.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c7cf176427cf17642f59365a3bc638732bc638732bc638732
Found 2 files trough .DS_Store spidering: /images /images/Rotator
Open service 20.118.48.4:443 · resources.netreaction.com
2026-01-12 21:06
HTTP/1.1 200 OK Content-Length: 27536 Connection: close Content-Type: text/html; charset=utf-8 Date: Mon, 12 Jan 2026 21:07:17 GMT Cache-Control: s-maxage=31536000 ETag: "oxgwulnfzll86" Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding request-context: appId=cid-v1: X-Frame-Options: DENY X-Content-Type-Options: nosniff Referrer-Policy: origin-when-cross-origin x-nextjs-cache: HIT x-nextjs-prerender: 1 x-nextjs-prerender: 1 x-nextjs-stale-time: 300 X-Powered-By: Next.js Page title: Security Resources Hub | Net Reaction <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
Open service 20.118.48.4:443 · resources.netreaction.com
2026-01-11 21:06
HTTP/1.1 200 OK Content-Length: 27536 Connection: close Content-Type: text/html; charset=utf-8 Date: Sun, 11 Jan 2026 21:07:20 GMT Cache-Control: s-maxage=31536000 ETag: "oxgwulnfzll86" Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding request-context: appId=cid-v1: X-Frame-Options: DENY X-Content-Type-Options: nosniff Referrer-Policy: origin-when-cross-origin x-nextjs-cache: HIT x-nextjs-prerender: 1 x-nextjs-prerender: 1 x-nextjs-stale-time: 300 X-Powered-By: Next.js Page title: Security Resources Hub | Net Reaction <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
Open service 20.118.48.4:443 · resources.netreaction.com
2026-01-10 21:08
HTTP/1.1 200 OK Content-Length: 27536 Connection: close Content-Type: text/html; charset=utf-8 Date: Sat, 10 Jan 2026 21:09:58 GMT Cache-Control: s-maxage=31536000 ETag: "oxgwulnfzll86" Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding request-context: appId=cid-v1: X-Frame-Options: DENY X-Content-Type-Options: nosniff Referrer-Policy: origin-when-cross-origin x-nextjs-cache: HIT x-nextjs-prerender: 1 x-nextjs-prerender: 1 x-nextjs-stale-time: 300 X-Powered-By: Next.js Page title: Security Resources Hub | Net Reaction <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
Open service 20.118.48.4:443 · resources.netreaction.com
2026-01-09 21:22
HTTP/1.1 200 OK Content-Length: 27536 Connection: close Content-Type: text/html; charset=utf-8 Date: Fri, 09 Jan 2026 21:23:38 GMT Cache-Control: s-maxage=31536000 ETag: "oxgwulnfzll86" Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding request-context: appId=cid-v1: X-Frame-Options: DENY X-Content-Type-Options: nosniff Referrer-Policy: origin-when-cross-origin x-nextjs-cache: HIT x-nextjs-prerender: 1 x-nextjs-prerender: 1 x-nextjs-stale-time: 300 X-Powered-By: Next.js Page title: Security Resources Hub | Net Reaction <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
Open service 20.118.48.4:443 · resources.netreaction.com
2026-01-08 21:25
HTTP/1.1 200 OK Content-Length: 27536 Connection: close Content-Type: text/html; charset=utf-8 Date: Thu, 08 Jan 2026 21:26:46 GMT Cache-Control: s-maxage=31536000 ETag: "oxgwulnfzll86" Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding request-context: appId=cid-v1: X-Frame-Options: DENY X-Content-Type-Options: nosniff Referrer-Policy: origin-when-cross-origin x-nextjs-cache: HIT x-nextjs-prerender: 1 x-nextjs-prerender: 1 x-nextjs-stale-time: 300 X-Powered-By: Next.js Page title: Security Resources Hub | Net Reaction <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
Open service 20.118.48.4:443 · resources.netreaction.com
2026-01-07 21:14
HTTP/1.1 200 OK Content-Length: 27536 Connection: close Content-Type: text/html; charset=utf-8 Date: Wed, 07 Jan 2026 21:15:48 GMT Cache-Control: s-maxage=31536000 ETag: "oxgwulnfzll86" Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding request-context: appId=cid-v1: X-Frame-Options: DENY X-Content-Type-Options: nosniff Referrer-Policy: origin-when-cross-origin x-nextjs-cache: HIT x-nextjs-prerender: 1 x-nextjs-prerender: 1 x-nextjs-stale-time: 300 X-Powered-By: Next.js Page title: Security Resources Hub | Net Reaction <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
