Security & Compliance

Cybersecurity experts agree that having a security breach has become a matter of “not if, but when,” for many organizations.

On this page:

Keychain
Foundations Protect

Foundations Protect

Foundations Protect ensures that your devices are continually patched, updated and protected against known threats. We leverage pre-existing or custom-built profiles to map to specific threat types, defining the right security strategy and tactics to keep you protected. We’ll determine what technologies and solutions should be in place, and set advanced alerting and risk scoring to accurately measure your business’ risk threshold. In addition to proactively monitoring and alerting to threats, Foundations Protect includes on-demand online Security Awareness Training for your team, and DNS protection.

View all of our Foundations Managed IT Services >

Foundations Sentry

Foundations Sentry

Foundations Sentry provides you with daily monitoring and threat detection as well as regular reporting, analysis and strategic guidance to help minimize your risk. Using trend monitoring, threat analysis and early detection, we can help minimize disruption to your business, loss of data and irreparable damage to your company’s reputation in the event of a security incident.

With Foundations Sentry, your systems are monitored 24x7x365 by comprehensive security management software, updated continuously with the latest global threat intelligence. If there is a legitimate threat to your business, our security analysts alert you and provide recommendations for how to protect your systems. On a monthly basis, you will receive a summary report showing all alerts identified within the period, including ADNET’s recommendations for reducing the risk to your systems.

View all of our Foundations Managed IT Services >

Eye

Security Awareness Training

In 2016, the average cost of a data breach was $4 million, with the cost of each stolen record exceeding $150, according to IBM. The long-term impact of one security breach, including damage to your reputation and loss of customer trust, could put the future of your business at risk.

One of the easiest and most affordable ways to help prevent a breach is through education. ADNET offers easy-to-understand Security Awareness Training designed for business owners and their teams. Our security analysts will teach you simple, practical ways to protect yourself and your company’s data, including an overview of today’s top threats, guidance on how to respond to an attack and protecting yourself online.

Stethoscope in Doctor's Office

HIPAA Compliance

Complying with the Health Insurance Portability and Accountability Act (HIPAA) is a requirement for many organizations. ADNET has a CHPSE (Certified HIPAA Privacy & Security Expert) on staff who can work with you to determine prioritized risks to your business and develop a sound HIPAA compliance program to meet your needs. Whether you’re new to HIPAA, or participate in the ongoing efforts of maintaining compliance, we can help you.

Turnstile

Vulnerability Scanning

Every weakness in your network is an open invitation to hackers. ADNET recommends an Internal/External Vulnerability Scan when you need to determine how vulnerable your network might be to an attack. Using the latest technologies, we scan the most important assets on your internal and/or external network, looking for flaws that could be exploited.

At the conclusion of the Internal/External Vulnerability Scan, you will receive a detailed report of our findings and analysis, with each risk clearly explained and categorized by priority – high, medium and low. We’ll also present our recommendations for how to deal with each weakness and mitigate your overall risk.

Risk Assessments

Organizations that fall under medical, financial, or other regulatory compliance requirements need to understand exactly how susceptible they might be to security threats.

A Risk Assessment is a comprehensive way to determine your level of exposure and plan for the steps you need to take to protect your business. Using the latest technologies, we perform a Vulnerability Scan of your network, then look for weaknesses and flaws in technology, software, policies and procedures throughout your organization. At the conclusion of the Risk Assessment, we present you with a detailed report showing the likelihood of a security incident and its potential impact on your organization, as well as our recommendations for improving your overall security.

Laptop

Penetration Testing

Any organization working with high risk data such as healthcare, insurance or financial information needs to know for certain that their systems, policies and procedures are adequate to protect their data.

A Penetration Test, or “Pen Test,” can ensure confidence for your business. Penetration Testing begins with an assessment of the network and identification of any weaknesses. At your request, ADNET’s Certified Ethical Hackers will attempt to safely exploit vulnerabilities in your network in order to show how a hacker might gain access to your systems or conduct a malicious attack. In addition to highlighting susceptible areas, a Pen Test can also validate effective systems, policies and procedures as well as conclusively show how your employees respond to potential security threats.

