Law firms entrusted with highly sensitive client information face a heightened risk of cyberattacks.
Explore the 5 common reasons why businesses are denied cybersecurity insurance and what you can do if you are facing one of these scenarios.
The secret to digital security is not rocket science. It is about being vigilant, informed, and proactive with every cybersecurity practice.
SMBs are attractive targets for cybercriminals due to a combination of factors.
How prepared is your team for a real cyberattack? This innovative card game simulates a cyberattack, so you can learn how to defend against real-world threats.
The consequences of poor server's security can be catastrophic. Breaches can expose a wealth of sensitive data. Learn how to level up your server security.
Most mature businesses already have cybersecurity protections in place. However, chances are still high that they may be approaching cybersecurity backwards.
Crisis communication planning for cyberattacks is an important part of your cybersecurity plan.
Building a strong Work-From-Home policy that stands as a brick wall against cyber threats!
Worried about cyber threats on-the-go? Net Friends has some airport pro-tips to help you work remotely in a secure way.
Your local coffee shop is a refreshing backdrop for your workday, however the convenience of public Wi-Fi can introduce IT risks you should be prepared for...
As the digital landscape evolves, so do the methods used by cyber adversaries. It is important to remain informed about the latest threats to be prepared...
Combining managed security services and cyber insurance provides SMBs with comprehensive protection against cyber threats... learn more!
As exciting as it is to have the luxury of working from anywhere, it is important to know how to remain secure.
Investing in Palo Alto Networks Strata is like equipping your security team with night-vision goggles – they can see further, understand more, and react faster.
A business fortified with strong cybersecurity measures is a business built with bricks, standing tall against the huffs and puffs of cyber threats...
Put simply, the term 'server hardening' refers to configuring your server properly. It is a critical decision that will boosts your business resiliency.
The average office worker receives 121 emails daily, the volume and openness of email makes it highly vulnerable to cyberattacks.
You've worked hard and deserve your vacation time. However, cyber threats are on the rise & bad actors don't take time off. Here's how to stay secure while OOO.
Cybersecurity is a dynamic landscape, continually evolving as new threats appear and existing ones morph. What security solutions do we recommend to SMBs?
This brief guide underscores the importance of a cohesive online security approach. Learn more about DNS and SSL certificates for business.
Social engineering is one of the many cyberthreat tactics that put businesses at risk for substantial harm. Learn more about how to protect your business.
Social engineering lies at the root of roughly 98% of IT security attacks. Discover how to identify the most common tactics.
Our greater reliance on IT increases security risks. Discover how partnering with a SOC 2 compliant Managed Services Provider (MSP) boosts your cybersecurity.
In business, confidently securing your digital infrastructure will require building a robust security toolkit. Begin with cybersecurity assessments!
Password security allows us to safely enjoy the advantages of our interconnected world. A reliable password manager helps us manage our password security.
Empower your employees to contribute to a robust cybersecurity culture that promotes security awareness, compliance, and incident response.
Approximately 56% of IT decision-makers indicate that targeted phishing attacks are their primary threat.
Are you in the market for a new MSSP? Here are the top screening questions you need to ask when shopping for your next cybersecurity partner.
Our cybersecurity culture is deeply informed by our vision for Universal Safe Networks and our commitment to help businesses fortify their security.
You never forget your first cybersecurity incident. It was the summer of 2001, & I was working as a field tech, supporting several medical research departments.
Nearly 1 out of 4 small businesses suffered at least one cyber attack last year. Discover cost free protections you can implement now to improve your security.
Securing mobile devices with MAM or MDM is so vital and too often overlooked. Whichever path your organization chooses, you are already ahead of the game!
Well-run businesses in high-risk industries have lots of sensitive records & are going to actively seek cybersecurity liability coverage to offset their risks.
While cybersecurity insurance helps alleviate the financial risks and burden of doing business online, there are liability limitations to this type of policy.
Cybersecurity insurance is a contract that the policyholder purchases to help reduce the financial risks of doing business online. Learn about cyber liability.
Remote workforces are using more and more apps to complete tasks and remain productive during the workday. Single-Sign-On (SSO) helps secure network access.
With a greater reliance on Anywhere Operations and remote work, businesses today require more cybersecurity measures, including multi-factor authentication.
Business owners work on-the-go, so mobile security is paramount. Let’s consider the best practices to ensure your company and user data protection.
Greater IT reliance will increase cybersecurity risks. Learn why you need a SOC 2 compliant managed services provider to boost cybersecurity.
World Password Day is a global reminder to secure your credentials with complex and unique passwords to prevent data loss and identity theft.
As more companies adopt cloud applications, there is a need for greater cloud security. Discover how a CASB can help with your IT security policies.
In 2021, it was reported that 1 in 4 employees still had access to company files of a previous employer. Discover our IT pro-tips for employee offboarding.
Our four core recommendations to ensure your VPN solution is optimized for Anywhere Operations to support your distributed workforce.
Security Awareness Training is essential to improving your cybersecurity culture. These are the core topics your company's training program should cover.
Many security compliance standards mandate regular security training. Explore how compliance requirements can boost your business longevity.
In 2020, we designed our Stack Lab, featuring technology equipment that facilitates in-house, hands-on training for our technical staff.
Far too often, IT companies are stuck in the generalist hiring loop with no formal strategy to develop their technical staff beyond being break-fix technicians.
Net Friends is a SOC 2 Type II certified IT partner with a long history of expertise in HIPAA compliance and Information Technology Risk Management (ITRM).
A mature MSSP is your preferred strategic partner for implementing a robust cybersecurity program that aligns with your business operations.
A message from Net Friends CEO John Snyder on the Kaseya Breach
It starts with a professional standardized certification for those who practice safe network design and operation.
Remote Desktop Protocol (RDP) vulnerabilities are often easy targets for cyber criminals and they are too expensive to appropriately secure and monitor.
At Net Friends, we have a long history of improving our cybersecurity posture and applying it to our services to promote secure environments for our customers.
The security vendor Cybereason describes REvil (aka Sodinokibi) as “the Crown Prince of Ransomware.”
Ryuk is a sophisticated strand of ransomware that not only encrypts network drives, but it also deletes shadow copies on the endpoint. Here's how to prevent it!
The story of how we went from a scrappy group of six technicians at Duke to a radically innovative IT partner that brought HIPAA expertise to the table.
Maze is a sophisticated strand of ransomware that steals data and exfiltrates it to servers controlled by hackers.
The primary lever of extortion in leakware is to threaten to release a target’s confidential data. Here's how you can protect yourself against these attacks.
Net Friends selected a potent combination of tools that allows us to offer our small business customers enterprise-grade security without enterprise pricing.
Ransomware simulation and mitigation is likely to be the element of MPT that even companies with limited security awareness find most compelling.
Just in time for Cybersecurity Awareness Month, the National Institute of Standards and Technology (NIST) has released an update to Special Publication 800-53.
Passwords have repeatedly proven to be insufficient on their own to prevent targeted hacking attacks or misuse of our password-protected information.
October is Cybersecurity Month, and we’ll be blogging about the preparations we made for our SOC 2 Type II audit this past September.
From your Net Friends IT Security Experts: The Top 5 Cybersecurity Steps you can take to improve your IT security for 2019.
One year after the Equifax breach, the GAO filed an extensive 40 page report on the details of the Equifax breach and the government’s response to it.
If your support issue requires immediate assistance, please call our office. Email & web form submissions are only reviewed during business hours.