Cybersecurity
How to Protect Your Business While on Vacation

You've worked hard and deserve your vacation time. However, cyber threats are on the rise & bad actors don't take time off. Here's how to stay secure while OOO.

Cybersecurity
5 Benefits to Partnering with a SOC 2 Compliant IT Company

Our greater reliance on IT increases security risks. Discover how partnering with a SOC 2 compliant Managed Services Provider (MSP) boosts your cybersecurity.

Cybersecurity
Top 7 Questions to Ask a Cybersecurity Provider

Are you in the market for a new MSSP? Here are the top screening questions you need to ask when shopping for your next cybersecurity partner.

Cybersecurity
How We Developed Our Approach to Security

Our cybersecurity culture is deeply informed by our vision for Universal Safe Networks and our commitment to help businesses fortify their security.

Cybersecurity
My First Cybersecurity Incident

You never forget your first cybersecurity incident. It was the summer of 2001, & I was working as a field tech, supporting several medical research departments.

Cybersecurity
Zero Cost Security Improvements to Protect Your Business

Nearly 1 out of 4 small businesses suffered at least one cyber attack last year. Discover cost free protections you can implement now to improve your security.

Cybersecurity
How to Determine if MAM or MDM is Best for Your Business

Securing mobile devices with MAM or MDM is so vital and too often overlooked. Whichever path your organization chooses, you are already ahead of the game!

Cybersecurity
What To Do If You're Denied Cybersecurity Insurance?

Explore the 5 common reasons why businesses are denied cybersecurity insurance and what you can do if you are facing one of these scenarios.

Business
Top 4 Tips to Prepare Your Technology for Hurricane Season

With an above-average hurricane season ahead of us this year, now is the time to prepare for any adverse weather that could impact your business.

Cybersecurity
How to Secure the Best Price for Cyber Insurance

Well-run businesses in high-risk industries have lots of sensitive records & are going to actively seek cybersecurity liability coverage to offset their risks.

Cybersecurity
What Does Cyber Insurance NOT Cover?

While cybersecurity insurance helps alleviate the financial risks and burden of doing business online, there are liability limitations to this type of policy.

Cybersecurity
What Is Cyber Insurance & What Does It Cover?

Cybersecurity insurance is a contract that the policyholder purchases to help reduce the financial risks of doing business online. Learn about cyber liability.

Managed IT Services
Patch Management: What It Is & Why Your Business Needs It

Patch management is crucial to ensure business continuity. Learn more about how software patching can safeguard your organization.

Managed IT Services
Top 5 Reasons Why Zero-Touch Provisioning (ZTP) is Critical to Anywhere Operations

Anywhere Operations is the new preferred work model. Let’s explore how zero-touch provisioning (ZTP) facilitates quick, easy, and safe remote work processes.

Cybersecurity
Leveraging Single-Sign-On (SSO) to Protect Your Business

Remote workforces are using more and more apps to complete tasks and remain productive during the workday. Single-Sign-On (SSO) helps secure network access.

Cybersecurity
How Multi-Factor Authentication (MFA) Secures Your Business Operations

With a greater reliance on Anywhere Operations and remote work, businesses today require more cybersecurity measures, including multi-factor authentication.

Cybersecurity
Top 12 Mobile Security Tips to Protect Your Business

Business owners work on-the-go, so mobile security is paramount. Let’s consider the best practices to ensure your company and user data protection.

Technology
Top 12 Technology Buzzwords Every Small Business Should Know

Every SMB needs to innovate to thrive in the marketplace. Technology buzzwords also hold value in helping SMBs position for greater competitiveness.

Cybersecurity
How to Minimize Business Risks with a SOC 2 Compliant IT Company

Greater IT reliance will increase cybersecurity risks. Learn why you need a SOC 2 compliant managed services provider to boost cybersecurity.

Cybersecurity
How to Create Strong Passwords

World Password Day is a global reminder to secure your credentials with complex and unique passwords to prevent data loss and identity theft.

Managed IT Services
What Is Shadow IT?

Shadow IT is a common issue with major security risks to consider. However, it is possible to leverage shadow IT to enhance your IT systems & security policies.

Cybersecurity
What is a Cloud Access Security Broker (CASB)?

As more companies adopt cloud applications, there is a need for greater cloud security. Discover how a CASB can help with your IT security policies.

Cybersecurity
IT Security Tips for Employee Offboarding

In 2021, it was reported that 1 in 4 employees still had access to company files of a previous employer. Discover our IT pro-tips for employee offboarding.

Cybersecurity
Net Friends Pro-Tips to Avoid Tax Phishing Scams

Approximately 56% of IT decision-makers indicate that targeted phishing attacks are their primary threat.

