The True Cost of a Data Breach

by IT Director Luke Bragg * The figures presented below come from Cost of a Data Breach Report 2022, an annual analysis of data breaches conducted by the Ponemon Institute and published by IBM Security. The last thing anyone wants to imagine is a data breach happening to their company, but it’s getting to be […]

What Is Your Data Worth?

What is your data worth?

Is your undivided attention worth the price of a movie ticket? Is the convenience of a mobile app worth the information and behavior it tracks? Technology is more reliant on data than it’s ever been. Whether it is gathered through surveys or automated tracking, data drives business and technology. If huge chunks of data can […]

Learn: What Is MFA and Why Do I Need It?

What is MFA or 2FA?

Multi-factor authentication (MFA), also known as two-factor authentication (2FA), is now the industry-standard solution for keeping your accounts safe—and for good reason. It feels like every week there’s another report of a data breach exposing thousands or millions of usernames, passwords, and other personal identifiable information (PII). If you’ve ever reused a password, multiple accounts could be […]

Scams for the Holidays

By Content Specialist Marcia Spicer Ah, the winter holidays. Traditionally a time of joy and celebration, but more often a time of stress, spending, shipping, scrambling to cover time off, and, yes, scams. Unless you’re fascinated by them like I am, getting scammed is probably the last thing on your mind at any given time. […]

Byte-Size Tech: Essential Tips for Safer Online Shopping

Are your shopping habits putting business data at risk?

HTTPS? SSL? Targot.com? What about those pop-up businesses that advertise on social media? Libby Powers and Marcia Spicer of Anderson Technologies break down some essential tips and potential problems to watch out for when shopping online. If you’re worried that your shopping or surfing habits have compromised your business, contact Anderson Technologies today. Related Reading […]

Opting Out: Keeping Your Personal Data Private

Padlock made of people

What does your phone know about you? What about your email or your browser? What can strangers—or scammers—find out about you with a quick search? This is called your digital footprint, and for the security- or data-conscious consumer, this is old news. What might not be old news are the many ways to be aware […]

Learn: How to Reduce Risk and Secure Your IoT Devices

Smart Tablet with Apps

Click Here to Read the Learn Page Internet of Things (IoT) devices provide a service to the user, but also provide a glut of information for developers. Developers state that the information collected is a tool for honing services and enhancing user experience, but this information is also worth a lot of money to them […]

A New Browser from Microsoft

microsoft edge

Here’s what might make it worth the download. Since Internet Explorer hit peak saturation in 2003 with 95% of market share, Microsoft has been in a bit of a browser rut. Mozilla Firefox usage hit its peak in 2009, and the other major competitor, Google Chrome, is the current favorite with 69% of market share […]