Learn: What Is MFA and Why Do I Need It?

What is MFA or 2FA?

Multi-factor authentication (MFA), also known as two-factor authentication (2FA), is now the industry-standard solution for keeping your accounts safe—and for good reason. It feels like every week there’s another report of a data breach exposing thousands or millions of usernames, passwords, and other personal identifiable information (PII). If you’ve ever reused a password, multiple accounts could be […]

Byte-Size Tech: You’re Invited to a Webinar that Contains Your Secret Weapon

Amy and Ryenn Webinar

Thursday, Dec. 16, Ryenn Gaebler of Anderson Technologies and Eric Torres of Datto will sit down for a 30-minute educational conversation about your secret weapon in the war against cybercrime. Learn about the latest threats and real-world solutions to protect yourself. Plus, there’s a chance to win a $500 gift card! And you’re invited. Click […]

Byte-Size Tech: You’re Invited to a Webinar that Could Save Your Business

Managed IT Services protects your business

https://vimeo.com/604073580 This Thursday, Sept. 16, Libby Powers of Anderson Technologies and Eric Torres of Datto sit down for a 30-minute educational conversation about the biggest threat to your business today: Ransomware. Learn about the latest threats and real-world solutions to protect yourself. Plus, there’s a chance to win a $250 Visa gift card! And you’re […]

Learn: How to Reduce Risk and Secure Your IoT Devices

Smart Tablet with Apps

Click Here to Read the Learn Page Internet of Things (IoT) devices provide a service to the user, but also provide a glut of information for developers. Developers state that the information collected is a tool for honing services and enhancing user experience, but this information is also worth a lot of money to them […]

Learn: How to Identify Phishing and BEC Emails

caught in a net

Read More About Phishing and BEC Emails Email is fast-paced and an essential part of work communication. It is also one of the biggest vectors for cyber threats. How can you sort the scams from legitimate emails?

Learn: How to Maintain a Secure Work from Home Environment

remote worker on a video call

Learn How to Stay Secure While Working From Home Some important reminders and guidelines to follow for any business focused on IT security, but our guide on maintaining a secure work environment from home is especially prescient for those seeking flexible options for their employees!

Learn: What Is Managed IT Services?

Managed IT Services Solution

Learn all about the managed services model of IT support, and understand the differences and benefits when compared to the traditional “break/fix” model. What Is Managed IT Services?

Learn: What Is Phishing?

Pink phishing lure

Learn all about phishing and how to prevent your employees from clicking on a dangerous lure in Anderson Technologies’ new phishing explainer. What Is Phishing?