News
Net Friends Receives SOC 2 Type II Attestation for Third Year, Adding Confidentiality Trust Services Criteria

“By engaging in the SOC 2 Type II audit every year, we are motivated by transparency and accountability,” said John Snyder, CEO of Net Friends.

Life At Net Friends
Q&A with Chelsea, Cybersecurity Analyst

"Growing up, my dad was always into new tech, and that rubbed off on me," Chelsea shares. Discover more about her journey in our "Women at Net Friends" series!

Business
How to Budget for Anywhere Operations

The new normal requires adopting an Anywhere Operations model. Let’s explore the top budget areas that will help your company work from anywhere.

Business
Top 5 Solvable Remote Work Challenges

While most industries appear to have adjusted to the work-from-anywhere model, we should consider several challenges that may arise in this mass shift.

Business
Top 5 Policies to Consider for Anywhere Operations

Anywhere Operations represent the new normal for business operations. Let’s explore the top five critical policies necessary for its adoption.

Business
Are You Ready for Anywhere Operations?

While "Work from Anywhere" is a common term, let's explore the future of "Anywhere Operations" and its implications for small businesses.

Cybersecurity
Is Your VPN Solution Optimized for Anywhere Operations?

Our four core recommendations to ensure your VPN solution is optimized for Anywhere Operations to support your distributed workforce.

Cybersecurity
Social Engineering 101: How to Safeguard Your Business

Social engineering is one of the many cyberthreat tactics that put businesses at risk for substantial harm. Learn more about how to protect your business.

Cybersecurity
Social Engineering 101: Understanding Common Tactics

Social engineering lies at the root of roughly 98% of IT security attacks. Discover how to identify the most common tactics.

Cybersecurity
Top 10 Basic Security Trainings to Build Your Cybersecurity Culture

Security Awareness Training is essential to improving your cybersecurity culture. These are the core topics your company's training program should cover.

Cybersecurity
Why Security Awareness Training Is Important For Compliance

Many security compliance standards mandate regular security training. Explore how compliance requirements can boost your business longevity.

Technology
Top 5 Benefits of Microsoft Azure for Small Businesses

Microsoft Azure offers a wide range of powerful cloud computing solutions for any small business. These 5 specific SMB benefits are worth noting about Azure.

Cybersecurity
5 Tips to Improve Your Cybersecurity Culture

Empower your employees to contribute to a robust cybersecurity culture that promotes security awareness, compliance, and incident response.

Technology
5 Notable Microsoft Windows 11 Features for Business Productivity

Windows 11 is the latest release in the Microsoft Windows operating system. Here's our list of 5 notable features that increase business productivity.

Cybersecurity
The Stack Lab: Meeting Cybersecurity Hands-On

In 2020, we designed our Stack Lab, featuring technology equipment that facilitates in-house, hands-on training for our technical staff.

Cybersecurity
Why You Need Technology Specialists

Far too often, IT companies are stuck in the generalist hiring loop with no formal strategy to develop their technical staff beyond being break-fix technicians.

Technology
The First Cornerstone to Safe Network Design: Technology Stack

By cementing your Technology Stack from the onset, you dodge disruptions such as frequently recycling technology solutions and upending operational processes.

Cybersecurity
How An MSP Helps You Prep for HIPAA Audits

Net Friends is a SOC 2 Type II certified IT partner with a long history of expertise in HIPAA compliance and Information Technology Risk Management (ITRM).

Cybersecurity
What Does An MSSP Do For Your Business?

A mature MSSP is your preferred strategic partner for implementing a robust cybersecurity program that aligns with your business operations.

Technology
Why You Don't Need Another On-Prem Server

Cloud providers are constantly upgrading their services to adhere to the latest industry standards and regulatory requirements to offer unprecedented security.

Technology
How to Check Your Trusted Platform Module (TPM)

The Trusted Platform Module (TPM) is central to Microsoft’s plans to boost the security of 1.3 billion workstations running Windows 10.

News
Castra Taps NetForce to Fill IT Positions as Demand Surges

Net Friends announces that Castra, an award-winning leader in MDR, has signed the largest NetForce IT staffing agreement to date.

Cybersecurity
Net Friends' Response to the Kaseya Breach

A message from Net Friends CEO John Snyder on the Kaseya Breach

Cybersecurity
How Do We Get to Universally Safe Networks?

It starts with a professional standardized certification for those who practice safe network design and operation.

Cybersecurity
How to Eliminate RDP Vulnerabilities

Remote Desktop Protocol (RDP) vulnerabilities are often easy targets for cyber criminals and they are too expensive to appropriately secure and monitor.

Cybersecurity
How We Sustained Our Security Culture

At Net Friends, we have a long history of improving our cybersecurity posture and applying it to our services to promote secure environments for our customers.

Technology
Creating a Media Disposal Policy for Remote Workers

Treatment of end-of-life devices requires policies for thorough data sanitization before e-waste recycling and disposal, especially with a remote workforce.

