Cybersecurity
A Guide to Thwarting Modern Cyber Attacks

As the digital landscape evolves, so do the methods used by cyber adversaries. It is important to remain informed about the latest threats to be prepared...

Cybersecurity
Transferring Risks with Managed Services and Cyber Insurance

Combining managed security services and cyber insurance provides SMBs with comprehensive protection against cyber threats... learn more!

Cybersecurity
How to Work Securely from an Airbnb or VRBO

As exciting as it is to have the luxury of working from anywhere, it is important to know how to remain secure.

Cybersecurity
Why Your Cloud Environment Needs Palo Alto Networks Strata

Investing in Palo Alto Networks Strata is like equipping your security team with night-vision goggles – they can see further, understand more, and react faster.

Cybersecurity
The Three Little Pigs' Guide to SMB Cybersecurity

A business fortified with strong cybersecurity measures is a business built with bricks, standing tall against the huffs and puffs of cyber threats...

Cybersecurity
Server Hardening 101: Boosting Business Security

Put simply, the term 'server hardening' refers to configuring your server properly. It is a critical decision that will boosts your business resiliency.

Cybersecurity
Maximizing Email Security: Essential Strategies to Protect Your Inbox

The average office worker receives 121 emails daily, the volume and openness of email makes it highly vulnerable to cyberattacks.

Cybersecurity
How to Protect Your Business While on Vacation

You've worked hard and deserve your vacation time. However, cyber threats are on the rise & bad actors don't take time off. Here's how to stay secure while OOO.

Cybersecurity
Protecting Your SMB: Traditional Antivirus vs. Next-Gen EDR vs. XDR

Cybersecurity is a dynamic landscape, continually evolving as new threats appear and existing ones morph. What security solutions do we recommend to SMBs?

Cybersecurity
A Business Owner's Guide to DNS & SSL Certificates

This brief guide underscores the importance of a cohesive online security approach. Learn more about DNS and SSL certificates for business.

Cybersecurity
Social Engineering 101: How to Safeguard Your Business

Social engineering is one of the many cyberthreat tactics that put businesses at risk for substantial harm. Learn more about how to protect your business.

Cybersecurity
Social Engineering 101: Understanding Common Tactics

Social engineering lies at the root of roughly 98% of IT security attacks. Discover how to identify the most common tactics.

Cybersecurity
5 Benefits to Partnering with a SOC 2 Compliant IT Company

Our greater reliance on IT increases security risks. Discover how partnering with a SOC 2 compliant Managed Services Provider (MSP) boosts your cybersecurity.

Cybersecurity
How Security Assessments Help Businesses Conquer Cyber Threats

In business, confidently securing your digital infrastructure will require building a robust security toolkit. Begin with cybersecurity assessments!

Cybersecurity
Which Password Manager Do We Recommend for Business?

Password security allows us to safely enjoy the advantages of our interconnected world. A reliable password manager helps us manage our password security.

Cybersecurity
5 Tips to Improve Your Cybersecurity Culture

Empower your employees to contribute to a robust cybersecurity culture that promotes security awareness, compliance, and incident response.

Cybersecurity
Net Friends Pro-Tips to Avoid Tax Phishing Scams

Approximately 56% of IT decision-makers indicate that targeted phishing attacks are their primary threat.

Cybersecurity
Top 7 Questions to Ask a Cybersecurity Provider

Are you in the market for a new MSSP? Here are the top screening questions you need to ask when shopping for your next cybersecurity partner.

Cybersecurity
How We Developed Our Approach to Security

Our cybersecurity culture is deeply informed by our vision for Universal Safe Networks and our commitment to help businesses fortify their security.

Cybersecurity
My First Cybersecurity Incident

You never forget your first cybersecurity incident. It was the summer of 2001, & I was working as a field tech, supporting several medical research departments.

Cybersecurity
Zero Cost Security Improvements to Protect Your Business

Nearly 1 out of 4 small businesses suffered at least one cyber attack last year. Discover cost free protections you can implement now to improve your security.

Cybersecurity
How to Determine if MAM or MDM is Best for Your Business

Securing mobile devices with MAM or MDM is so vital and too often overlooked. Whichever path your organization chooses, you are already ahead of the game!

Cybersecurity
What To Do If You're Denied Cybersecurity Insurance?

Explore the 5 common reasons why businesses are denied cybersecurity insurance and what you can do if you are facing one of these scenarios.

Cybersecurity
How to Secure the Best Price for Cyber Insurance

Well-run businesses in high-risk industries have lots of sensitive records & are going to actively seek cybersecurity liability coverage to offset their risks.

Cybersecurity
What Does Cyber Insurance NOT Cover?

While cybersecurity insurance helps alleviate the financial risks and burden of doing business online, there are liability limitations to this type of policy.

Cybersecurity
What Is Cyber Insurance & What Does It Cover?

Cybersecurity insurance is a contract that the policyholder purchases to help reduce the financial risks of doing business online. Learn about cyber liability.

Cybersecurity
Leveraging Single-Sign-On (SSO) to Protect Your Business

Remote workforces are using more and more apps to complete tasks and remain productive during the workday. Single-Sign-On (SSO) helps secure network access.

Cybersecurity
How Multi-Factor Authentication (MFA) Secures Your Business Operations

With a greater reliance on Anywhere Operations and remote work, businesses today require more cybersecurity measures, including multi-factor authentication.

Cybersecurity
Top 12 Mobile Security Tips to Protect Your Business

Business owners work on-the-go, so mobile security is paramount. Let’s consider the best practices to ensure your company and user data protection.

Cybersecurity
How to Minimize Business Risks with a SOC 2 Compliant IT Company

Greater IT reliance will increase cybersecurity risks. Learn why you need a SOC 2 compliant managed services provider to boost cybersecurity.

