You've worked hard and deserve your vacation time. However, cyber threats are on the rise & bad actors don't take time off. Here's how to stay secure while OOO.
Remote workforces are using more and more apps to complete tasks and remain productive during the workday. Single-Sign-On (SSO) helps secure network access.
With a greater reliance on Anywhere Operations and remote work, businesses today require more cybersecurity measures, including multi-factor authentication.
A business continuity plan is crucial for your company’s risk mitigation strategies. Let’s consider the top benefits of this risk management tool.
Business owners work on-the-go, so mobile security is paramount. Let’s consider the best practices to ensure your company and user data protection.
Learn more about NetForce Architect, our solution for IT projects that assist in cloud transitions and modernizing your operations to improve business.
Every SMB needs to innovate to thrive in the marketplace. Technology buzzwords also hold value in helping SMBs position for greater competitiveness.
Greater IT reliance will increase cybersecurity risks. Learn why you need a SOC 2 certified managed services provider to boost cybersecurity.
World Password Day is a global reminder to secure your credentials with complex and unique passwords to prevent data loss and identity theft.
As more companies adopt cloud applications, there is a need for greater cloud security. Discover how a CASB can help with your IT security policies.
In 2021, it was reported that 1 in 4 employees still had access to company files of a previous employer. Discover our IT pro-tips for employee offboarding.
Approximately 56% of IT decision-makers indicate that targeted phishing attacks are their primary threat.
“By engaging in the SOC 2 Type II audit every year, we are motivated by transparency and accountability,” said John Snyder, CEO of Net Friends.
"Growing up, my dad was always into new tech, and that rubbed off on me," Chelsea shares. Discover more about her journey in our "Women at Net Friends" series!
While most industries appear to have adjusted to the work-from-anywhere model, we should consider several challenges that may arise in this mass shift.
Anywhere Operations represent the new normal for business operations. Let’s explore the top five critical policies necessary for its adoption.
While "Work from Anywhere" is a common term, let's explore the future of "Anywhere Operations" and its implications for small businesses.
Our four core recommendations to ensure your VPN solution is optimized for Anywhere Operations to support your distributed workforce.
Social engineering is one of the many cyberthreat tactics that put businesses at risk for substantial harm. Learn more about how to protect your business.
Social engineering lies at the root of roughly 98% of IT security attacks. Discover how to identify the most common tactics.
Security Awareness Training is essential to improving your cybersecurity culture. These are the core topics your company's training program should cover.
Many security compliance standards mandate regular security training. Explore how compliance requirements can boost your business longevity.
Microsoft Azure offers a wide range of powerful cloud computing solutions for any small business. These 5 specific SMB benefits are worth noting about Azure.
Our greater reliance on IT increases security risks. Discover how partnering with a SOC 2 certified Managed Services Provider (MSP) boosts your cybersecurity.
Empower your employees to contribute to a robust cybersecurity culture that promotes security awareness, compliance, and incident response.
Windows 11 is the latest release in the Microsoft Windows operating system. Here's our list of 5 notable features that increase business productivity.
In 2020, we designed our Stack Lab, featuring technology equipment that facilitates in-house, hands-on training for our technical staff.
Far too often, IT companies are stuck in the generalist hiring loop with no formal strategy to develop their technical staff beyond being break-fix technicians.
By cementing your Technology Stack from the onset, you dodge disruptions such as frequently recycling technology solutions and upending operational processes.
Our cybersecurity culture is deeply informed by our vision for Universal Safe Networks and our commitment to help businesses fortify their security.
Are you in the market for a new MSSP? Here are the top screening questions you need to ask when shopping for your next cybersecurity partner.
Net Friends is a SOC 2 Type II certified IT partner with a long history of expertise in HIPAA compliance and Information Technology Risk Management (ITRM).
A mature MSSP is your preferred strategic partner for implementing a robust cybersecurity program that aligns with your business operations.
Cloud providers are constantly upgrading their services to adhere to the latest industry standards and regulatory requirements to offer unprecedented security.
The Trusted Platform Module (TPM) is central to Microsoft’s plans to boost the security of 1.3 billion workstations running Windows 10.
Net Friends announces that Castra, an award-winning leader in MDR, has signed the largest NetForce IT staffing agreement to date.
A message from Net Friends CEO John Snyder on the Kaseya Breach
It starts with a professional standardized certification for those who practice safe network design and operation.
Nearly 1 out of 4 small businesses suffered at least one cyber attack last year. Discover cost free protections you can implement now to improve your security.
Remote Desktop Protocol (RDP) vulnerabilities are often easy targets for cyber criminals and they are too expensive to appropriately secure and monitor.
At Net Friends, we have a long history of improving our cybersecurity posture and applying it to our services to promote secure environments for our customers.
Treatment of end-of-life devices requires policies for thorough data sanitization before e-waste recycling and disposal, especially with a remote workforce.
The security vendor Cybereason describes REvil (aka Sodinokibi) as “the Crown Prince of Ransomware.”
