Security & Compliance

Our dedicated Cybersecurity team and services help to
DEFEND your business against today’s cyber threats,
DETECT cybersecurity attacks in real time and
RESPOND if your business is affected by a cybersecurity event.

On this page:

Rope Keychain with multiple keys

ADNET Technologies 14 Ways to Protect Your Business from a Cyber Attack

ADNET Technologies Foundations Security

Foundations Cybersecurity Services

Foundations Cybersecurity Services provide the protection that your business needs in the global landscape of cybersecurity threats such as ransomware attacks, malware, phishing attacks, social engineering and more.

Foundations Cybersecurity Services include:

  • Foundations Protect
  • Foundations Sentry
  • Foundations Detect + Respond

Learn More >


Security Awareness Training

The cost of a data breach continues to rise each year. In 2018, the average cost of a data breach was $3.86 million, according to IBM. The same study reports that the average cost of each stolen record was $148 in 2018, a 4.8 percent increase from 2017 (source: IBM Security and Ponemon Institute). The long-term impact of one security breach, including damage to your reputation and loss of customer trust, could put the future of your business at risk.

One of the easiest and most affordable ways to help prevent a breach is through education. ADNET offers easy-to-understand Security Awareness Training designed for business owners and their teams, with the option for in-person or online delivery. Our security analysts will teach you simple, practical ways to protect yourself and your company’s data, including an overview of today’s top threats, guidance on how to respond to a cyber attack and protecting yourself online.

Subway Turnstile

Vulnerability Assessments

Every weakness in your network is an open invitation to hackers. ADNET recommends an Internal/External Vulnerability Assessment when you need to determine how vulnerable your network might be to an attack. Using the latest technologies, we scan the most important assets on your internal and/or external network, looking for flaws that could be exploited.

At the conclusion of the Internal/External Vulnerability Assessment, you will receive a detailed report of our findings and analysis, with each risk clearly explained and categorized by priority – high, medium and low. We’ll also present our recommendations for how to deal with each weakness and mitigate your overall risk.

Wire fence with insulator

Risk Assessments

Organizations that fall under medical, financial, or other regulatory compliance requirements need to understand exactly how susceptible they might be to cybersecurity threats.

A Risk Assessment is a comprehensive way to determine your level of exposure and plan for the steps you need to take to protect your business. Using the latest technologies, we perform a Vulnerability Scan of your network, then look for weaknesses and flaws in technology, software, policies and procedures throughout your organization. At the conclusion of the Risk Assessment, we present you with a detailed report showing the likelihood of a security incident and its potential impact on your organization, as well as our recommendations for improving your overall security.

Abstracted laptop showing code

Penetration Testing

Any organization working with high risk data such as healthcare, insurance or financial information needs to know for certain that their systems, policies and procedures are adequate to protect their data.

A Penetration Test, or “Pen Test,” can ensure confidence for your business. Penetration Testing begins with an assessment of the network and identification of any weaknesses. At your request, ADNET’s Certified Ethical Hackers will attempt to safely exploit vulnerabilities in your network in order to show how a hacker might gain access to your systems or conduct a malicious cyber attack. In addition to highlighting susceptible areas, a Pen Test can also validate effective systems, policies and procedures as well as conclusively show how your employees respond to potential cybersecurity threats.

Shredded Paper

Security Policy Review & Development

Your organization’s first line of defense when it comes to employee compliance with various requirements is a robust Security Policy written with your company in mind. Whether you have an existing policy and just want to make sure that it’s up to date and comprehensive enough to protect your business, or you’re looking to implement one for the first time, ADNET can help.

Our Security Team can assist you in reviewing and developing a policy that suits the needs of your organization, covering everything from password management to external devices. We’ll help you understand what you should be asking of your employees, and how it can protect your business.

“Tim Weber spoke to our group on Cyber Security during our Annual Meeting in July 2017. We appreciated that Tim spoke with terms we could understand and was willing to answer any and all of our questions on this very important topic. The presentation was informative, helpful, interesting and fun. I heard nothing but positive comments from my staff.”

Veronica Tiedt, Nirenstein, Director of Administration, Nirenstein, Horowitz & Associates P.C.


Meet Our Cybersecurity Team

Christopher J. Luise
Christopher J. Luise
Read Bio >
Tim Weber
Tim Weber
Director, Security Services
Read Bio >
Eric Monda
Eric Monda
Senior IT Security Analyst
Read Bio >
Kristopher Peterson
Kristopher Peterson
IT Security Analyst
Read Bio >
Thomas Maynard
Thomas Maynard
Jr. IT Security Analyst
Read Bio >

What We're Thinking: Security

Read our thoughts on the latest security trends and vulnerabilities, along with recommendations from our Cybersecurity Team on how to protect yourself and your business.

Why ADNET Went Through a SOC 2 Type II Audit

As a CEO in the IT industry, I feel a deep responsibility to ensure that our organization knows the risks and takes every step possible to protect the clients trusting us with their business. That’s why we decided to put ADNET through one of the most rigorous third-party audits available in our field – SOC 2 Type II. 

Read More >

State of Cybersecurity for Small to Midsized Businesses (SMBs)

The good news is, there are things you can do to protect yourself and your company from today’s evolving cybersecurity threats, and all of them involve making yourself a more difficult target. Remember that for hackers, cybercrime is a business.

Read More >

Unwelcome Guests: What is Dwell Time in IT Security?

Dwell time, in the context of IT security, is the number of days a threat remains undetected within a given environment. Why does this matter as a metric? The amount of time that a system has been compromised can impact the overall severity of the security event in several ways.

Read More >

Ransomware Protection: It’s Still a Thing

Are you tired of hearing about ransomware? We are too, but unfortunately, ransomware is still a thing. Anyone can be affected by a ransomware attack. There is no industry discrimination. It does not matter what size your company is, or what role you’re in. I’m sure you have seen or read about the recent ransomware attack in the Capital Region. Events like this are happening every day, both globally and right in our very own backyard.

Read More >

The Spam Email Stigma: You’re Not an Idiot if You Fell For It

With phishing attempts and spam emails becoming more sophisticated every day, they’re getting better at tricking people. Even the smartest person can easily make a mistake and click on something they shouldn’t. So rest assured, you’re not an idiot if you fall prey to a phishing attempt – here’s why.

Read More >

Why You Should Consider 3rd Party Multi-Factor Authentication Solutions

When evaluating an MFA solution for Office 365, there are several options ranging from Microsoft’s built-in MFA to third party solutions. ADNET chose to standardize on a third-party solution from Duo and we recommend it for most clients over Microsoft’s integrated MFA.

Read More >