Farmhouse Networking 2023 zero trust audits verify continuous authentication and micro-segmentation for Oregon SMB cybersecurity compliance.
This is the tenth and finale in a series about the concept of Zero Trust, which means in the IT sense that you trust nothing and always verify everything surrounding and connected to your network. Today’s discussion will be on Cyber Security Audit.
Cyber Security Audit
Cyber Security Audit is a process where both internal and external systems are tested for their ability and susceptibility to being successfully attacked by hackers. This usually involves an inventory of current systems, research into known vulnerabilities, and testing of those found to see what information can be accessed. Once this process is complete a report is generated to detail both what is found and how those vulnerabilities can be addressed to protect the business’ most valuable commodity – information (intellectual property and client data). Here are some questions to ask:
Do you have an inventory of all assets in your organization? Is it up to date?
Have you tested your internal network for vulnerabilities?
Have you had a penetration test performed on your external network?
Do you know what compliance standards apply?
How do you document policies and procedures? Who oversees that?
If your company is wanting to have a free cyber security audit, then contact us for assistance.
This is the seventh in a series about the concept of Zero Trust, which means in the IT sense that you trust nothing and always verify everything surrounding and connected to your network. Today’s discussion will be on software patching.
Software Patching
Software patching is a neccesity because no person who writes code is perfect and hackers are actively looking for these mistakes. The hackers find the mistakes and then develop ways of using these to exploit the software, computer, or whatever else they can gain access to. The only way to combat both the mistakes and the exploits is to discover them before the hackers do and patch the hole in the software. This patch can however lead to unforseen consequences to the software, so a plan for testing and deployment of patches is needed to avoid unexpected downtime to businesses.Here are some questions to ask:
Do you know all of the hardware and software on your network?
Do you check for hardware, operating system, and other software regularly?
How do you check for updates, patches, or upgrades to software?
How do you install these patches? Is it automated?
Are these patches tested before installation?
What happens if a patch causes problems?
Do you have a log of all installed updates?
Are any systems or software on your network no longer supported for updates?
If your company is going to use full disk encryption or has compliance requirements that you need consulting for, then contact us for assistance.
Farmhouse Networking’s zero trust security model prevents lateral movement
There has been a recent trend for companies to “negotiate” with the criminal terrorists behind wave of ransomware attacks across the world by paying the ransom. In a recent study some alarming statistics have been released:
Current Ransomware Stats
If Ransom is Paid: The global findings also show that only 8% of organizations manage to get back all of their data after paying a ransom, with 29% getting back no more than half of their data.
Cost of Ransom: The average ransom paid was $170,404. While $3.2 million was the highest payment out of those surveyed, the most common payment was $10,000. Ten organizations paid ransoms of $1 million or more.
Who is Paying the Ransom: The number of organizations that paid the ransom increased from 26% in 2020 to 32% in 2021.
The Brighter Side: While the number of organizations that experienced a ransomware attack fell from 51% of respondents surveyed in 2020 to 37% in 2021, and fewer organizations suffered data encryption as the result of a significant attack (54% in 2021 compared to 73% in 2020).
What is Being Done
There are now organizations trying to create a common framework to address this threat. The Institute for Security and Technology has created a Ransomware Task Force. This task force has been working to develop this framework and has published some guidance. Even though this is just the foundation work, it is good to see that efforts are being made.
If your company is worried about the threat of ransomware, then contact us for assistance setting up a multiple layer approach to security.
Reliable retail routers powering WFH for B2B professionals
This blog post is more about the use of retail routers at the office than at home, just to make that clear from the beginning. We would also recommend non-retail routers at home, but that is not feasible for everyone.
What is a retail router?
This is a phrase I am coining to describe any router that is generally available from your local retailers like Staples, Walmart, etc or delivered as part of the internet service from your local provider. They include brand names like ASUS, D-Link, Linksys, and Netgear. They range in price from $30 for the extreme low end to $450 for a gaming router. These routers are built for home and small office networks that have very few users or devices connected at any given time. They may include some features that sound “business-like” such as Virtual Private Network (VPN), Stateful Packet Inspection (SPI), VLAN, and Quality of Service (QoS) – remember though that these are also only able to support a minimum number of users and devices connected at any given time. If you try to use a retail router to run your business network then you will find that performance will be severely degraded and these features will not work as advertised.
There is also the issue of security. These routers are rarely if ever updated even when new vulnerabilities are found. This makes them ineligible for PCI or HIPAA compliance situations.
Is there a non-retail router?
So what to do about this situation? Time to call your trusted IT services provider who will be able to get you a non-retail router, but that begs the question – what is a non-retail router?
