Security & Compliance

Cybersecurity experts agree that having a security breach has become a matter of “not if, but when,” for many organizations.

On this page:

Rope Keychain with multiple keys
ADNET Technologies Foundations Protect

Foundations Protect

Foundations Protect ensures that your devices are continually patched, updated and protected against known threats. We leverage pre-existing or custom-built profiles to map to specific threat types, defining the right security strategy and tactics to keep you protected. We’ll determine what technologies and solutions should be in place, and set advanced alerting and risk scoring to accurately measure your business’ risk threshold. In addition to proactively monitoring and alerting to threats, Foundations Protect includes on-demand online Security Awareness Training for your team, Quarterly Phishing Campaigns and DNS protection.

View all of our Foundations Managed IT Services >

ADNET Technologies Foundations Sentry

Foundations Sentry

Foundations Sentry provides you with daily monitoring and threat detection as well as regular reporting, analysis and strategic guidance to help minimize your risk. Using trend monitoring, threat analysis and early detection, we can help minimize disruption to your business, loss of data and irreparable damage to your company’s reputation in the event of a security incident.

With Foundations Sentry, your systems are monitored 24x7x365 by comprehensive security management software, updated continuously with the latest global threat intelligence. If there is a legitimate threat to your business, our security analysts alert you and provide recommendations for how to protect your systems. On a monthly basis, you will receive a summary report showing all alerts identified within the period, including ADNET’s recommendations for reducing the risk to your systems.

View all of our Foundations Managed IT Services >

Eye

Security Awareness Training

The cost of a data breach continues to rise each year. In 2018, the average cost of a data breach was $3.86 million, according to IBM. The same study reports that the average cost of each stolen record was $148 in 2018, a 4.8 percent increase from 2017 (source: IBM Security and Ponemon Institute). The long-term impact of one security breach, including damage to your reputation and loss of customer trust, could put the future of your business at risk.

One of the easiest and most affordable ways to help prevent a breach is through education. ADNET offers easy-to-understand Security Awareness Training designed for business owners and their teams, with the option for in-person or online delivery. Our security analysts will teach you simple, practical ways to protect yourself and your company’s data, including an overview of today’s top threats, guidance on how to respond to an attack and protecting yourself online.

Stethoscope in Doctor's Office

HIPAA Compliance

Complying with the Health Insurance Portability and Accountability Act (HIPAA) is a requirement for many organizations. ADNET has a CHPSE (Certified HIPAA Privacy & Security Expert) on staff who can work with you to determine prioritized risks to your business and develop a sound HIPAA compliance program to meet your needs. Whether you’re new to HIPAA, or participate in the ongoing efforts of maintaining compliance, we can help you.

Subway Turnstile

Vulnerability Scanning

Every weakness in your network is an open invitation to hackers. ADNET recommends an Internal/External Vulnerability Scan when you need to determine how vulnerable your network might be to an attack. Using the latest technologies, we scan the most important assets on your internal and/or external network, looking for flaws that could be exploited.

At the conclusion of the Internal/External Vulnerability Scan, you will receive a detailed report of our findings and analysis, with each risk clearly explained and categorized by priority – high, medium and low. We’ll also present our recommendations for how to deal with each weakness and mitigate your overall risk.

Wire fence with insulator

Risk Assessments

Organizations that fall under medical, financial, or other regulatory compliance requirements need to understand exactly how susceptible they might be to security threats.

A Risk Assessment is a comprehensive way to determine your level of exposure and plan for the steps you need to take to protect your business. Using the latest technologies, we perform a Vulnerability Scan of your network, then look for weaknesses and flaws in technology, software, policies and procedures throughout your organization. At the conclusion of the Risk Assessment, we present you with a detailed report showing the likelihood of a security incident and its potential impact on your organization, as well as our recommendations for improving your overall security.

Abstracted laptop showing code

Penetration Testing

Any organization working with high risk data such as healthcare, insurance or financial information needs to know for certain that their systems, policies and procedures are adequate to protect their data.

