Security Assessment Basics: Final Edition

In our final segment, we will be wrapping up the security assessment process with a summary. As we have covered, a security assessment is a process that is focused solely on improving the security posture of your organization. Security assessments are aimed at regulated industries and businesses that house sensitive customer or proprietary information. Security…

Security Assessment Basics: Part III

Continuing on with our security assessment series of blogs, we come to the end of the security assessment process. Today, we’ll talk about the remaining four methodologies that make up the security assessment process: security policy & documentation review, penetration tests, security audits, and security reviews. So let’s jump right in! What is security policy…

Security Assessment Basics: Part II

As we covered in our last installment, a security assessment is a thorough study done mainly to identify the IT related threats and risks of an organization. This process involves the full cooperation of the assessed organization and is meant to increase the security posture of the assessed. We also outlined seven methodologies that make…

Security Assessment Basics: Part I

What is a security assessment? We’re dedicating a four-part blog series to help answer this question. A common misconception from novice IT professionals is that a security assessment is a singular test looking at only the outside edge of your business’ infrastructure. This could not be further from the truth.  The correct term for this…

Are You Planning on Making Upgrades?

Technology is becoming increasingly important in today’s classrooms, but it can be difficult to prioritize which projects to take on. Deciding on the wrong project or the wrong company can set you up for failure this upcoming school year. Upgrade with ADKtechs. Contact us today and we can help you prioritize projects and keep your institution’s network and…

5 Tips to Avoid a Cyber Attack

  We are seeing more cyber attacks daily. It is estimated that an average of 600,000 users log onto Facebook every day trying to breach a user’s personal security.  Because of this, it is important to take every possible measure you can to minimize the chances of hackers getting into your personal online accounts. Follow…

Be a Partner

Each year, the Adirondack Regional Chamber of Commerce gives a prestigious and unique award: the J. Walter Juckett Community Service Award. The J. Walter Juckett Community Service Award is a prestigious community award, designed to thank and honor an extraordinary individual who has selflessly gone above and beyond by contributing time and energy to help…

Cyber Security Survival Tactics Panel Discussion

  Don’t miss this opportunity to be prepared for the unexpected. Cyber security is important and this panel presentation provides suggestions for preventative measures and solutions from experts in the technical, legal and public relations fields. Learn the best practices to effectively guard against cyber attacks by joining our Cyber Security Survival Tactics Panel Discussion…