Domain resources.netreaction.com
United States
MICROSOFT-CORP-MSN-AS-BLOCK
  • MacOS file listing through .DS_Store file
    First seen 2022-12-13 10:13
    Last seen 2025-03-14 01:06
    Open for 821 days
  • Open service 20.118.48.4:443 · resources.netreaction.com

    2026-01-12 21:06

    HTTP/1.1 200 OK
    Content-Length: 27536
    Connection: close
    Content-Type: text/html; charset=utf-8
    Date: Mon, 12 Jan 2026 21:07:17 GMT
    Cache-Control: s-maxage=31536000
    ETag: "oxgwulnfzll86"
    Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding
    request-context: appId=cid-v1:
    X-Frame-Options: DENY
    X-Content-Type-Options: nosniff
    Referrer-Policy: origin-when-cross-origin
    x-nextjs-cache: HIT
    x-nextjs-prerender: 1
    x-nextjs-prerender: 1
    x-nextjs-stale-time: 300
    X-Powered-By: Next.js
    
    Page title: Security Resources Hub | Net Reaction
    
    <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
    Found 2 days ago by HttpPlugin
    Create report
  • Open service 20.118.48.4:443 · resources.netreaction.com

    2026-01-11 21:06

    HTTP/1.1 200 OK
    Content-Length: 27536
    Connection: close
    Content-Type: text/html; charset=utf-8
    Date: Sun, 11 Jan 2026 21:07:20 GMT
    Cache-Control: s-maxage=31536000
    ETag: "oxgwulnfzll86"
    Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding
    request-context: appId=cid-v1:
    X-Frame-Options: DENY
    X-Content-Type-Options: nosniff
    Referrer-Policy: origin-when-cross-origin
    x-nextjs-cache: HIT
    x-nextjs-prerender: 1
    x-nextjs-prerender: 1
    x-nextjs-stale-time: 300
    X-Powered-By: Next.js
    
    Page title: Security Resources Hub | Net Reaction
    
    <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
    Found 2026-01-11 by HttpPlugin
    Create report
  • Open service 20.118.48.4:443 · resources.netreaction.com

    2026-01-10 21:08

    HTTP/1.1 200 OK
    Content-Length: 27536
    Connection: close
    Content-Type: text/html; charset=utf-8
    Date: Sat, 10 Jan 2026 21:09:58 GMT
    Cache-Control: s-maxage=31536000
    ETag: "oxgwulnfzll86"
    Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding
    request-context: appId=cid-v1:
    X-Frame-Options: DENY
    X-Content-Type-Options: nosniff
    Referrer-Policy: origin-when-cross-origin
    x-nextjs-cache: HIT
    x-nextjs-prerender: 1
    x-nextjs-prerender: 1
    x-nextjs-stale-time: 300
    X-Powered-By: Next.js
    
    Page title: Security Resources Hub | Net Reaction
    
    <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
    Found 2026-01-10 by HttpPlugin
    Create report
  • Open service 20.118.48.4:443 · resources.netreaction.com

    2026-01-09 21:22

    HTTP/1.1 200 OK
    Content-Length: 27536
    Connection: close
    Content-Type: text/html; charset=utf-8
    Date: Fri, 09 Jan 2026 21:23:38 GMT
    Cache-Control: s-maxage=31536000
    ETag: "oxgwulnfzll86"
    Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding
    request-context: appId=cid-v1:
    X-Frame-Options: DENY
    X-Content-Type-Options: nosniff
    Referrer-Policy: origin-when-cross-origin
    x-nextjs-cache: HIT
    x-nextjs-prerender: 1
    x-nextjs-prerender: 1
    x-nextjs-stale-time: 300
    X-Powered-By: Next.js
    
    Page title: Security Resources Hub | Net Reaction
    
    <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
    Found 2026-01-09 by HttpPlugin
    Create report
  • Open service 20.118.48.4:443 · resources.netreaction.com

    2026-01-08 21:25

    HTTP/1.1 200 OK
    Content-Length: 27536
    Connection: close
    Content-Type: text/html; charset=utf-8
    Date: Thu, 08 Jan 2026 21:26:46 GMT
    Cache-Control: s-maxage=31536000
    ETag: "oxgwulnfzll86"
    Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding
    request-context: appId=cid-v1:
    X-Frame-Options: DENY
    X-Content-Type-Options: nosniff
    Referrer-Policy: origin-when-cross-origin
    x-nextjs-cache: HIT
    x-nextjs-prerender: 1
    x-nextjs-prerender: 1
    x-nextjs-stale-time: 300
    X-Powered-By: Next.js
    
