Proven Tips and Strategies for Ransomware Prevention

Human Behavior Impacts Cyber Security

By IT Director Luke Bragg Are you aware that an invisible thief could be lurking in your computer right now, ready to strike at any moment? This thief is ransomware, malicious software designed to hold your data hostage. One moment you’re working on your computer, and the next, all your files are hijacked—inaccessible—and held for […]

What Is a Password Policy? Strengthening Your Business’s Cybersecurity Foundation

password breach category 1

In today’s digital landscape, businesses of all sizes are at risk of falling victim to cyberattacks. One of the most effective ways to protect your company’s sensitive data and IT infrastructure is by implementing a robust password policy. We’ll discuss what a password policy is, the elements that make a strong password and password policy, […]

The True Cost of a Data Breach

man exasperated with head on computer

by IT Director Luke Bragg * The figures presented below come from Cost of a Data Breach Report 2022, an annual analysis of data breaches conducted by the Ponemon Institute and published by IBM Security. The last thing anyone wants to imagine is a data breach happening to their company, but it’s getting to be […]

What Is Your Data Worth?

What is your data worth?

Is your undivided attention worth the price of a movie ticket? Is the convenience of a mobile app worth the information and behavior it tracks? Technology is more reliant on data than it’s ever been. Whether it is gathered through surveys or automated tracking, data drives business and technology. If huge chunks of data can […]

Learn: What Is MFA and Why Do I Need It?

What is MFA or 2FA?

Multi-factor authentication (MFA), also known as two-factor authentication (2FA), is now the industry-standard solution for keeping your accounts safe—and for good reason. It feels like every week there’s another report of a data breach exposing thousands or millions of usernames, passwords, and other personal identifiable information (PII). If you’ve ever reused a password, multiple accounts could be […]

Scams for the Holidays

wrapped gift on mouse trap

By Content Specialist Marcia Spicer Ah, the winter holidays. Traditionally a time of joy and celebration, but more often a time of stress, spending, shipping, scrambling to cover time off, and, yes, scams. Unless you’re fascinated by them like I am, getting scammed is probably the last thing on your mind at any given time. […]

Byte-Size Tech: Essential Tips for Safer Online Shopping

Are your shopping habits putting business data at risk?

HTTPS? SSL? Targot.com? What about those pop-up businesses that advertise on social media? Libby Powers and Marcia Spicer of Anderson Technologies break down some essential tips and potential problems to watch out for when shopping online. If you’re worried that your shopping or surfing habits have compromised your business, contact Anderson Technologies today. Related Reading […]

Opting Out: Keeping Your Personal Data Private

Padlock made of people

What does your phone know about you? What about your email or your browser? What can strangers—or scammers—find out about you with a quick search? This is called your digital footprint, and for the security- or data-conscious consumer, this is old news. What might not be old news are the many ways to be aware […]