Shredded Paper

Security Policy Review & Development

Your organization’s first line of defense when it comes to employee compliance with various requirements is a robust Security Policy written with your company in mind. Whether you have an existing policy and just want to make sure that it’s up to date and comprehensive enough to protect your business, or you’re looking to implement one for the first time, ADNET can help.

Our Security Team can assist you in reviewing and developing a policy that suits the needs of your organization, covering everything from password management to external devices. We’ll help you understand what you should be asking of your employees, and how it can protect your business.

“Tim Weber spoke to our group on Cyber Security during our Annual Meeting in July 2017. We appreciated that Tim spoke with terms we could understand and was willing to answer any and all of our questions on this very important topic. The presentation was informative, helpful, interesting and fun. I heard nothing but positive comments from my staff.”

Veronica Tiedt, Nirenstein, Director of Administration, Nirenstein, Horowitz & Associates P.C.

 

Meet Our Team

Christopher J. Luise
Christopher J. Luise
Co-CEO
Read Bio >
Tim Weber
Tim Weber
Director, Security Services
Read Bio >
Eric Monda
Eric Monda
IT Security Analyst
Read Bio >
Andrew Warren
Andrew Warren
Director, Professional Services
Read Bio >
Danielle Hernandez
Danielle Hernandez
Business Technology Advisor
Read Bio >
Amy Zimmermann
Amy Zimmermann
Junior IT Security Analyst
Read Bio >

What We're Thinking: Security

Read our thoughts on the latest security trends and vulnerabilities, along with recommendations from our Security Team on how to protect yourself and your business.

Faxploit: Yes, Your Fax Machine Really Is a Threat

When we talk about network security, we tend to focus our attention on the most critical components of the network, such as firewalls, routers and servers. In reality, any device that’s on the network can be an entry point for the bad guys. Our concern today is with fax machines – yes, fax machines – and the vulnerability they can

Read More >

When Giving Up the Internet Isn’t an Option: 12 Tips for Safe Browsing

We are on the internet constantly – according to USC Annenberg’s 2017 Digital Future Report, the average American spends about 23.6 hours online a week. In this digital age, it’s not really all that surprising. You can do nearly anything you need to do via the internet, from banking to entertainment, shopping to research, and work to school. With so much of our lives spent online, it’s easy to forget one crucial fact: The internet can be dangerous. There is no way to protect yourself 100% from bad websites. However, there is a lot you can do to decrease your risk. Take a look at some of these tips to help keep you safe while browsing the internet.

Read More >

The Spam Email Stigma: You’re Not an Idiot if You Fell For It

With phishing attempts and spam emails becoming more sophisticated every day, they’re getting better at tricking people. Even the smartest person can easily make a mistake and click on something they shouldn’t. So rest assured, you’re not an idiot if you fall prey to a phishing attempt – here’s why.

Read More >

Why Are Attackers Targeting O365? It’s Where the “Money” Is.

We are seeing a huge spike in phishing attacks against Office 365 users. Why O365? Simple, it’s where the users are now. In 2017, Microsoft reported that their monthly active user count surpassed 100 million users. In the words of Maverick (from Top Gun), “that’s what I call a target rich environment.”

Read More >

Negligence and Misconduct: The State of Cybersecurity Breaches

Not a day goes by that I do not see another security breach or system flaw being released. On Thursday, September 7, Equifax announced a major data breach affecting records for as many as 143 million American consumers. Nearly half the U.S. population may have had their Social Security numbers, drivers license numbers, birth dates, addresses and other sensitive information

Read More >

My First Job Was at a Pizza Shop: Creating Strong Passwords

Over the past few years, strong passwords have become increasingly important. But who can memorize all those passwords? There are a few simple things to keep in mind when creating secure passwords and choosing tools to manage them.

Read More >