tech: Wired vs. Wireless Mark Anderson and Ryenn Gaebler of Anderson Technologies walk through a comparison between wired and wireless network connections. Stick around to the end because Mark has some tips for optimizing your wireless speeds, stability, and security. If video isn’t for you, click the green button below to read our blog on the same topic. […]

Scams for the Holidays

By Content Specialist Marcia Spicer Ah, the winter holidays. Traditionally a time of joy and celebration, but more often a time of stress, spending, shipping, scrambling to cover time off, and, yes, scams. Unless you’re fascinated by them like I am, getting scammed is probably the last thing on your mind at any given time. […]

Byte-Size Tech: What Does an IT Security Audit Report Cover?

A 360 Audit Reveals IT Gaps A walk through our IT audit process, and how it helps you gain knowledge, perspective, and control over something that affects all areas of your business: your IT. Ready to Request an IT Security Audit Report? Click Here Related Reading Byte-Size Tech: 360 Audits Provide an Unbiased Look into Your Cybersecurity Infrastructure Talking Network […]

Byte-Size Tech: You’re Invited to a Webinar that Contains Your Secret Weapon

Amy and Ryenn Webinar Thursday, Dec. 16, Ryenn Gaebler of Anderson Technologies and Eric Torres of Datto will sit down for a 30-minute educational conversation about your secret weapon in the war against cybercrime. Learn about the latest threats and real-world solutions to protect yourself. Plus, there’s a chance to win a $500 gift card! And you’re invited. […]

The Comfort of Correctly-Budgeted IT

A Correct Budget Means No Surprises

By IT Director Luke Bragg I know more than one business owner who feels overwhelmed trying to be an expert at everything: operations, HR, financials, marketing, technology, and sales. The fact is, whether they’re an expert or not, they’re responsible for everything, all while keeping their clients happy. When juggling these different roles, business owners […]

Scam Alert! The Rise in SMSishing Fraud Texts

Woman receives a suspicious SMSishing text

By Systems Administrator Ben Fairbanks Have you been receiving suspicious text messages lately? If so, you aren’t alone. In late 2020, the FCC strengthened the Telephone Consumer Protection Act of 1991 (TCPA) by adding more regulations as part of the TRACED Act (Telephone Robocall Abuse Criminal Enforcement and Deterrence) which basically adds a ton more […]