The security vendor Cybereason describes REvil (aka Sodinokibi) as “the Crown Prince of Ransomware.”
Ryuk is a sophisticated strand of ransomware that not only encrypts network drives, but it also deletes shadow copies on the endpoint. Here's how to prevent it!
The story of how we went from a scrappy group of six technicians at Duke to a radically innovative IT partner that brought HIPAA expertise to the table.
Maze is a sophisticated strand of ransomware that steals data and exfiltrates it to servers controlled by hackers.
The primary lever of extortion in leakware is to threaten to release a target’s confidential data. Here's how you can protect yourself against these attacks.
Net Friends selected a potent combination of tools that allows us to offer our small business customers enterprise-grade security without enterprise pricing.
You never forget your first cybersecurity incident. It was the summer of 2001, & I was working as a field tech, supporting several medical research departments.
The top three reasons why we selected Kirkpatrick Price as our SOC 2 Type II auditor and how that led us to a powerful risk assessment tool.
How the Axio360 tool helped us quantify risks and give key stakeholders the power to make informed decisions in response to potential risk events.
How the Axio360's quant tool helps us explore various risk scenarios and directly quantify the costs for those events should they occur.
After our SOC 2 Type II audit, we started engaging with new risk categories that led us on a journey towards discovering a powerful risk assessment tool.
Ransomware simulation and mitigation is likely to be the element of MPT that even companies with limited security awareness find most compelling.
Just in time for Cybersecurity Awareness Month, the National Institute of Standards and Technology (NIST) has released an update to Special Publication 800-53.
Passwords have repeatedly proven to be insufficient on their own to prevent targeted hacking attacks or misuse of our password-protected information.
October is Cybersecurity Month, and we’ll be blogging about the preparations we made for our SOC 2 Type II audit this past September.
From your Net Friends IT Security Experts: The Top 5 Cybersecurity Steps you can take to improve your IT security for 2019.
One year after the Equifax breach, the GAO filed an extensive 40 page report on the details of the Equifax breach and the government’s response to it.
If your support issue requires immediate assistance, please call our office. Email & web form submissions are only reviewed during business hours.