Security & Compliance

Cybersecurity experts agree that having a security breach has become a matter of “not if, but when,” for many organizations.

On this page:

Keychain
Safety Deposit Boxes

Managed Security Services (MSS)

ADNET’s Managed Security Services (MSS) provide you with daily monitoring and threat detection as well as regular reporting, analysis and strategic guidance to help minimize your risk. Using trend monitoring, threat analysis and early detection, you can help minimize disruption to your business, loss of data and irreparable damage to your company’s reputation in the event of a security incident.

With Managed Security Services, your systems are monitored 24×7 by comprehensive security management software, updated continuously with the latest global threat intelligence. The MSS software automatically alerts the ADNET security team to any activity that could indicate a security risk. If there is a legitimate threat to your business, our security analysts alert you as soon as possible and provide recommendations for how to protect your systems. On a monthly basis, you will receive a summary report showing all alerts identified within the period, including ADNET’s recommendations for reducing the risk to your systems.

Eye

Security Awareness Training

In 2016, the average cost of a data breach was $4 million, with the cost of each stolen record exceeding $150, according to IBM. The long-term impact of one security breach, including damage to your reputation and loss of customer trust, could put the future of your business at risk.

One of the easiest and most affordable ways to help prevent a breach is through education. ADNET offers easy-to-understand Security Awareness Training designed for business owners and their teams. Our security analysts will teach you simple, practical ways to protect yourself and your company’s data, including an overview of today’s top threats, guidance on how to respond to an attack and protecting yourself online.

Turnstile

Vulnerability Scanning

Every weakness in your network is an open invitation to hackers. ADNET recommends an Internal/External Vulnerability Scan when you need to determine how vulnerable your network might be to an attack. Using the latest technologies, we scan the most important assets on your internal and/or external network, looking for flaws that could be exploited.

At the conclusion of the Internal/External Vulnerability Scan, you will receive a detailed report of our findings and analysis, with each risk clearly explained and categorized by priority – high, medium and low. We’ll also present our recommendations for how to deal with each weakness and mitigate your overall risk.

Risk Assessments

Organizations that fall under medical, financial, or other regulatory compliance requirements need to understand exactly how susceptible they might be to security threats.

A Risk Assessment is a comprehensive way to determine your level of exposure and plan for the steps you need to take to protect your business. Using the latest technologies, we perform a Vulnerability Scan of your network, then look for weaknesses and flaws in technology, software, policies and procedures throughout your organization. At the conclusion of the Risk Assessment, we present you with a detailed report showing the likelihood of a security incident and its potential impact on your organization, as well as our recommendations for improving your overall security.

Stethoscope

HIPAA Risk Assessments

For any organization dealing with Protected Health Information (PHI or ePHI), HIPAA compliance is a strict requirement. Fines for being non-compliant can be massive, not to mention the damage that can be caused to your company’s reputation if an undiscovered vulnerability leads to a breach. Let us show you where the dangers are so that you can take steps to address them before there is an issue.

Laptop

Penetration Testing

Any organization working with high risk data such as healthcare, insurance or financial information needs to know for certain that their systems, policies and procedures are adequate to protect their data.

A Penetration Test, or “Pen Test,” can ensure confidence for your business. Penetration Testing begins with an assessment of the network and identification of any weaknesses. At your request, ADNET’s Certified Ethical Hackers will attempt to safely exploit vulnerabilities in your network in order to show how a hacker might gain access to your systems or conduct a malicious attack. In addition to highlighting susceptible areas, a Pen Test can also validate effective systems, policies and procedures as well as conclusively show how your employees respond to potential security threats.

Shopping Carts

PCI Review

Do you know if your organization is PCI-DSS compliant? PCI, or the “Payment Card Industry,” requires that every organization processing any payments from debit or credit cards adhere to the security standards created to protect these transactions. ADNET’s security team can help assess your current policies and network to determine whether or not you’re meeting the PCI compliance standards.

With our PCI Review, we will run internal and external vulnerability scans on your network as well as reviewing the PCI self-audit questionnaire with you. If we find any vulnerabilities or non-compliant areas, we will make recommendations on how to fix the issues. If after your assessment you’re ready to take the next steps, ADNET can also be engaged for remediation of any PCI compliance issues.

Shredded Paper

Security Policy Review & Development

Your organization’s first line of defense when it comes to employee compliance with various requirements is a robust Security Policy written with your company in mind. Whether you have an existing policy and just want to make sure that it’s up to date and comprehensive enough to protect your business, or you’re looking to implement one for the first time, ADNET can help.

Our Security Team can assist you in reviewing and developing a policy that suits the needs of your organization, covering everything from password management to external devices. We’ll help you understand what you should be asking of your employees, and how it can protect your business.

“Tim Weber spoke to our group on Cyber Security during our Annual Meeting in July 2017. We appreciated that Tim spoke with terms we could understand and was willing to answer any and all of our questions on this very important topic. The presentation was informative, helpful, interesting and fun. I heard nothing but positive comments from my staff.”

Veronica Tiedt, Nirenstein, Director of Administration, Nirenstein, Horowitz & Associates P.C.

 

Meet Our Team

Andrew Warren
Andrew Warren
Director, Professional Services
Read Bio >
Eric Monda
Eric Monda
IT Security Analyst
Read Bio >
Tim Weber
Tim Weber
Director, Infrastructure Services
Read Bio >
Christopher J. Luise
Christopher J. Luise
Executive Vice President/Co-Founder
Read Bio >

Negligence and Misconduct: The State of Cybersecurity Breaches

Not a day goes by that I do not see another security breach or system flaw being released. On Thursday, September 7, Equifax announced a major data breach affecting records for as many as 143 million American consumers. Nearly half the U.S. population may have had their Social Security numbers, drivers license numbers, birth dates, addresses and other sensitive information

Read More >

My First Job Was at a Pizza Shop: Creating Strong Passwords

Over the past few years, strong passwords have become increasingly important. But who can memorize all those passwords? There are a few simple things to keep in mind when creating secure passwords and choosing tools to manage them.

Read More >

For the (1980’s) Record, Patching Your Systems is Crucial

The premise of the song “You Spin Me Round” is things going round and round and round. In the IT Security realm, it seems like the same thing when it comes to the need for doing updates/patches. It just keeps going “right round round round.”

Read More >

The Weakest Link

Your organization is much more likely (2:1) to have an IT security incident caused by an internal user rather than by someone from the outside.

Read More >