Open service 20.118.48.4:443 · resources.netreaction.com
2026-01-06 21:10
HTTP/1.1 200 OK Content-Length: 27536 Connection: close Content-Type: text/html; charset=utf-8 Date: Tue, 06 Jan 2026 21:11:19 GMT Cache-Control: s-maxage=31536000 ETag: "oxgwulnfzll86" Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding request-context: appId=cid-v1: X-Frame-Options: DENY X-Content-Type-Options: nosniff Referrer-Policy: origin-when-cross-origin x-nextjs-cache: HIT x-nextjs-prerender: 1 x-nextjs-prerender: 1 x-nextjs-stale-time: 300 X-Powered-By: Next.js Page title: Security Resources Hub | Net Reaction <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
Open service 20.118.48.4:443 · resources.netreaction.com
2026-01-03 21:10
HTTP/1.1 200 OK Content-Length: 27536 Connection: close Content-Type: text/html; charset=utf-8 Date: Sat, 03 Jan 2026 21:10:07 GMT Cache-Control: s-maxage=31536000 ETag: "oxgwulnfzll86" Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding request-context: appId=cid-v1: X-Frame-Options: DENY X-Content-Type-Options: nosniff Referrer-Policy: origin-when-cross-origin x-nextjs-cache: HIT x-nextjs-prerender: 1 x-nextjs-prerender: 1 x-nextjs-stale-time: 300 X-Powered-By: Next.js Page title: Security Resources Hub | Net Reaction <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
Open service 20.118.48.4:443 · resources.netreaction.com
2026-01-02 21:39
HTTP/1.1 200 OK Content-Length: 27536 Connection: close Content-Type: text/html; charset=utf-8 Date: Fri, 02 Jan 2026 21:39:37 GMT Cache-Control: s-maxage=31536000 ETag: "oxgwulnfzll86" Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding request-context: appId=cid-v1: X-Frame-Options: DENY X-Content-Type-Options: nosniff Referrer-Policy: origin-when-cross-origin x-nextjs-cache: HIT x-nextjs-prerender: 1 x-nextjs-prerender: 1 x-nextjs-stale-time: 300 X-Powered-By: Next.js Page title: Security Resources Hub | Net Reaction <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
Open service 20.118.48.4:443 · resources.netreaction.com
2026-01-01 21:16
HTTP/1.1 200 OK Content-Length: 27536 Connection: close Content-Type: text/html; charset=utf-8 Date: Thu, 01 Jan 2026 21:16:25 GMT Cache-Control: s-maxage=31536000 ETag: "oxgwulnfzll86" Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding request-context: appId=cid-v1: X-Frame-Options: DENY X-Content-Type-Options: nosniff Referrer-Policy: origin-when-cross-origin x-nextjs-cache: HIT x-nextjs-prerender: 1 x-nextjs-prerender: 1 x-nextjs-stale-time: 300 X-Powered-By: Next.js Page title: Security Resources Hub | Net Reaction <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
Open service 20.118.48.4:443 · resources.netreaction.com
2025-12-31 21:19
HTTP/1.1 200 OK Content-Length: 27536 Connection: close Content-Type: text/html; charset=utf-8 Date: Wed, 31 Dec 2025 21:19:39 GMT Cache-Control: s-maxage=31536000 ETag: "oxgwulnfzll86" Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding request-context: appId=cid-v1: X-Frame-Options: DENY X-Content-Type-Options: nosniff Referrer-Policy: origin-when-cross-origin x-nextjs-cache: HIT x-nextjs-prerender: 1 x-nextjs-prerender: 1 x-nextjs-stale-time: 300 X-Powered-By: Next.js Page title: Security Resources Hub | Net Reaction <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
Open service 20.118.48.4:443 · resources.netreaction.com
2025-12-30 21:22
HTTP/1.1 200 OK Content-Length: 27536 Connection: close Content-Type: text/html; charset=utf-8 Date: Tue, 30 Dec 2025 21:22:43 GMT Cache-Control: s-maxage=31536000 ETag: "oxgwulnfzll86" Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding request-context: appId=cid-v1: X-Frame-Options: DENY X-Content-Type-Options: nosniff Referrer-Policy: origin-when-cross-origin x-nextjs-cache: HIT x-nextjs-prerender: 1 x-nextjs-prerender: 1 x-nextjs-stale-time: 300 X-Powered-By: Next.js Page title: Security Resources Hub | Net Reaction <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
Open service 20.118.48.4:443 · resources.netreaction.com
2025-12-22 20:37