Cybersecurity
MDR Case Study: REvil Ransomware

The security vendor Cybereason describes REvil (aka Sodinokibi) as “the Crown Prince of Ransomware.”

Business
Top 8 Things to Include in Your IT Budget in 2021

Does your company have an IT budget? What are your tech spending categories? Keep reading for great insights on what should be included.

Managed IT Services
How A Managed Services Provider Can Help You Manage Your IT Budget

Trying to keep IT costs low, or prioritize a fixed monthly cost? Let’s discuss how a managed IT services provider can help you manage your IT budget.

Managed IT Services
Why You Need An Annual Infrastructure Assessment

Without an annual assessment, most businesses have no visibility over their assets, resource constraints, or other critical insights about their environment.

News
Net Friends Receives SOC 2 Type II Attestation for Second Year in A Row

‍Independent Audit Verifies Net Friends’ Internal Controls and Processes

Business
How Your IT Partner Contributes to Your Operational Maturity

What does the primary focus of your IT company say about the operational maturity of your IT environment?

Business
Part III: How Your IT Partner Contributes to Your Operational Maturity

What tools do you have in place and optimized to support your risk-informed responses?

Business
Part I: How Your IT Partner Contributes to Your Operational Maturity

Are you focused on minimizing network downtown or avoiding unnecessary disruptions?

Cybersecurity
MDR Case Study: Ryuk Ransomware

Ryuk is a sophisticated strand of ransomware that not only encrypts network drives, but it also deletes shadow copies on the endpoint. Here's how to prevent it!

Cybersecurity
How We Became HIPAA Experts

The story of how we went from a scrappy group of six technicians at Duke to a radically innovative IT partner that brought HIPAA expertise to the table.

Cybersecurity
MDR Case Study: Maze Ransomware

Maze is a sophisticated strand of ransomware that steals data and exfiltrates it to servers controlled by hackers.

Cybersecurity
Leakware: The New Ransomware Targeting Hospitals, Law Firms, and... You?

The primary lever of extortion in leakware is to threaten to release a target’s confidential data. Here's how you can protect yourself against these attacks.

Managed IT Services
Identify Critical Data Missing from Your Backup Strategy

Line-of-business (LOB) software is the Achilles heel of small business backup strategies. Don't forget to secure critical data from your LOB tools too.

Cybersecurity
The Best Detection & Response Tools Against Internet Attacks

Net Friends selected a potent combination of tools that allows us to offer our small business customers enterprise-grade security without enterprise pricing.

Technology
How Our Passion for Cortex XDR Paid Off

When we discovered Cortex XDR as the best detection & response tool on the market, we knew we'd do everything we could to create access to it for our customers.

Strategy
Our 6-Month Head Start on the Pandemic

How on earth did we “predict” the pandemic? All “Back to the Future” jokes aside, the simple fact is we didn’t predict anything. What we did was more practical.

Managed IT Services
Palo Alto Networks Leads in Gartner's 2020 Magic Quadrant for Network Firewalls

In November 2020, Gartner released its Magic Quadrant for Network Firewalls with Palo Alto Networks securing the top position yet again in the Leader quadrant.

Managed IT Services
Why Use Microsoft 365 Business Premium?

The “Business Premium” plan is affordable and gives us access to powerful cloud-based security tools that we could call upon to keep your data more secure.

Cybersecurity
Identifying Point-in-Time Risks with Kirkpatrick Price

The top three reasons why we selected Kirkpatrick Price as our SOC 2 Type II auditor and how that led us to a powerful risk assessment tool.

Cybersecurity
Net Friends' Risk Assessment Video Series

After our SOC 2 Type II audit, we started engaging with new risk categories that led us on a journey towards discovering a powerful risk assessment tool.

Cybersecurity
Discovering a Next-Generation Risk Assessment Tool with Axio

How the Axio360 tool helped us quantify risks and give key stakeholders the power to make informed decisions in response to potential risk events.

Cybersecurity
Quantifying Risk Scenarios with Axio360

How the Axio360's quant tool helps us explore various risk scenarios and directly quantify the costs for those events should they occur.

Managed IT Services
Introducing NetVisor Cloud Account Security

Have you heard that over 90% of data breaches begin with an attacker sending email? This statistic is unfortunately about four years out of date.

Life At Net Friends
Q&A with Net Friend Kyle G. on Veterans Day

One of the most rewarding aspects of working alongside an incredible team of talented people is that you discover the diverse experiences that people bring.

Managed IT Services
How We Built Our Technology Stack: A Palo Alto Networks Case Study

Establishing our Palo Alto Networks partner status allowed us to differentiate ourselves as an MSP and MSSP in the local and regional market.

