What Will You Do When Ransomware Holds Your Business Captive?

Searching for Clues for Ransomware Protection and Recovery

Anne Neuberger the Deputy Assistant to the President and Deputy National Security Advisor for Cyber and Emerging Technology released a memo, “What We Urge You To Do To Protect Against The Threat of Ransomware,” detailing what both public and private businesses should do to combat the ransomware threat. Read now to learn cybersecurity best practices […]

Byte-Size Tech: Don’t Get Zoom-Bombed!

Don't get Zoom Bombed at your next meeting

Mark Anderson and Libby Powers chat about Zoom best practices and share the story of a client who recently got Zoom-bombed after posting the details of their call publicly. Zoom has some security features baked in, but be sure to toggle them and use the tips Mark and Libby share to ensure you have the […]

5 Tips for Security-Conscious Zooming

Don't get Zoom Bombed at your next meeting

Last year when the COVID-19 pandemic restricted our ability to connect in person, we all became very familiar with the video conferencing software Zoom. No one could have predicted that a significant chunk of business in 2020 would be conducted through webcams and video calls. Schools, universities, and businesses have chosen Zoom out of the […]

Busting Business Email Compromise

Stop Business Email Compromise

In cyber security circles, Ubiquiti Networks, manufacturer of wired and wireless network devices, is infamous for more than their products. Over a period of 17 days and 14 wire transfers in 2015, $46.7 million was transferred out of Ubiquiti’s coffers to criminals’ bank accounts based on a made-up acquisition in an elaborate Business Email Compromise […]

Learn: How to Reduce Risk and Secure Your IoT Devices

Smart Tablet with Apps

Click Here to Read the Learn Page Internet of Things (IoT) devices provide a service to the user, but also provide a glut of information for developers. Developers state that the information collected is a tool for honing services and enhancing user experience, but this information is also worth a lot of money to them […]

Learn: What Is MFA and Why Do I Need It?

What is MFA or 2FA?

Multi-factor authentication (MFA), also known as two-factor authentication (2FA), is now the go-to solution for keeping your accounts safe and for good reason. It feels like every week there’s another report of a data breach exposing thousands or millions of usernames and passwords. If you’ve ever reused a password, multiple accounts could be in danger […]

Quotables: Serious IT Considerations for a Post-COVID-19 World (HR Daily Advisor)

HR Daily Advisor

Click here to read the full article! Principal Amy O. Anderson is featured in HR Daily Advisor. Are you in need of expert IT consulting? Anderson Technologies is a St. Louis IT consulting firm that specializes in system administration for small businesses. Let us help you today! Give us a call at 314.394.3001 or email us at info@andersontech.com. What […]

A New Browser from Microsoft

microsoft edge

Here’s what might make it worth the download. Since Internet Explorer hit peak saturation in 2003 with 95% of market share, Microsoft has been in a bit of a browser rut. Mozilla Firefox usage hit its peak in 2009, and the other major competitor, Google Chrome, is the current favorite with 69% of market share […]

Ransomware as a Service: When Criminals Mimic Corporations

Cyber Security St. Louis Ransomware Small Business

When you imagine cyber criminals planning ways to infect hundreds of thousands of computers, you probably don’t picture sophisticated marketing operations and software licensing, but you’d be surprised. The black market on the Dark Web is much like any other online store where you purchase goods, only its products are more nefarious. Cyber criminals copy […]