Cybersecurity
How to Create Strong Passwords

World Password Day is a global reminder to secure your credentials with complex and unique passwords to prevent data loss and identity theft.

Cybersecurity
What is a Cloud Access Security Broker (CASB)?

As more companies adopt cloud applications, there is a need for greater cloud security. Discover how a CASB can help with your IT security policies.

Cybersecurity
IT Security Tips for Employee Offboarding

In 2021, it was reported that 1 in 4 employees still had access to company files of a previous employer. Discover our IT pro-tips for employee offboarding.

Cybersecurity
Is Your VPN Solution Optimized for Anywhere Operations?

Our four core recommendations to ensure your VPN solution is optimized for Anywhere Operations to support your distributed workforce.

Cybersecurity
Top 10 Basic Security Trainings to Build Your Cybersecurity Culture

Security Awareness Training is essential to improving your cybersecurity culture. These are the core topics your company's training program should cover.

Cybersecurity
Why Security Awareness Training Is Important For Compliance

Many security compliance standards mandate regular security training. Explore how compliance requirements can boost your business longevity.

Cybersecurity
The Stack Lab: Meeting Cybersecurity Hands-On

In 2020, we designed our Stack Lab, featuring technology equipment that facilitates in-house, hands-on training for our technical staff.

Cybersecurity
Why You Need Technology Specialists

Far too often, IT companies are stuck in the generalist hiring loop with no formal strategy to develop their technical staff beyond being break-fix technicians.

Cybersecurity
How An MSP Helps You Prep for HIPAA Audits

Net Friends is a SOC 2 Type II certified IT partner with a long history of expertise in HIPAA compliance and Information Technology Risk Management (ITRM).

Cybersecurity
What Does An MSSP Do For Your Business?

A mature MSSP is your preferred strategic partner for implementing a robust cybersecurity program that aligns with your business operations.

Cybersecurity
Net Friends' Response to the Kaseya Breach

A message from Net Friends CEO John Snyder on the Kaseya Breach

Cybersecurity
How Do We Get to Universally Safe Networks?

It starts with a professional standardized certification for those who practice safe network design and operation.

Cybersecurity
How to Eliminate RDP Vulnerabilities

Remote Desktop Protocol (RDP) vulnerabilities are often easy targets for cyber criminals and they are too expensive to appropriately secure and monitor.

Cybersecurity
How We Sustained Our Security Culture

At Net Friends, we have a long history of improving our cybersecurity posture and applying it to our services to promote secure environments for our customers.

Cybersecurity
MDR Case Study: REvil Ransomware

The security vendor Cybereason describes REvil (aka Sodinokibi) as “the Crown Prince of Ransomware.”

Cybersecurity
MDR Case Study: Ryuk Ransomware

Ryuk is a sophisticated strand of ransomware that not only encrypts network drives, but it also deletes shadow copies on the endpoint. Here's how to prevent it!

Cybersecurity
How We Became HIPAA Experts

The story of how we went from a scrappy group of six technicians at Duke to a radically innovative IT partner that brought HIPAA expertise to the table.

Cybersecurity
MDR Case Study: Maze Ransomware

Maze is a sophisticated strand of ransomware that steals data and exfiltrates it to servers controlled by hackers.

Cybersecurity
Leakware: The New Ransomware Targeting Hospitals, Law Firms, and... You?

The primary lever of extortion in leakware is to threaten to release a target’s confidential data. Here's how you can protect yourself against these attacks.

Cybersecurity
The Best Detection & Response Tools Against Internet Attacks

Net Friends selected a potent combination of tools that allows us to offer our small business customers enterprise-grade security without enterprise pricing.

Cybersecurity
Identifying Point-in-Time Risks with Kirkpatrick Price

The top three reasons why we selected Kirkpatrick Price as our SOC 2 Type II auditor and how that led us to a powerful risk assessment tool.

Cybersecurity
Net Friends' Risk Assessment Video Series

After our SOC 2 Type II audit, we started engaging with new risk categories that led us on a journey towards discovering a powerful risk assessment tool.

Cybersecurity
Quantifying Risk Scenarios with Axio360

How the Axio360's quant tool helps us explore various risk scenarios and directly quantify the costs for those events should they occur.

Cybersecurity
Net Friends on Managed Pentesting in PenTest Magazine

Ransomware simulation and mitigation is likely to be the element of MPT that even companies with limited security awareness find most compelling.

Cybersecurity
Top 5 Takeaways for NIST 800-53 Rev 5

Just in time for Cybersecurity Awareness Month, the National Institute of Standards and Technology (NIST) has released an update to Special Publication 800-53.

Cybersecurity
MFA = Multi-Factor Awesome

Passwords have repeatedly proven to be insufficient on their own to prevent targeted hacking attacks or misuse of our password-protected information.

Cybersecurity
Developing a Physical Access Policy for the SOC 2 Type II Audit

October is Cybersecurity Month, and we’ll be blogging about the preparations we made for our SOC 2 Type II audit this past September.

Cybersecurity
Top 5 Cybersecurity Steps to Take in 2019

From your Net Friends IT Security Experts: The Top 5 Cybersecurity Steps you can take to improve your IT security for 2019.

Cybersecurity
Equifax Breach: One Year Later

One year after the Equifax breach, the GAO filed an extensive 40 page report on the details of the Equifax breach and the government’s response to it.

Our friendly IT Experts are here for you. Contact Us Today!

Are you searching for a SOC 2 compliant
IT Services Provider you can trust?

Connect With A [Net] Friend

Contact our IT
Support Center 24/7

Option 1: Call (919) 680-3763
Option 2: Email - request@netfriends.com
Option 3: Complete the form below
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

If your support issue requires immediate assistance, please call our office. Email & web form submissions are only reviewed during business hours.