    Page title: Security Resources Hub | Net Reaction
    
    <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
    Found 2026-01-08 by HttpPlugin
    Create report
  • Open service 20.118.48.4:443 · resources.netreaction.com

    2026-01-07 21:14

    HTTP/1.1 200 OK
    Content-Length: 27536
    Connection: close
    Content-Type: text/html; charset=utf-8
    Date: Wed, 07 Jan 2026 21:15:48 GMT
    Cache-Control: s-maxage=31536000
    ETag: "oxgwulnfzll86"
    Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding
    request-context: appId=cid-v1:
    X-Frame-Options: DENY
    X-Content-Type-Options: nosniff
    Referrer-Policy: origin-when-cross-origin
    x-nextjs-cache: HIT
    x-nextjs-prerender: 1
    x-nextjs-prerender: 1
    x-nextjs-stale-time: 300
    X-Powered-By: Next.js
    
    Page title: Security Resources Hub | Net Reaction
    
    <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
    Found 2026-01-07 by HttpPlugin
    Create report
  • Open service 20.118.48.4:443 · resources.netreaction.com

    2026-01-06 21:10

    HTTP/1.1 200 OK
    Content-Length: 27536
    Connection: close
    Content-Type: text/html; charset=utf-8
    Date: Tue, 06 Jan 2026 21:11:19 GMT
    Cache-Control: s-maxage=31536000
    ETag: "oxgwulnfzll86"
    Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding
    request-context: appId=cid-v1:
    X-Frame-Options: DENY
    X-Content-Type-Options: nosniff
    Referrer-Policy: origin-when-cross-origin
    x-nextjs-cache: HIT
    x-nextjs-prerender: 1
    x-nextjs-prerender: 1
    x-nextjs-stale-time: 300
    X-Powered-By: Next.js
    
    Page title: Security Resources Hub | Net Reaction
    
    <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
    Found 2026-01-06 by HttpPlugin
    Create report
  • Open service 20.118.48.4:443 · resources.netreaction.com

    2026-01-03 21:10

    HTTP/1.1 200 OK
    Content-Length: 27536
    Connection: close
    Content-Type: text/html; charset=utf-8
    Date: Sat, 03 Jan 2026 21:10:07 GMT
    Cache-Control: s-maxage=31536000
    ETag: "oxgwulnfzll86"
    Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding
    request-context: appId=cid-v1:
    X-Frame-Options: DENY
    X-Content-Type-Options: nosniff
    Referrer-Policy: origin-when-cross-origin
    x-nextjs-cache: HIT
    x-nextjs-prerender: 1
    x-nextjs-prerender: 1
    x-nextjs-stale-time: 300
    X-Powered-By: Next.js
    
    Page title: Security Resources Hub | Net Reaction
    
    <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
    Found 2026-01-03 by HttpPlugin
    Create report
  • Open service 20.118.48.4:443 · resources.netreaction.com

    2026-01-02 21:39

    HTTP/1.1 200 OK
    Content-Length: 27536
    Connection: close
    Content-Type: text/html; charset=utf-8
    Date: Fri, 02 Jan 2026 21:39:37 GMT
    Cache-Control: s-maxage=31536000
    ETag: "oxgwulnfzll86"
    Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding
    request-context: appId=cid-v1:
    X-Frame-Options: DENY
    X-Content-Type-Options: nosniff
    Referrer-Policy: origin-when-cross-origin
    x-nextjs-cache: HIT
    x-nextjs-prerender: 1
    x-nextjs-prerender: 1
    x-nextjs-stale-time: 300
    X-Powered-By: Next.js
    
    Page title: Security Resources Hub | Net Reaction
    
    <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
    Found 2026-01-02 by HttpPlugin
    Create report
  • Open service 20.118.48.4:443 · resources.netreaction.com

    2026-01-01 21:16

    HTTP/1.1 200 OK
    Content-Length: 27536
    Connection: close
    Content-Type: text/html; charset=utf-8
    Date: Thu, 01 Jan 2026 21:16:25 GMT
    Cache-Control: s-maxage=31536000
    ETag: "oxgwulnfzll86"
    Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding
    request-context: appId=cid-v1:
    X-Frame-Options: DENY
    X-Content-Type-Options: nosniff
    Referrer-Policy: origin-when-cross-origin
    x-nextjs-cache: HIT
    x-nextjs-prerender: 1
    x-nextjs-prerender: 1
    x-nextjs-stale-time: 300
    X-Powered-By: Next.js
    
    Page title: Security Resources Hub | Net Reaction
    
    <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
    Found 2026-01-01 by HttpPlugin
    Create report
  • Open service 20.118.48.4:443 · resources.netreaction.com

