What We’re Thinking

We’re passionate about technology, and we want to share that with you! Read our thoughts on technology, the latest security threats and business trends along with our ideas for ways you can incorporate new and future technologies into your life and business.

Single lit lightbulb on a cord next to multiple unlit lightbulbs
Mind the Gap warning on platform

Compliance: It’s Not Just for Healthcare

 |   |  Business & Strategy, Security

Almost every business has some sort of need based around compliance – a set of guidelines commonly determined by industry. These guidelines, laws and best practices are put in place to protect your business, your clients and your partners, and the critical information being shared. Here is an overview of some of the most common compliance regulations organizations may fall under, and examples of how these regulations could impact your business.

Read More >

Microsoft Azure vs Amazon Web Services

Comparing Cloud Services: Microsoft Azure vs. Amazon Web Services

 |   |  Technology

If you’re considering lifting your servers and applications to the cloud, one of the toughest decisions to make is which platform to use.  Microsoft Azure and Amazon Web Services (AWS) are two of the biggest players in the market and they both have the required elements to effectively and securely host virtually any organization’s servers and applications in the cloud. So, how do you choose between them? Well, like with all things IT, it depends.

Read More >

Shop - Shopping Bags with gifts

Shop Safely this Holiday Season with These Online Shopping Tips for 2018

 |   |  Security

As we prepare for Black Friday, Cyber Monday and the e-commerce-heavy holiday season in general, there is no shortage of opportunities for criminals to benefit when online shoppers let their guard down. Following these tips will help you have a safe holiday season while still allowing you to do your shopping from the comfort of your own home or office.

Read More >


How to Protect Yourself from “Sextortion” Scams

 |   |  Security

Attackers have recently found a way to use an old password in a new scam. A particularly sinister tactic, dubbed a “sextortion” scam, has been on the rise lately. In this blog, ADNET takes a closer look at how the attack works and how to handle it if you are targeted.

Read More >

boarded up window with bars

What is This MFA Thing, and Why Do We Need It?

 |   |  Security

Multi-factor authentication (sometimes referred to as MFA or 2FA for two-factor authentication) can be implemented with some sites, applications and services to make your accounts more secure. It works by requiring two separate credentials to be given in order to prove your identity.

Read More >