Archives: Security

Cybersecurity for Email: Good Mailbox Hygiene

Email Cybersecurity: 4 Tips for Good Mailbox Hygiene

Stop Using Internet Explorer

Top 5 Reasons to Stop Using Internet Explorer

Garmin Ransomware Attack

The Garmin Ransomware Attack: A User’s Perspective

COVID-19 iOS 13.5 exposure logging feature with Bluetooth icon

What We Know About Exposure Notification Security

secure passwords

World Password Day 2020: Secure Passwords Are Still Important

Contact Tracing

Contact Tracing, Privacy and COVID-19

Protect Yourself from Zoombombing

How to Protect Yourself from Zoombombing

New York State SHIELD Act 2020

How Does the SHIELD Act Affect Your Business?

working from home cybersecurity

Working from Home: Cybersecurity Safety During COVID-19

Patch Tuesday

How Important Was This Microsoft Patch Tuesday?

Windows 7 Update

Microsoft Windows 7 Announcement May Change Upgrade Plans

Christopher J. Luise SOC 2 Audit

Why ADNET Went Through a SOC 2 Type II Audit

ADNET Technologies Joins Far-Reaching Initiative to Promote Online Safety and Privacy for National Cybersecurity Awareness Month

cybersecurity for small businesses

State of Cybersecurity for Small to Midsized Businesses (SMBs)

dwell time

Unwelcome Guests: What is Dwell Time in IT Security?

Ransomware protection

Ransomware Protection: It’s Still a Thing

Multi-Factor Authentication Solution

Why You Should Consider 3rd Party Multi-Factor Authentication Solutions

MSP Alliance Member Company Logo

ADNET Technologies to Undergo SOC 2 Type II, International MSP & Cloud Certification

Good Password Hygiene

Keeping Your Passwords Squeaky-Clean: 5 Tips for Good Password Hygiene

Donuts

Favorite (Cyber) Things: Dunkin’, Marriott and USPS Breaches

Shop - Shopping Bags with gifts

Shop Safely this Holiday Season with These Online Shopping Tips for 2018

Binoculars

How to Protect Yourself from “Sextortion” Scams

boarded up window with bars

What is This MFA Thing, and Why Do We Need It?

Sneaker stepping on banana peel on floor

Why Training Your Employees in Security Isn’t Optional

Datacenter and Cloud Infrastructure

Microsoft Extends Security Updates for Windows Server 2008 and SQL Server 2008 with Azure Migration

Microsoft Azure Services

The 3 Most Important Considerations of Your IT Strategy: How Microsoft Azure Services Can Check the Boxes

fax machine and printer

Faxploit: Yes, Your Fax Machine Really Is a Threat

Life Saver on Boat Dock

When Giving Up the Internet Isn’t an Option: 12 Tips for Safe Browsing

J. Fiereck Photography

ADNET Technologies Expands its IT Security Division

No Junk Mail

The Spam Email Stigma: You’re Not an Idiot if You Fell For It

Spear Phishing

Gone (Spear) Phishing

VPNFilter: Reboot, but Don’t Panic

EFAIL Email Encryption Vulnerability

EFAIL: Keep Calm and Don’t Disable Your Email Encryption

Digital Forensics

Digital Forensics: A Brief Overview

Online Privacy: YOU Are The Product

Online Privacy: YOU Are The Product

Fake Microsoft Email Phishing Attempt

O365 Phishing Emails Have Arrived

United States Currency

Why Are Attackers Targeting O365? It’s Where the “Money” Is.

Wi-Fi Enabled Gadgets

How to Safely Use Your New Wi-Fi Enabled Gadgets

Checklist

Corporate Security Checklist

NYDFS New York Wall Street Sign

We Can All Learn From NYDFS Mandatory Cyber Security Regulations

Target

Negligence and Misconduct: The State of Cybersecurity Breaches

Whole Pizza on Table

My First Job Was at a Pizza Shop: Creating Strong Passwords

Record Player Image

For the (1980’s) Record, Patching Your Systems is Crucial

Chain with breaking link

The Weakest Link

Global Security Event

Post Cyber Event Analysis: What Did We Learn?

Wallet and Credit Card

Social Engineering? Who Falls For That?

Apple MacBook and Mouse

Mac OS X Malware: It’s heeeeere.

Remote Desktop Connection dialogue box

Why You Should Immediately Stop Using Remote Desktop Protocol (RDP)

Hardware Store Keys

Information Security Risk from a Small Business Perspective

Abstracted code on laptop screen

Online Privacy is a Joke

Escalators in Shopping Mall

Seeing Red on Black Friday

Fishing Line on net with tackle box

Don’t Let This Phishing Technique Lure You In

Business Executive

It’s 10:00 PM, Do You Know Where Your CEO Is?

Gate with Chain

Abandon all hope…

Email At Sign

Why Email Breaches Are a Big Deal

Combination lock sitting on laptop keyboard

Why Cryptolocker is More Alarming Than the Target Breach

Microsoft Error Blue Screen

Fake Microsoft Security Support Scam