    2025-12-31 21:19

    HTTP/1.1 200 OK
    Content-Length: 27536
    Connection: close
    Content-Type: text/html; charset=utf-8
    Date: Wed, 31 Dec 2025 21:19:39 GMT
    Cache-Control: s-maxage=31536000
    ETag: "oxgwulnfzll86"
    Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding
    request-context: appId=cid-v1:
    X-Frame-Options: DENY
    X-Content-Type-Options: nosniff
    Referrer-Policy: origin-when-cross-origin
    x-nextjs-cache: HIT
    x-nextjs-prerender: 1
    x-nextjs-prerender: 1
    x-nextjs-stale-time: 300
    X-Powered-By: Next.js
    
    Page title: Security Resources Hub | Net Reaction
    
    <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
    Found 2025-12-31 by HttpPlugin
    Create report
  • Open service 20.118.48.4:443 · resources.netreaction.com

    2025-12-30 21:22

    HTTP/1.1 200 OK
    Content-Length: 27536
    Connection: close
    Content-Type: text/html; charset=utf-8
    Date: Tue, 30 Dec 2025 21:22:43 GMT
    Cache-Control: s-maxage=31536000
    ETag: "oxgwulnfzll86"
    Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch, Accept-Encoding
    request-context: appId=cid-v1:
    X-Frame-Options: DENY
    X-Content-Type-Options: nosniff
    Referrer-Policy: origin-when-cross-origin
    x-nextjs-cache: HIT
    x-nextjs-prerender: 1
    x-nextjs-prerender: 1
    x-nextjs-stale-time: 300
    X-Powered-By: Next.js
    
    Page title: Security Resources Hub | Net Reaction
    
    <!DOCTYPE html><!--OInumHTJ7TWeIWi_tIo5_--><html lang="en"><head><meta charSet="utf-8"/><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/3aa3e825b1feca58.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-5694af5a2b225c90.js"/><script src="/_next/static/chunks/4bd1b696-cf72ae8a39fa05aa.js" async=""></script><script src="/_next/static/chunks/964-e229cbb18e88417e.js" async=""></script><script src="/_next/static/chunks/main-app-1ac9fc666abe49a1.js" async=""></script><script src="/_next/static/chunks/874-437a265a67d6cfee.js" async=""></script><script src="/_next/static/chunks/app/page-e19da60f6cebc26e.js" async=""></script><link rel="icon" href="/favicon.ico"/><title>Security Resources Hub | Net Reaction</title><meta name="description" content="Free information security planning resources and assessments to help organizations improve their security posture."/><meta name="author" content="Net Reaction, LLC"/><meta name="keywords" content="information security, risk assessment, financial fraud, incident response, cybersecurity"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="antialiased"><div hidden=""><!--$--><!--/$--></div><div class="min-h-screen bg-gray-50"><div class="bg-gradient-to-r from-nr-dark-blue to-nr-blue text-white"><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="text-center"><h1 class="text-4xl md:text-6xl font-bold mb-6">Security Resources Hub</h1><p class="text-xl md:text-2xl mb-8 text-blue-100 max-w-3xl mx-auto">Practical information security planning resources to help small businesses understand and improve their security posture</p><div class="flex justify-center"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-16 w-16 text-blue-200"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg></div></div></div></div><div class="max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-16"><div class="grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-8"><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10z"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your information security needs</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Every organization is different. Our Needs Assessment will help identify your strengths and needs and will help you understand steps you can take to reduce your risk.</p><a class="inline-flex items-center justify-center w-full px-6 py-3 text-white font-medium rounded-md transition-colors duration-200 bg-nr-blue hover:bg-nr-dark-blue" href="/needs-assessment/">Assess Needs<!-- --> →</a></div></div><div class="bg-white rounded-lg shadow-lg hover:shadow-xl transition-shadow duration-300 overflow-hidden"><div class="p-6"><div class="flex items-center mb-4"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="h-8 w-8 text-nr-blue mr-3"><path d="m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3Z"></path><path d="M12 9v4"></path><path d="M12 17h.01"></path></svg><h2 class="text-xl font-semibold text-gray-900 line-clamp-2">Assess your risk of financial fraud</h2></div><p class="text-gray-600 mb-6 leading-relaxed">Financial crimes can really harm an organization. Assess your risk associated with
    Found 2025-12-30 by HttpPlugin
    Create report
  • Open service 20.118.48.4:443 · resources.netreaction.com

    2025-12-22 20:37

    
                                
    Found 2025-12-22 by HttpPlugin
    Create report
resources.netreaction.com
CN:
resources.netreaction.com
Not before:
2025-08-26 00:00
Not after:
2026-02-26 23:59
Domain summary
IP summary