Preparation and Recovery: Working Through Hurricane Ian

protection through hurricane

An Interview with Senior Project Manager Eric Dischert AT: Hurricane Ian has been rough for many. Last week’s landfall in Florida affected some of our clients there. How did we work with them to help prepare? ED: First off, our thoughts and prayers go out to those affected by this terrible storm! We manage IT […]

SoPhishTicated Attack: An Analysis

credit card hooked

By Founding Principal Mark Ian Anderson In July, one of our general business inboxes received the email below. Initial review gave the recipient some pause, but there was enough legitimacy to prompt further investigation. Here’s a breakdown of what I looked at and the conclusion I came to. First, let’s review some items in this […]

Compliance, Automation, and More: An Interview with IT Director Luke Bragg

IT Director Luke Bragg

By Client Success Manager Ryenn Gaebler With giant data breaches perpetually in the news, it can be overwhelming to sift through cybersecurity information and updates. Once you think you’re caught up on the latest threats, a dozen more appear. I wanted to learn more about the IT issues our clients are facing in the current […]

Updated for 2023! Our Most Popular Ebook

Cybersecurity training ebook graphic

Is your business one click away from disaster? When it comes to cybersecurity, your defenses are only as good as your employees. Even a well-meaning click could provide network access to cybercriminals. What can you do about it? At Anderson Technologies, we know the importance of employee training as a vital part of your business […]

MFA – An Extra Layer of Digital Protection [Updated for 2022]

Dog on a laptop

What do logging into Netflix from a new device, updating your PayPal account information, answering questions about your first car before accessing your iTunes account, and withdrawing money at an ATM all have in common? Authentication! The National Institute of Standards and Technology (NIST) creates guidelines for passwords and the software that requires them, which […]

What Is Your Data Worth?

What is your data worth?

Is your undivided attention worth the price of a movie ticket? Is the convenience of a mobile app worth the information and behavior it tracks? Technology is more reliant on data than it’s ever been. Whether it is gathered through surveys or automated tracking, data drives business and technology. If huge chunks of data can […]

What Ingredient Is Your Cybersecurity Sandwich Missing?

turkey sandwich artfully placed

By Founding Principal Amy Anderson When was the last time you had a great sandwich? Not just any sandwich, but a truly divine sandwich: The right amount of crunch, spices, and condiments. Every flavor balanced and complemented perfectly by the other ingredients. Each bite singing with all your favorite tastes. Your business’s cybersecurity should be […]

Scams for the Holidays

wrapped gift on mouse trap

By Content Specialist Marcia Spicer Ah, the winter holidays. Traditionally a time of joy and celebration, but more often a time of stress, spending, shipping, scrambling to cover time off, and, yes, scams. Unless you’re fascinated by them like I am, getting scammed is probably the last thing on your mind at any given time. […]

Scam Alert! The Rise in SMSishing Fraud Texts

Woman receives a suspicious SMSishing text

By Systems Administrator Ben Fairbanks Have you been receiving suspicious text messages lately? If so, you aren’t alone. In late 2020, the FCC strengthened the Telephone Consumer Protection Act of 1991 (TCPA) by adding more regulations as part of the TRACED Act (Telephone Robocall Abuse Criminal Enforcement and Deterrence) which basically adds a ton more […]