ADI Blog

Stay up to date with our latest news and tutorials
Security is more than an Antivirus: “The Data”

Security is more than an Antivirus: “The Data”

Hello ADI Community, This is part 6 of the 7 part Blog Series "Security is more than an Antivirus". To review, here are the 7 layers of security: (1) Human Layer β†’ (2) Perimeter β†’ (3) Network β†’ (4) Endpoint β†’ (5) Application β†’ (6) Data β†’ (7) Mission Critical Assets...

read more
User Account Control (Windows)

User Account Control (Windows)

Hello ADI Community, Today we are discussing UAC, or User Account Control Feature, in Windows operating system. If you ever used Windows and installed an application then you surely have bumped into the UAC prompt. Its the windows that states an application is trying...

read more
Security vs. 3rd Party Apps

Security vs. 3rd Party Apps

A big security risk I see in a lot of business environments is the widespread use of 3rd party applications. The inherent use of 3rd party applications itself is not a security risk and I am by no mean telling you that you cannot securely implement 3rd party apps in...

read more
Windows Hot Keys

Windows Hot Keys

Hello ADI Community, Its your friendly IT tech with some useful info for you today. I want to show you Hot Keys. Hot keys essentially are shortcuts on your keyboard to increase your productivity andΒ  make your Windows experience smooth and easy: Copy, Paste and Cut...

read more