Does your company have an IT budget? What are your tech spending categories? Keep reading for great insights on what should be included.
Without an annual assessment, most businesses have no visibility over their assets, resource constraints, or other critical insights about their environment.
What does the primary focus of your IT company say about the operational maturity of your IT environment?
Ryuk is a sophisticated strand of ransomware that not only encrypts network drives, but it also deletes shadow copies on the endpoint. Here's how to prevent it!
The story of how we went from a scrappy group of six technicians at Duke to a radically innovative IT partner that brought HIPAA expertise to the table.
Maze is a sophisticated strand of ransomware that steals data and exfiltrates it to servers controlled by hackers.
The primary lever of extortion in leakware is to threaten to release a target’s confidential data. Here's how you can protect yourself against these attacks.
Net Friends selected a potent combination of tools that allows us to offer our small business customers enterprise-grade security without enterprise pricing.
When we discovered Cortex XDR as the best detection & response tool on the market, we knew we'd do everything we could to create access to it for our customers.
In November 2020, Gartner released its Magic Quadrant for Network Firewalls with Palo Alto Networks securing the top position yet again in the Leader quadrant.
You never forget your first cybersecurity incident. It was the summer of 2001, & I was working as a field tech, supporting several medical research departments.
The top three reasons why we selected Kirkpatrick Price as our SOC 2 Type II auditor and how that led us to a powerful risk assessment tool.
After our SOC 2 Type II audit, we started engaging with new risk categories that led us on a journey towards discovering a powerful risk assessment tool.
How the Axio360 tool helped us quantify risks and give key stakeholders the power to make informed decisions in response to potential risk events.
How the Axio360's quant tool helps us explore various risk scenarios and directly quantify the costs for those events should they occur.
Have you heard that over 90% of data breaches begin with an attacker sending email? This statistic is unfortunately about four years out of date.
Establishing our Palo Alto Networks partner status allowed us to differentiate ourselves as an MSP and MSSP in the local and regional market.
I first met Grant Leonard back in 2002. We hired him at Net Friends as a contractor to help with all sorts of IT security projects and initiatives.
Ransomware simulation and mitigation is likely to be the element of MPT that even companies with limited security awareness find most compelling.
Just in time for Cybersecurity Awareness Month, the National Institute of Standards and Technology (NIST) has released an update to Special Publication 800-53.
Microsoft Office 2010 will reach “end of support” status on October 13, 2020. If you still have users working with Office 2010, we recommend you upgrade now.
Net Friends is introducing NetCore Elements, a monthly subscription service featuring Palo Alto Networks next-generation firewall and security protections.
Your MSP must be willing to make difficult commitments in order for their Technology Stack to help customers produce returns on the investment.
Net Friends is the first managed service provider (MSP) in the Research Triangle region to deploy a complete Technology Stack for local businesses.
Net Friends announced as first strategic partner in Axio360 Partnership Program featuring Axio's industry-leading platform for assessing cyber risk exposure.
Net Friends is partnering with Palo Alto Networks, the global cybersecurity leader, to deliver true next generation firewall security.
Net Friends is ready to help you get the most out of your existing Office 365 plan or upgrade to one that meets your new telecommuting needs.
Over 90% of all cyberattacks begin via email. Within minutes, Net Friends can implement a full suite of security controls that can protect you against exploits.
Protecting your credentials is a challenge in the best of times. There are so many clever tactics malicious attackers use to get your staff’s passwords.
We’ve been hearing for years that telecommuting is the future of work. Thanks to the COVID-19 pandemic, the future is here – whether we like it or not.
In response to the COVID-19 crisis, we are announcing special packages designed to help you transition to working remotely with minimal loss of productivity.
As Rahm Emanuel once said, “You never want a serious crisis to go to waste.”
Our managers designed a practice drill that put each staff member in their preferred remote environment to verify they could perform their duties.
Many businesses are encouraging/requiring employees who can work remotely to do so because of the current pandemic. Here are some questions you should consider.
Net Friends, a North-Carolina based IT service and solutions provider, today announced that it has completed its voluntary SOC 2 Type II audit.
Any business interested in becoming SOC 2 Type II compliant will need top-notch partners in their corner to bring the expertise and focus necessary.
Passwords have repeatedly proven to be insufficient on their own to prevent targeted hacking attacks or misuse of our password-protected information.
October is Cybersecurity Month, and we’ll be blogging about the preparations we made for our SOC 2 Type II audit this past September.
From your Net Friends IT Security Experts: The Top 5 Cybersecurity Steps you can take to improve your IT security for 2019.
Strategic partnership with Castra Consulting and Bandura results in a major boost to Net Friends’ perimeter security and managed security services.
One year after the Equifax breach, the GAO filed an extensive 40 page report on the details of the Equifax breach and the government’s response to it.
If your support issue requires immediate assistance, please call our office. Email & web form submissions are only reviewed during business hours.