Life At Net Friends
How Our Joint Venture with Castra Began

I first met Grant Leonard back in 2002. We hired him at Net Friends as a contractor to help with all sorts of IT security projects and initiatives.

Managed IT Services
How We Apply Continual Improvement to IT

This battle-tested process is what lets us give our NetVisor customers a single monthly rate, guaranteed for up to three years.

Cybersecurity
Net Friends on Managed Pentesting in PenTest Magazine

Ransomware simulation and mitigation is likely to be the element of MPT that even companies with limited security awareness find most compelling.

Cybersecurity
Top 5 Takeaways for NIST 800-53 Rev 5

Just in time for Cybersecurity Awareness Month, the National Institute of Standards and Technology (NIST) has released an update to Special Publication 800-53.

Managed IT Services
What Is A Technology Stack & Why Should I Care?

If your current IT provider isn’t operating within a defined Technology Stack, it means they are not supporting you optimally.

Managed IT Services
Microsoft Office 2010 Reaches End of Support in October 2020

Microsoft Office 2010 will reach “end of support” status on October 13, 2020. If you still have users working with Office 2010, we recommend you upgrade now.

News
Net Friends Recognized by Palo Alto Networks as a NextWave MSSP Partner

Net Friends is introducing NetCore Elements, a monthly subscription service featuring Palo Alto Networks next-generation firewall and security protections.

Managed IT Services
Top 4 Technology Stack Questions to Ask Your MSP

Your MSP must be willing to make difficult commitments in order for their Technology Stack to help customers produce returns on the investment.

Business
Top 3 BYOD Risks for WFH

As businesses worldwide shifted to work-from-home configurations at the start of the pandemic, this left many with little choice but to adopt “BYOD” solutions.

Managed IT Services
The Next Big Thing: Technology Stacks

Net Friends is the first managed service provider (MSP) in the Research Triangle region to deploy a complete Technology Stack for local businesses.

News
Net Friends Joins Axio360 Partnership Program

Net Friends announced as first strategic partner in Axio360 Partnership Program featuring Axio's industry-leading platform for assessing cyber risk exposure.

Technology
Top 3 Reasons Why Palo Alto Firewalls Are The Best

Net Friends is partnering with Palo Alto Networks, the global cybersecurity leader, to deliver true next generation firewall security.

Business
Office 365 Collaboration Tools: A Telecommuting Response

Net Friends is ready to help you get the most out of your existing Office 365 plan or upgrade to one that meets your new telecommuting needs.

Business
Securing Email & Cloud Data: A Telecommuting Response

Over 90% of all cyberattacks begin via email. Within minutes, Net Friends can implement a full suite of security controls that can protect you against exploits.

Business
Securing Identifications: A Telecommuting Response

Protecting your credentials is a challenge in the best of times. There are so many clever tactics malicious attackers use to get your staff’s passwords.

Business
Our Telecommuting Response Packages

In response to the COVID-19 crisis, we are announcing special packages designed to help you transition to working remotely with minimal loss of productivity.

Business
Dust Off Your Business Continuity Plan for Your Telecommuting Response

As Rahm Emanuel once said, “You never want a serious crisis to go to waste.”

Business
Top 5 Requirements for a Telecommuting Policy

Many small business owners have not performed the due diligence that will ensure their telecommuting policies are ready for a significant shift.

Business
The Remote Drills That Prepared Us For A Pandemic

Our managers designed a practice drill that put each staff member in their preferred remote environment to verify they could perform their duties.

Business
Are You Prepared to Work Remotely?

Many businesses are encouraging/requiring employees who can work remotely to do so because of the current pandemic. Here are some questions you should consider.

News
Net Friends Receives SOC 2 Type II Attestation

Net Friends, a North-Carolina based IT service and solutions provider, today announced that it has completed its voluntary SOC 2 Type II audit.

Business
The Creative Outcome of SOC Audits

“I’ve never seen a network diagram that didn’t require a guided tour by the person who made it,” said Randy, our SOC 2 auditor, back in March 2019.

Cybersecurity
MFA = Multi-Factor Awesome

Passwords have repeatedly proven to be insufficient on their own to prevent targeted hacking attacks or misuse of our password-protected information.

Cybersecurity
Developing a Physical Access Policy for the SOC 2 Type II Audit

October is Cybersecurity Month, and we’ll be blogging about the preparations we made for our SOC 2 Type II audit this past September.

Our friendly IT Experts are here for you. Contact Us Today!

Are you searching for a SOC 2 compliant
IT Services Provider you can trust?

Connect With A [Net] Friend

Contact our IT
Support Center 24/7

Option 1: Call (919) 680-3763
Option 2: Email - request@netfriends.com
Option 3: Complete the form below
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

If your support issue requires immediate assistance, please call our office. Email & web form submissions are only reviewed during business hours.