Learn with Anderson Technologies
Does it feel like you and IT experts sometimes speak different languages?
At Anderson Technologies, communication and understanding are two key focuses of our work. We are committed to educating our clients and the public regarding the best practices we recommend, guides to tech-y topics, and tips to keep your network secure.
Below, find our helpful guides to IT, managed services, and all of your technological needs.

How to Maintain Security When Employees Work Remotely
Is remote work a long term possibility for your business? Working from home may be a convenient option for employees who need a flexible schedule or want to avoid long commutes, but events like the COVID-19 crisis have shown how essential it is for any business to have a secure plan for working from home.
Battle of the Brands: Microsoft Office 365 vs Google Workspace
Microsoft and Google are two of the most common technology foundations. Which one you choose can fundamentally change the way you and your employees operate. The decision is a big one and will impact your company for years to come. Whether you’re choosing in the early days of your business or considering a major switch, there are many aspects to consider when deciding on a suite of business software.
How to Identify Phishing and BEC Scam Emails
A message arrives. Maybe it is from someone within your company, someone who you trust and interact with frequently. Maybe it is from a vendor or acquaintance, someone who you don’t know well, but have no reason to doubt. You open the message.
What Is MFA and Why Do I Need It?
Multi-factor authentication (MFA), also known as two-factor authentication (2FA), is now the go-to solution for keeping your accounts safe and for good reason. It feels like every week there’s another report of a data breach exposing thousands or millions of usernames and passwords. If you’ve ever reused a password, multiple accounts could be in danger of unauthorized access from a single data breach. MFA helps keep accounts secure even if a password has been compromised.
How to Reduce Risk and Secure Your Internet of Things Devices
Chances are, you already own or have used an Internet of Things (IoT) device. You might know them as smart devices, internet-connect devices, or by another name, but these are all part of the Internet of Things. The term came into being long before these devices were ubiquitous in our daily lives...
What Are Best Practices For Mobile Device Use?
The modern office isn’t limited to the walls of your building. Perhaps in the past, it was possible to limit IT protections to desktop computers located inside a secure building, leaving you sure your data and processes were safe from attack. That is no longer the case...
What Are The Biggest Mobile Threats?
Even before the unprecedented shift to working from home in early 2020, increased usage of laptops, tablets, and smart phones for business and organizational applications has increased the number of attacks designed for and focused on mobile devices. Mobile devices, now more than ever, contain business-critical, sensitive, and confidential data.
What Does a Firewall Do For a Network?
There are two types of network security firewalls: hardware firewall and software firewall. While most people have used a software firewall, which is a program that is installed on a single workstation that protects the machine from within the network, your primary defense should actually be a hardware firewall. Like the fire wall that protects your office building, this is a physical device that is programmed to stop a threat before it even gets into the network.
How to Protect Your Data From Ransomware
As ransomware continues to penetrate companies through more sophisticated means, many businesses are looking for answers for how to protect their data from ransomware attacks each and every day.
Comparing Mobile Operating Systems
Each are powerful, competent versions of what is essentially the same thing, with different features and priorities for different users, and, between the two, they are dominating the mobile OS universe. Despite this duopoly, there are a few rebel OSs out there challenging the status quo. Let’s take a look at the similarities and differences between the two big mobile OSs available, and the small companies trying to break into the mobile marketplace.
What is Phishing?
Phishing is a cybercrime tactic that lures users into clicking bait disguised as something trustworthy, usually within emails. The result often causes the computer to download malware from unprotected or fake websites.
What is Managed IT Services?
Managed IT services helps business owners to outsource IT management. Working with a managed services provider (MSP) is an alternative to hiring full-time IT staff or managing your own IT. Managed IT services is also a proactive alternative to engaging “break/fix” services, where the outsourced IT personnel show up only when something is going wrong—often terribly wrong—and when it’s too late to save the hardware or data.

St. Louis IT Leaders Speak On Cybersecurity
IT for business can be confusing, frustrating, and costly. Are you worried you’re wasting resources on the wrong cybersecurity measures?

AI: Are We Planting the Seeds of the Robot Uprising?
Computer technology moves at a blazing pace. Blink once and the world of tech steps forward a light year. Blink

The Comfort of Correctly-Budgeted IT [Updated for 2023]
By IT Director Luke Bragg I know more than one business owner who feels overwhelmed trying to be an expert