These routers are built by network professionals who design the hardware to perform under the pressures of the office environment and to handle the work from home remote workload. These routers include brands like Cisco, Juniper, Ubiquiti, and Araknis. They range in price from $150 for an office of up to 5 people to $10,000 for a high traffic company with hundreds of users. These routers handle VPN, SPI, VLAN, QoS, and many other services all at once with ease. Security is baked into these routers with the best ones having the ability to be managed from the cloud. They provide consistent access to all connected users and devices at all times. Your trusted IT services provider will work with you to “right size” the router to your business needs.
If your company is going to have full time work from home employees and is concerned about their ability to perform, then contact us for assistance.
On June 1st, the Department of Justice (DoJ) release further guidance about compliance programs which could effect the way PCI and HIPAA compliance breaches are handled in court.
They state that compliance programs aren’t merely one-and-done snapshots in time, but are instead dynamic programs that get updated regularly to fit changing circumstances.
An article about it states, “the latest guidance issued by DOJ is premised almost entirely on the adequacy of the organization’s risk assessment efforts, an approach well-known and particularly applicable to cybersecurity professionals. Prosecutors are urged to evaluate the quality and effectiveness of an organization’s risk assessment program by examining:
The risk management process, particularly the methodology used to identify, analyze and address the risks an organization faces
Risk-tailored resource allocation, namely whether the organization devotes enough resources to managing risks
Updates and revisions, specifically whether the risk assessment is subject to periodic dynamic reviews
Lessons learned, determining whether the company has a process for tracking and coordinating changes in its risk management program based on its experience
The DOJ also stressed the importance of risk-based training and communications about misconduct as essential parts of how it determines whether the organization’s compliance programs are up to snuff. Finally, the guidance highlights the importance of management support of the organization’s compliance initiatives and the value of extending compliance due diligence to third-party providers.”
If your company is unsure about their compliance program or risk assessment process, then contact us for assistance.
Many industries we serve are under some sort of compliance requirements – HIPAA, PCI, GDPR, etc. and several of these require some sort of vulnerability scans or penetration testing:
HIPAA Section 164.308(a)(1)(ii)(A) states:
RISK ANALYSIS (Required). Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the [organization].
PCI DSS Requirement 11.3:
The scope of a penetration test, as defined in PCI DSS Requirement 11.3, must include the entire CDE perimeter and any critical systems that may impact the security of the CDE as well as the environment in scope for PCI DSS. This includes both the external perimeter (public-facing attack surfaces) and the internal perimeter of the CDE (LAN-LAN attack surfaces).
GDPR Article 32 states:
A process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing
Farmhouse Networking has begun offering both internal and external network vulnerability scans and penetration testing for clients who fall under compliance requirements. We also provide remediation planning and implementation for any issues found during the scans.
If your company is has compliance requirements for internal or external vulnerability scans or penetration testing, then contact us for assistance.
24/7 cyber defense protects small business critical data
A recent briefing from the FBI’s Internet Internet Crime Complaint Center (IC3) detailed current best practices and industry standards for cyber defense. Here is a summation:
Cyber Defense Best Practices
Backups – Regularly back up data and verify its integrity. Backups are critical in ransomware; if you are infected, backups may be the only way to recover your critical data.
Training – Employees should be made aware of the threat of ransomware, how it is delivered, and trained on information security principles and techniques.
Patching – All endpoints should be patched as vulnerabilities are discovered. This can be made easier through a centralized patch management system.
Antivirus – Ensure anti-virus and anti-malware solutions are set to automatically update and that regular scans are conducted. Centrally managed is even better.
File Permissions – If a user only needs to read specific files, they should not have write-access to those files, directories, or shares. Configure access controls with least privilege in mind.
Macros – Disable macro scripts from Office files transmitted via email.
Program Execution Restrictions – Implement software restriction policies or other controls to prevent the execution of programs in common ransomware locations, such as temporary folders supporting popular internet browsers, and compression/decompression programs.
Remote Desktop Protocol – Employ best practices for use of RDP, including use of VPN, auditing your network for systems using RDP, closing unused RDP ports, applying two-factor authentication wherever possible, and logging RDP login attempts.
Software Whitelisting – Implement application whitelisting. Only allow systems to execute programs known and permitted by security policy. This one takes careful planning.
Virtualization – Use virtualized environments to execute operating system environments or specific programs. No physical access to servers makes hacking harder.
Network Segmentation – Implement physical and logical separation of networks and data for different organizational units. Keep guest traffic out of your business network.
No Saved Passwords – Require users to type information or enter a password when their system communicates with a website. Better yet use a password management tool.
If your company is going to use full disk encryption or has compliance requirements that you need consulting for, then contact us for assistance.
Modernization = immediate 30% IT cost reduction with compliance
Legacy infrastructure can limit scalability, increase downtime, and require expensive patchwork fixes. Modern solutions — whether in the cloud or hybrid configurations — give small businesses flexibility, automation, and predictable operating costs.
According to Gartner, companies that modernize their IT environments reduce infrastructure costs by up to 30% and improve operational efficiency by 25% or more. For small business owners, these savings can directly impact profitability and competitiveness.
