Category: Security

Mind the Gap warning on platform

Compliance: It’s Not Just for Healthcare

 |   |  Business & Strategy, Security

Almost every business has some sort of need based around compliance – a set of guidelines commonly determined by industry. These guidelines, laws and best practices are put in place to protect your business, your clients and your partners, and the critical information being shared. Here is an overview of some of the most common compliance regulations organizations may fall under, and examples of how these regulations could impact your business.

Read More >

Donuts and coffee in an office

Favorite (Cyber) Things

 |   |  Security

Donuts, Marriott stays and stamps  – these are a few of my favorite things. Yeah, that didn’t work as well as I had hoped… Any idea what these three things have in common? If you were to guess a data breach, then you’d be 100% correct!

Read More >

Shopping Bags with gifts

Shop Safely this Holiday Season with These Online Shopping Tips for 2018

 |   |  Security

As we prepare for Black Friday, Cyber Monday and the e-commerce-heavy holiday season in general, there is no shortage of opportunities for criminals to benefit when online shoppers let their guard down. Following these tips will help you have a safe holiday season while still allowing you to do your shopping from the comfort of your own home or office.

Read More >

Binoculars

How to Protect Yourself from “Sextortion” Scams

 |   |  Security

Attackers have recently found a way to use an old password in a new scam. A particularly sinister tactic, dubbed a “sextortion” scam, has been on the rise lately. In this blog, ADNET takes a closer look at how the attack works and how to handle it if you are targeted.

Read More >

boarded up window with bars

What is This MFA Thing, and Why Do We Need It?

 |   |  Security

Multi-factor authentication (sometimes referred to as MFA or 2FA for two-factor authentication) can be implemented with some sites, applications and services to make your accounts more secure. It works by requiring two separate credentials to be given in order to prove your identity.

Read More >