31 Scary Cyber Security Stats

It’s no coincidence that National Cyber Security Awareness Month and Halloween both fall in October. We’ve rounded up 31 cyber security stats to prove that the risks associated with cyber vulnerabilities are just as scary as any ghoul or goblin you’ll run into while trick-or-treating tonight. 58% of malware attack victims are categorized as small businesses.…

Assess, Address, Maintain

Security is our thing. We believe that the best defense is a good offense so no matter what program offering you choose, security is always a priority. We have a simple philosophy to keep your business running smoothly and securely: assess, address, and maintain. ASSESS Systems monitoring takes a comprehensive look to assess your current…

The Searing Truth About Cyber Threats

According to the US Government, “In just two minutes, a fire can become life-threatening. In five minutes, a residence can be engulfed in flames¹”. Did you know that ransomware can start encrypting files in less than 20 seconds²? Did you know that virtually no company is immune to severe exploits? In fact, our partners at…

Time to Say Goodbye?

Even the most top of the line devices will one day become outdated. We know that no one likes the idea of parting with a tried and true companion, but there will unfortunately come a day when it’s time to bid farewell to your office computer. Here are some signs that you and your PC…

Say “Hi” to Zach

  Zach Hamell Help Desk Technician  Zach is the newest help desk technician to be brought aboard the ADKtechs team. Graduating with his Associate’s Degree in Information Technology just this year, Zach strives to continue to learn and move up the ladder at ADKtechs. With a wide range of experience in various industries, he’s finally…

Security Assessment Basics: Final Edition

In our final segment, we will be wrapping up the security assessment process with a summary. As we have covered, a security assessment is a process that is focused solely on improving the security posture of your organization. Security assessments are aimed at regulated industries and businesses that house sensitive customer or proprietary information. Security…

Security Assessment Basics: Part III

Continuing on with our security assessment series of blogs, we come to the end of the security assessment process. Today, we’ll talk about the remaining four methodologies that make up the security assessment process: security policy & documentation review, penetration tests, security audits, and security reviews. So let’s jump right in! What is security policy…