Empower your employees to contribute to a robust cybersecurity culture that promotes security awareness, compliance, and incident response.
Approximately 56% of IT decision-makers indicate that targeted phishing attacks are their primary threat.
You've worked hard and deserve your vacation time. However, cyber threats are on the rise & bad actors don't take time off. Here's how to stay secure while OOO.
Our greater reliance on IT increases security risks. Discover how partnering with a SOC 2 compliant Managed Services Provider (MSP) boosts your cybersecurity.
Are you in the market for a new MSSP? Here are the top screening questions you need to ask when shopping for your next cybersecurity partner.
Our cybersecurity culture is deeply informed by our vision for Universal Safe Networks and our commitment to help businesses fortify their security.
You never forget your first cybersecurity incident. It was the summer of 2001, & I was working as a field tech, supporting several medical research departments.
Nearly 1 out of 4 small businesses suffered at least one cyber attack last year. Discover cost free protections you can implement now to improve your security.
Securing mobile devices with MAM or MDM is so vital and too often overlooked. Whichever path your organization chooses, you are already ahead of the game!
Explore the 5 common reasons why businesses are denied cybersecurity insurance and what you can do if you are facing one of these scenarios.
As exciting as it is to have the luxury of working in a new destination, it is important to know how to remain secure while working in VRBO.
Well-run businesses in high-risk industries have lots of sensitive records & are going to actively seek cybersecurity liability coverage to offset their risks.
While cybersecurity insurance helps alleviate the financial risks and burden of doing business online, there are liability limitations to this type of policy.
Cybersecurity insurance is a contract that the policyholder purchases to help reduce the financial risks of doing business online. Learn about cyber liability.
Remote workforces are using more and more apps to complete tasks and remain productive during the workday. Single-Sign-On (SSO) helps secure network access.
With a greater reliance on Anywhere Operations and remote work, businesses today require more cybersecurity measures, including multi-factor authentication.
Business owners work on-the-go, so mobile security is paramount. Let’s consider the best practices to ensure your company and user data protection.
Greater IT reliance will increase cybersecurity risks. Learn why you need a SOC 2 compliant managed services provider to boost cybersecurity.
World Password Day is a global reminder to secure your credentials with complex and unique passwords to prevent data loss and identity theft.
As more companies adopt cloud applications, there is a need for greater cloud security. Discover how a CASB can help with your IT security policies.
In 2021, it was reported that 1 in 4 employees still had access to company files of a previous employer. Discover our IT pro-tips for employee offboarding.
Our four core recommendations to ensure your VPN solution is optimized for Anywhere Operations to support your distributed workforce.
Social engineering is one of the many cyberthreat tactics that put businesses at risk for substantial harm. Learn more about how to protect your business.
Social engineering lies at the root of roughly 98% of IT security attacks. Discover how to identify the most common tactics.
Security Awareness Training is essential to improving your cybersecurity culture. These are the core topics your company's training program should cover.
Many security compliance standards mandate regular security training. Explore how compliance requirements can boost your business longevity.
In 2020, we designed our Stack Lab, featuring technology equipment that facilitates in-house, hands-on training for our technical staff.
Far too often, IT companies are stuck in the generalist hiring loop with no formal strategy to develop their technical staff beyond being break-fix technicians.
Net Friends is a SOC 2 Type II certified IT partner with a long history of expertise in HIPAA compliance and Information Technology Risk Management (ITRM).
A mature MSSP is your preferred strategic partner for implementing a robust cybersecurity program that aligns with your business operations.
A message from Net Friends CEO John Snyder on the Kaseya Breach
It starts with a professional standardized certification for those who practice safe network design and operation.
Remote Desktop Protocol (RDP) vulnerabilities are often easy targets for cyber criminals and they are too expensive to appropriately secure and monitor.
At Net Friends, we have a long history of improving our cybersecurity posture and applying it to our services to promote secure environments for our customers.
The security vendor Cybereason describes REvil (aka Sodinokibi) as “the Crown Prince of Ransomware.”
Ryuk is a sophisticated strand of ransomware that not only encrypts network drives, but it also deletes shadow copies on the endpoint. Here's how to prevent it!
The story of how we went from a scrappy group of six technicians at Duke to a radically innovative IT partner that brought HIPAA expertise to the table.
Maze is a sophisticated strand of ransomware that steals data and exfiltrates it to servers controlled by hackers.
The primary lever of extortion in leakware is to threaten to release a target’s confidential data. Here's how you can protect yourself against these attacks.
Net Friends selected a potent combination of tools that allows us to offer our small business customers enterprise-grade security without enterprise pricing.
The top three reasons why we selected Kirkpatrick Price as our SOC 2 Type II auditor and how that led us to a powerful risk assessment tool.
After our SOC 2 Type II audit, we started engaging with new risk categories that led us on a journey towards discovering a powerful risk assessment tool.
How the Axio360 tool helped us quantify risks and give key stakeholders the power to make informed decisions in response to potential risk events.
How the Axio360's quant tool helps us explore various risk scenarios and directly quantify the costs for those events should they occur.
Ransomware simulation and mitigation is likely to be the element of MPT that even companies with limited security awareness find most compelling.
Just in time for Cybersecurity Awareness Month, the National Institute of Standards and Technology (NIST) has released an update to Special Publication 800-53.
Passwords have repeatedly proven to be insufficient on their own to prevent targeted hacking attacks or misuse of our password-protected information.
October is Cybersecurity Month, and we’ll be blogging about the preparations we made for our SOC 2 Type II audit this past September.
From your Net Friends IT Security Experts: The Top 5 Cybersecurity Steps you can take to improve your IT security for 2019.
One year after the Equifax breach, the GAO filed an extensive 40 page report on the details of the Equifax breach and the government’s response to it.
If your support issue requires immediate assistance, please call our office. Email & web form submissions are only reviewed during business hours.