What We’re Thinking

We’re passionate about technology, and we want to share that with you! Read our thoughts on technology, the latest security threats and business trends along with our ideas for ways you can incorporate new and future technologies into your life and business.

Single lit lightbulb on a cord next to multiple unlit lightbulbs
Black and white road with lines

7 Top Questions to Consider Before You Migrate Data to the Cloud

 |   |  Technology

The cloud was once about being able to access things like email or applications from anywhere, but now it’s a much bigger opportunity. There are definitive perks to moving your data to the cloud, but nothing is a one-size-fits-all solution. So, where do you start? Here are the 7 most important questions you should consider when evaluating a move to the Cloud.

Read More >

ADNET Technologies Team at Microsoft Inspire 2018

The 3 Most Important Considerations of your IT Strategy, and how Microsoft Azure Can Check the Boxes

 |   |  Business & Strategy, Technology

Never before have the steps to go to a cloud environment been easier, more affordable or safer than they are now. Putting your money into a new system, or refreshing an existing system must include a fair assessment of what the cloud can bring because with very few exceptions, it checks all three of those boxes.

Read More >

Microsoft Azure Logo

What is Microsoft Azure?

 |   |  Technology

If you’re wondering if you should move your data to Microsoft Azure, you may be looking for a simple answer to the question “What is Microsoft Azure?” Cloud computing in general is a broad concept and cloud companies have historically done a terrible job explaining what their services do. Here’s what you need to know before you make an investment in the cloud.

Read More >

ADNET Technologies WorkSmart Hartford 2018

Why WorkSmart?

 |   |  Business & Strategy

You may have heard about our annual multi-city conference, WorkSmart. Maybe you have attended in the past and you know all about it; but if you haven’t, do you know why you should?

Read More >

fax machine and printer

Faxploit: Yes, Your Fax Machine Really Is a Threat

 |   |  Security

When we talk about network security, we tend to focus our attention on the most critical components of the network, such as firewalls, routers and servers. In reality, any device that’s on the network can be an entry point for the bad guys. Our concern today is with fax machines – yes, fax machines – and the vulnerability they can bring to a network.

Read More >

Life Saver on Boat Dock

When Giving Up the Internet Isn’t an Option: 12 Tips for Safe Browsing

 |   |  Security

We are on the internet constantly – according to USC Annenberg’s 2017 Digital Future Report, the average American spends about 23.6 hours online a week. In this digital age, it’s not really all that surprising. You can do nearly anything you need to do via the internet, from banking to entertainment, shopping to research, and work to school. With so much of our lives spent online, it’s easy to forget one crucial fact: The internet can be dangerous. There is no way to protect yourself 100% from bad websites. However, there is a lot you can do to decrease your risk. Take a look at some of these tips to help keep you safe while browsing the internet.

Read More >

No Junk Mail

The Spam Email Stigma: You’re Not an Idiot if You Fell For It

 |   |  Security

With phishing attempts and spam emails becoming more sophisticated every day, they’re getting better at tricking people. Even the smartest person can easily make a mistake and click on something they shouldn’t. So rest assured, you’re not an idiot if you fall prey to a phishing attempt – here’s why.

Read More >

Physical and Digital Security

Physical Security and Cyber Defense 

 |   |  Security

When we think ‘cybersecurity’, we think firewalls, antivirus programs, and not sending money to that African prince who needs to transfer a massive amount of money into our bank accounts. With so much to think about on the digital front, it’s easy to forget some of the basic physical precautions we need to take to provide the most comprehensive protection for our data.

Read More >