Learn: What Is MFA and Why Do I Need It?

What is MFA or 2FA?

Multi-factor authentication (MFA), also known as two-factor authentication (2FA), is now the industry-standard solution for keeping your accounts safe—and for good reason. It feels like every week there’s another report of a data breach exposing thousands or millions of usernames, passwords, and other personal identifiable information (PII). If you’ve ever reused a password, multiple accounts could be […]

Scam Alert! The Rise in SMSishing Fraud Texts

Woman receives a suspicious SMSishing text

By Systems Administrator Ben Fairbanks Have you been receiving suspicious text messages lately? If so, you aren’t alone. In late 2020, the FCC strengthened the Telephone Consumer Protection Act of 1991 (TCPA) by adding more regulations as part of the TRACED Act (Telephone Robocall Abuse Criminal Enforcement and Deterrence) which basically adds a ton more […]

The Murky World of Cyber Insurance [Updated for 2021]

Surprising Facts about Cyber Insurance

[This article is meant to be used as general information and guidance. Anderson Technologies is not a legal advisor or cyber insurance provider, and we recommend businesses use those resources when making insurance decisions.]  Worried about the damage and downtime a ransomware attack could have on your business? You and many other business owners are […]

Diagnosing the Ransomware “Problem”

Day after day, new stories of ransomware shutting down companies and governments fill our news cycle and often end with million-dollar ransoms being paid to cybercriminals. The threat of ransomware can feel overwhelming. How should business owners keep this terrible problem from attacking them? What if the answer to that question was to stop focusing […]

What Will You Do When Ransomware Holds Your Business Captive?

Searching for Clues for Ransomware Protection and Recovery

Anne Neuberger the Deputy Assistant to the President and Deputy National Security Advisor for Cyber and Emerging Technology released a memo, “What We Urge You To Do To Protect Against The Threat of Ransomware,” detailing what both public and private businesses should do to combat the ransomware threat. Read now to learn cybersecurity best practices […]

Byte-Size Tech: Don’t Get Zoom-Bombed!

Don't get Zoom Bombed at your next meeting

https://vimeo.com/514332080 Mark Anderson and Libby Powers chat about Zoom best practices and share the story of a client who recently got Zoom-bombed after posting the details of their call publicly. Zoom has some security features baked in, but be sure to toggle them and use the tips Mark and Libby share to ensure you have […]

5 Tips for Security-Conscious Zooming

Don't get Zoom Bombed at your next meeting

https://vimeo.com/572257152 Last year when the COVID-19 pandemic restricted our ability to connect in person, we all became very familiar with the video conferencing software Zoom. No one could have predicted that a significant chunk of business in 2020 would be conducted through webcams and video calls. Schools, universities, and businesses have chosen Zoom out of […]

Busting Business Email Compromise

Stop Business Email Compromise

In cyber security circles, Ubiquiti Networks, manufacturer of wired and wireless network devices, is infamous for more than their products. Over a period of 17 days and 14 wire transfers in 2015, $46.7 million was transferred out of Ubiquiti’s coffers to criminals’ bank accounts based on a made-up acquisition in an elaborate Business Email Compromise […]

Learn: How to Reduce Risk and Secure Your IoT Devices

Smart Tablet with Apps

Click Here to Read the Learn Page Internet of Things (IoT) devices provide a service to the user, but also provide a glut of information for developers. Developers state that the information collected is a tool for honing services and enhancing user experience, but this information is also worth a lot of money to them […]