Category Archives: User Security (3)

Building Better Computer Habits

Building Better Computer Habits

Good habits are an important part of our lives - getting enough sleep and fresh air, spending time on a hobby or building a skill, or keeping in touch with friends and family - but many of us forget about having good computer habits. Developing wise practices around our computers and smartphones can make our lives easier and help us to stay […]

The Many Ways Scammers Like to Go Phish

The Many Ways Scammers Like to Go Phish

Most would probably say that they would NEVER fall victim to a scam, especially when reading over something as obvious as an email full of weird characters and broken grammar, or the classic Nigerian prince emails, but modern phishing scams can actually be quite effective. A well-executed phishing attack uses deceptive simple methods to confuse […]

What is Shadow IT?

What is Shadow IT?

Some people hear the term "Shadow IT" and assume it involves covert, problematic practices that are done to undermine the integrity of an organization’s IT efforts. In fact, it’s much more nuanced than this.

Time for Cybersecurity Awareness Month

Time for Cybersecurity Awareness Month

Every October the National Cybersecurity Alliance (NCSA), a 501c(3) non-profit, and the Cybersecurity and Infrastructure Agency (CISA), an agency under the Department of Homeland Security, organize Cybersecurity Awareness Month! A topic near and dear to all our hearts here at adNET Technology Management, this annual initiative aims to ensure we […]

How to Increase Security with Single Sign On and Conditional Access

How to Increase Security with Single Sign On and Conditional Access

There are countless aspects of security that a business can focus on, but one of the most important is cybersecurity. With increasing numbers of businesses operating online, or at least having some sort of online presence, cyber criminals are having a field day causing cyber attacks and data breaches.

How to Protect Your Illinois Business Against Phishing

How to Protect Your Illinois Business Against Phishing

Phishing is one of the most dangerous cyber threats facing your Illinois business today. While anti-virus and anti-malware software can protect your business from many types of cyber attacks, your employees remain a potential weak link in the systems that protect your networks. That's why phishing must be at the top of your priority list when it […]

2019 Best Practices For Keeping Your Password Secure

2019 Best Practices For Keeping Your Password Secure

Every account you have is protected by a password or a PIN of some kind. A PIN is a personal identification number that is unique to the account it is attached to. In some cases, you are allowed to choose your own PIN. For other accounts, you must use the PIN or password that is provided by the creator of the account. Memorizing PINs and […]

Are Bitcoin Bomb Threats A Serious Security Threat?

Are Bitcoin Bomb Threats A Serious Security Threat?

Users around the world have been receiving bitcoin extortion emails for a long time, one of the most notorious being a “sextortion” threat to show a computer-eye view of you watching adult videos to the world. The latest threat is more alarming: the sender claims to have a bomb planted at the recipient’s business. Financial institutions in New […]

Phishing Emails: Why They’re a Threat & How to Protect Your Business

Phishing Emails: Why They’re a Threat & How to Protect Your Business

It is a scary fact that one out of every three business employees will open a phishing email at work on any given day. Phishing emails are created explicitly by hackers to try and convince you to give up pertinent information about your business or inadvertently make your data vulnerable. Therefore, it is critical that you know all you can as a […]

Sextortion Scam Pretending To Come From Your Hacked Email Account

Sextortion Scam Pretending To Come From Your Hacked Email Account

A recent sextortion scheme highlights the vulnerability users face when their data is stolen and used against them.

Recent Posts

Recent Comments