Cybersecurity
Net Friends' Response to the Kaseya Breach

A message from Net Friends CEO John Snyder on the Kaseya Breach

Cybersecurity
How Do We Get to Universally Safe Networks?

It starts with a professional standardized certification for those who practice safe network design and operation.

Cybersecurity
Zero Cost Security Improvements to Protect Your Business

Nearly 1 out of 4 small businesses suffered at least one cyber attack last year. Discover cost free protections you can implement now to improve your security.

Cybersecurity
How to Eliminate RDP Vulnerabilities

Remote Desktop Protocol (RDP) vulnerabilities are often easy targets for cyber criminals and they are too expensive to appropriately secure and monitor.

Cybersecurity
How We Sustained Our Security Culture

At Net Friends, we have a long history of improving our cybersecurity posture and applying it to our services to promote secure environments for our customers.

Cybersecurity
MDR Case Study: REvil Ransomware

The security vendor Cybereason describes REvil (aka Sodinokibi) as “the Crown Prince of Ransomware.”

Cybersecurity
MDR Case Study: Ryuk Ransomware

Ryuk is a sophisticated strand of ransomware that not only encrypts network drives, but it also deletes shadow copies on the endpoint. Here's how to prevent it!

Cybersecurity
How We Became HIPAA Experts

The story of how we went from a scrappy group of six technicians at Duke to a radically innovative IT partner that brought HIPAA expertise to the table.

Cybersecurity
MDR Case Study: Maze Ransomware

Maze is a sophisticated strand of ransomware that steals data and exfiltrates it to servers controlled by hackers.

Cybersecurity
Leakware: The New Ransomware Targeting Hospitals, Law Firms, and... You?

The primary lever of extortion in leakware is to threaten to release a target’s confidential data. Here's how you can protect yourself against these attacks.

Cybersecurity
The Best Detection & Response Tools Against Internet Attacks

Net Friends selected a potent combination of tools that allows us to offer our small business customers enterprise-grade security without enterprise pricing.

Cybersecurity
My First Cybersecurity Incident

You never forget your first cybersecurity incident. It was the summer of 2001, & I was working as a field tech, supporting several medical research departments.

Cybersecurity
Identifying Point-in-Time Risks with Kirkpatrick Price

The top three reasons why we selected Kirkpatrick Price as our SOC 2 Type II auditor and how that led us to a powerful risk assessment tool.

Cybersecurity
Discovering a Next-Generation Risk Assessment Tool with Axio

How the Axio360 tool helped us quantify risks and give key stakeholders the power to make informed decisions in response to potential risk events.

Cybersecurity
Quantifying Risk Scenarios with Axio360

How the Axio360's quant tool helps us explore various risk scenarios and directly quantify the costs for those events should they occur.

Cybersecurity
Net Friends' Risk Assessment Video Series

After our SOC 2 Type II audit, we started engaging with new risk categories that led us on a journey towards discovering a powerful risk assessment tool.

Cybersecurity
Net Friends on Managed Pentesting in PenTest Magazine

Ransomware simulation and mitigation is likely to be the element of MPT that even companies with limited security awareness find most compelling.

Cybersecurity
Top 5 Takeaways for NIST 800-53 Rev 5

Just in time for Cybersecurity Awareness Month, the National Institute of Standards and Technology (NIST) has released an update to Special Publication 800-53.

Cybersecurity
MFA = Multi-Factor Awesome

Passwords have repeatedly proven to be insufficient on their own to prevent targeted hacking attacks or misuse of our password-protected information.

Cybersecurity
Developing a Physical Access Policy for the SOC 2 Type II Audit

October is Cybersecurity Month, and we’ll be blogging about the preparations we made for our SOC 2 Type II audit this past September.

Cybersecurity
Top 5 Cybersecurity Steps to Take in 2019

From your Net Friends IT Security Experts: The Top 5 Cybersecurity Steps you can take to improve your IT security for 2019.

Cybersecurity
Equifax Breach: One Year Later

One year after the Equifax breach, the GAO filed an extensive 40 page report on the details of the Equifax breach and the government’s response to it.

Our friendly IT Experts are here for you. Contact Us Today!

Sometimes, it's nice to see a [net] friendly face. Our team is ready to spring into action!

Connect With A [Net] Friend

Contact our IT
Support Center 24/7

Option 1: Call (919) 680-3763
Option 2: Email - request@netfriends.com
Option 3: Complete the form below
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

If your support issue requires immediate assistance, please call our office. Email & web form submissions are only reviewed during business hours.