Busting Business Email Compromise

In cyber security circles, Ubiquiti Networks, manufacturer of wired and wireless network devices, is infamous for more than their products. Over a period of 17 days and 14 wire transfers in 2015, $46.7 million was transferred out of Ubiquiti’s coffers to criminals’ bank accounts based on a made-up acquisition in an elaborate Business Email Compromise […]
Learn: How to Reduce Risk and Secure Your IoT Devices

Click Here to Read the Learn Page Internet of Things (IoT) devices provide a service to the user, but also provide a glut of information for developers. Developers state that the information collected is a tool for honing services and enhancing user experience, but this information is also worth a lot of money to them […]
Rightsizing Now and for the Future

COVID-19 has changed the way people live and do business, so it’s more important than ever to take a step back and assess the needs of your company. Do you have too many computers for your employees, or not enough? What products and services are you paying for each month? Whether you need to streamline […]
Policies To Update When Employees Return to Work

For more than six months, the world has been upended by the COVID-19 pandemic. A true return to “normal” may seem far on the horizon, but many companies are preparing their offices for employees to return full- or part-time. There’s much to prepare in order to meet everyone’s needs during this transition, some decisions are […]
Don’t Take the Bait: Securing a Remote Workforce

With the increase in employees working from home, a comprehensive cyber security plan is imperative now more than ever. Remote access to your business’s network, especially from personal computers and devices, is a weak link in your cyber defenses. This makes the need for comprehensive employee training essential to your cyber security plan. One successful […]
New ebook Available: Get Hip to HIPAA: A Beginner’s Guide to HIPAA Compliance

Struggling to understand the basics to HIPAA compliance? Want to keep your customers’ private data safe? Download Anderson Technologies’ Get Hip to HIPAA: A Beginner’s Guide to HIPAA Compliance for an overview of the important aspects of HIPAA, including the Security Rule, Risk Assessments, and the many resources available to help bring you into compliance. […]
The Ultimate Guide to Secure Remote Work [Updated for 2020]

With the coronavirus in the news, more businesses than ever are considering whether telework is a viable option for their company and employees. But with new cyber threats and data breaches constantly reported, business owners have to ask themselves, How do I maintain my cyber security when my employees work remotely? Whether you have one […]
5 Fraud Trends and How to Beat Them: Top Tips to Implement for Cyber Security Awareness Month

Every October, Cyber Security Awareness Month is a time to learn, assess, and make changes to protect yourself and your business from the latest, most sophisticated dangers. Beyond damages to reputation and production, monetary costs from cyber crime add up in the billions of dollars. Stay safe and aware this October. Here are five fraud […]
3 Easy Ways to Make the Most of Your Firewall

Is the mess of cords and cables in your server room weighing heavy on your mind? Whether or not you rely on a managed services provider (MSP) to keep your IT systems organized and in check, you have a responsibility as a business owner to understand the hardware that keeps everything running. Misinformation about firewalls […]
Taking Your Nonprofit to the Cloud!

As a nonprofit, you are frequently responsible for doing more with less. Saving time, money, and effort is essential to maintaining and expanding your reach with limited manpower and funding. One of the most accessible ways to do that is through the technology department. In part one of our series for nonprofit organizations, we discussed […]