The Searing Truth About Cyber Threats

According to the US Government, “In just two minutes, a fire can become life-threatening. In five minutes, a residence can be engulfed in flames¹”. Did you know that ransomware can start encrypting files in less than 20 seconds²? Did you know that virtually no company is immune to severe exploits? In fact, our partners at…

Time to Say Goodbye?

Even the most top of the line devices will one day become outdated. We know that no one likes the idea of parting with a tried and true companion, but there will unfortunately come a day when it’s time to bid farewell to your office computer. Here are some signs that you and your PC…

Say “Hi” to Zach

  Zach Hamell Help Desk Technician  Zach is the newest help desk technician to be brought aboard the ADKtechs team. Graduating with his Associate’s Degree in Information Technology just this year, Zach strives to continue to learn and move up the ladder at ADKtechs. With a wide range of experience in various industries, he’s finally…

Security Assessment Basics: Final Edition

In our final segment, we will be wrapping up the security assessment process with a summary. As we have covered, a security assessment is a process that is focused solely on improving the security posture of your organization. Security assessments are aimed at regulated industries and businesses that house sensitive customer or proprietary information. Security…

Security Assessment Basics: Part III

Continuing on with our security assessment series of blogs, we come to the end of the security assessment process. Today, we’ll talk about the remaining four methodologies that make up the security assessment process: security policy & documentation review, penetration tests, security audits, and security reviews. So let’s jump right in! What is security policy…

Security Assessment Basics: Part II

As we covered in our last installment, a security assessment is a thorough study done mainly to identify the IT related threats and risks of an organization. This process involves the full cooperation of the assessed organization and is meant to increase the security posture of the assessed. We also outlined seven methodologies that make…

Let’s Do the Numbers

The infographic below shows actual numbers from our current work queues. Our goal is to solve your IT problems right the very first time and as you can see, these digits have a lot to say. The Numbers: ExplainedMini-ProjectsOn average, it only takes us 9.6 days to complete a mini-project. From quoting and acceptance, to order…

Security Assessment Basics: Part I

What is a security assessment? We’re dedicating a four-part blog series to help answer this question. A common misconception from novice IT professionals is that a security assessment is a singular test looking at only the outside edge of your business’ infrastructure. This could not be further from the truth.  The correct term for this…