Byte-Size Tech: Essential Tips for Safer Online Shopping

Are your shopping habits putting business data at risk?

HTTPS? SSL? Targot.com? What about those pop-up businesses that advertise on social media? Libby Powers and Marcia Spicer of Anderson Technologies break down some essential tips and potential problems to watch out for when shopping online. If you’re worried that your shopping or surfing habits have compromised your business, contact Anderson Technologies today. Related Reading […]

Opting Out: Keeping Your Personal Data Private

Padlock made of people

What does your phone know about you? What about your email or your browser? What can strangers—or scammers—find out about you with a quick search? This is called your digital footprint, and for the security- or data-conscious consumer, this is old news. What might not be old news are the many ways to be aware […]

Learn: How to Reduce Risk and Secure Your IoT Devices

Smart Tablet with Apps

Click Here to Read the Learn Page Internet of Things (IoT) devices provide a service to the user, but also provide a glut of information for developers. Developers state that the information collected is a tool for honing services and enhancing user experience, but this information is also worth a lot of money to them […]

Learn: What Is MFA and Why Do I Need It?

What is MFA or 2FA?

Multi-factor authentication (MFA), also known as two-factor authentication (2FA), is now the go-to solution for keeping your accounts safe and for good reason. It feels like every week there’s another report of a data breach exposing thousands or millions of usernames and passwords. If you’ve ever reused a password, multiple accounts could be in danger […]

A New Browser from Microsoft

microsoft edge

Here’s what might make it worth the download. Since Internet Explorer hit peak saturation in 2003 with 95% of market share, Microsoft has been in a bit of a browser rut. Mozilla Firefox usage hit its peak in 2009, and the other major competitor, Google Chrome, is the current favorite with 69% of market share […]

Working from Home Due to COVID-19: Keep Your Company Data Protected

Working from your digital home

Over the past weeks, we’ve worked with many of you to add or increase your work-from-home capabilities as a result of the COVID-19 pandemic. This move not only helps keep our coworkers safe but also our families and the greater community. As our team burns the midnight oil to do our part, our thoughts and […]

The Ultimate Guide to Secure Remote Work [Updated for 2020]

The ultimate guide to secure remote work and telework

With the coronavirus in the news, more businesses than ever are considering whether telework is a viable option for their company and employees. But with new cyber threats and data breaches constantly reported, business owners have to ask themselves, How do I maintain my cyber security when my employees work remotely? Whether you have one […]

Ransomware as a Service: When Criminals Mimic Corporations

Cyber Security St. Louis Ransomware Small Business

When you imagine cyber criminals planning ways to infect hundreds of thousands of computers, you probably don’t picture sophisticated marketing operations and software licensing, but you’d be surprised. The black market on the Dark Web is much like any other online store where you purchase goods, only its products are more nefarious. Cyber criminals copy […]

HIPAA Part 6: Plan for the Worst

HIPAA guidelines help you to plan for the worst

No one likes to think they’ll suffer a disaster, a ransomware attack, or a data breach, but hope isn’t enough to satisfy HIPAA. The question is no longer if something will happen, but when. HIPAA expects you to plan, prepare, test, and be ready for anything that could disrupt the confidentiality, integrity, or availability of […]