A Penetration Test, or “Pen Test,” can ensure confidence for your business. Penetration Testing begins with an assessment of the network and identification of any weaknesses. At your request, ADNET’s Certified Ethical Hackers will attempt to safely exploit vulnerabilities in your network in order to show how a hacker might gain access to your systems or conduct a malicious attack. In addition to highlighting susceptible areas, a Pen Test can also validate effective systems, policies and procedures as well as conclusively show how your employees respond to potential security threats.

Shredded Paper

Security Policy Review & Development

Your organization’s first line of defense when it comes to employee compliance with various requirements is a robust Security Policy written with your company in mind. Whether you have an existing policy and just want to make sure that it’s up to date and comprehensive enough to protect your business, or you’re looking to implement one for the first time, ADNET can help.

Our Security Team can assist you in reviewing and developing a policy that suits the needs of your organization, covering everything from password management to external devices. We’ll help you understand what you should be asking of your employees, and how it can protect your business.

“Tim Weber spoke to our group on Cyber Security during our Annual Meeting in July 2017. We appreciated that Tim spoke with terms we could understand and was willing to answer any and all of our questions on this very important topic. The presentation was informative, helpful, interesting and fun. I heard nothing but positive comments from my staff.”

Veronica Tiedt, Nirenstein, Director of Administration, Nirenstein, Horowitz & Associates P.C.

 

Meet Our Team

Christopher J. Luise
Christopher J. Luise
Co-CEO
Read Bio >
Tim Weber
Tim Weber
Director, Security Services
Read Bio >
Eric Monda
Eric Monda
Senior IT Security Analyst
Read Bio >
Andrew Warren
Andrew Warren
Director, Professional Services
Read Bio >
Kristopher Peterson
Kristopher Peterson
IT Security Analyst
Read Bio >

What We're Thinking: Security

Read our thoughts on the latest security trends and vulnerabilities, along with recommendations from our Security Team on how to protect yourself and your business.

Ransomware: It’s Still a Thing

Are you tired of hearing about ransomware? We are too, but unfortunately, ransomware is still a thing. Anyone can be affected by a ransomware attack. There is no industry discrimination. It does not matter what size your company is, or what role you’re in. I’m sure you have seen or read about the recent ransomware attack in the Capital Region. Events like this are happening every day, both globally and right in our very own backyard.

Read More >

The Spam Email Stigma: You’re Not an Idiot if You Fell For It

With phishing attempts and spam emails becoming more sophisticated every day, they’re getting better at tricking people. Even the smartest person can easily make a mistake and click on something they shouldn’t. So rest assured, you’re not an idiot if you fall prey to a phishing attempt – here’s why.

Read More >

Compliance: It’s Not Just for Healthcare

Almost every business has some sort of need based around compliance – a set of guidelines commonly determined by industry. These guidelines, laws and best practices are put in place to protect your business, your clients and your partners, and the critical information being shared. Here is an overview of some of the most common compliance regulations organizations may fall under, and examples of how these regulations could impact your business.

Read More >

Do You Have PHI? You May, Even if You’re Not in Healthcare

Could your organization have access to protected health information (PHI)? In fact, more organizations have access to healthcare data than many people realize – and depending on their role and access to PHI, they may have legal obligations under the Health Insurance Portability and Accountability Act (HIPAA) too.

Read More >

Why You Should Consider a 3rd Party Multi-Factor Authentication (MFA) Solution

When evaluating an MFA solution for Office 365, there are several options ranging from Microsoft’s built-in MFA to third party solutions. ADNET chose to standardize on a third-party solution from Duo and we recommend it for most clients over Microsoft’s integrated MFA.

Read More >

Keeping Your Passwords Squeaky-Clean: 5 Tips for Good Password Hygiene

Password hygiene is the practice of making your account passwords more difficult to guess and harder to crack. Learn the top 5 rules and principles of a good password to help keep yourself safe online.

Read More >