Action Steps to Modernize and Optimize IT
To start seeing results, take a structured approach to IT modernization:
Assess Your Current Infrastructure Conduct a full audit of your hardware, software, and network assets. Identify outdated servers, unsupported software, and bottlenecks that affect performance or security.
Move to Scalable Cloud Solutions Transition from on-premises systems to cloud-based environments like Microsoft Azure or Google Workspace. Cloud solutions reduce capital expenditures, improve accessibility, and support remote teams.
Virtualize Where Possible Replace physical servers with virtual machines. Virtualization consolidates workloads, reduces energy usage, and simplifies disaster recovery planning.
Implement Automation and AI Tools Automate repetitive IT maintenance tasks such as updates, monitoring, and backups. Modern IT management software decreases manual intervention and minimizes human error.
Enhance Cybersecurity Frameworks As you modernize, integrate advanced security tools — firewalls, endpoint detection, and multi-factor authentication — to prevent modern cyber threats.
Adopt Predictable Cost Models Consider a managed IT service provider (MSP) that delivers infrastructure and support under a fixed monthly fee. This approach eliminates unpredictable repair costs and frees capital for innovation.
Common Questions from Business Owners
Q: How do I know if my infrastructure is outdated? A: Signs include frequent downtime, slow systems, incompatible applications, or rising maintenance costs. If your servers are older than five years or your support software is no longer updated, it’s time for a change.
Q: What’s the ROI of IT modernization? A: Beyond cost savings, modernization improves workforce productivity, customer satisfaction, and business agility. Many SMBs see full ROI within 12–24 months through improved uptime and reduced service calls.
Q: Is the cloud secure for small businesses? A: Yes, if configured properly. Major cloud providers maintain rigorous security standards and compliance certifications. Working with an IT partner ensures proper access controls and data backup procedures.
Q: How disruptive is the modernization process? A: With professional planning, disruption can be minimized. Migration often occurs after-hours or in stages to ensure operations continue smoothly.
How Farmhouse Networking Can Help
At Farmhouse Networking, we specialize in helping small and mid-sized businesses modernize their IT infrastructure for measurable cost savings. Our services include:
Comprehensive infrastructure assessments to identify inefficiencies.
Cloud migration and virtualization support tailored to your industry needs.
Cybersecurity modernization to protect against evolving threats.
Managed IT services with predictable monthly pricing and rapid support response times.
We handle the transformation process end to end — from planning and deployment to monitoring and optimization — so you can focus on running your business rather than managing technology.
Email us at support@farmhousenetworking.com to learn how Farmhouse Networking can help you modernize your IT infrastructure and optimize your company’s technology spend.
Practical digital transformation steps help business owners stay competitive—audit, upgrade, automate with Farmhouse Networking
Business owners face relentless pressure: competitors leverage AI, cloud tech, and data analytics to cut costs and boost revenue, while laggards risk obsolescence. Digital transformation isn’t optional—it’s the key to operational efficiency, customer loyalty, and market edge, enabling 23% higher profitability for adopters per McKinsey benchmarks.
Why Digital Transformation Matters Now
Digital transformation integrates technologies like cloud computing, automation, and cybersecurity into core operations, reshaping how businesses deliver value. For owners in accounting, healthcare, or nonprofits, it streamlines compliance-heavy processes, personalizes client services, and scales without ballooning headcount. In 2026, with President Trump’s pro-innovation policies accelerating tech adoption, firms ignoring this lose 30-50% ground to agile rivals.
Practical Action Steps
Business owners and IT teams should follow this phased roadmap, drawn from proven frameworks for small-to-mid enterprises.
Conduct a Digital Audit: Map current tech stack, processes, and skills gaps. Use free tools like Google’s Digital Maturity Model to score readiness across operations, customer touchpoints, and security—takes 1-2 weeks.
Set SMART Goals: Define measurable targets, e.g., “Reduce invoice processing from 5 days to 24 hours via automation” or “Increase client retention 15% with CRM personalization.” Align with revenue growth or cost savings.
Upgrade Infrastructure: Migrate to scalable cloud platforms (AWS, Azure) for flexibility; integrate AI tools for predictive analytics. Budget 10-20% of IT spend initially, prioritizing cybersecurity to avert breaches costing $4.5M on average.
Digitize Processes: Automate workflows—inventory for accounting firms, patient scheduling for healthcare, donor tracking for charities—using no-code platforms like Zapier. Train staff via 2-4 hour sessions.
Measure and Iterate: Track KPIs quarterly (e.g., ROI, uptime) with dashboards. Pilot quick wins first, scaling successes over 12-18 months.
Step
Owner/IT Role
Timeline
Expected ROI
Audit
Owner leads, IT executes
1-2 weeks
Baseline for 20% efficiency gains
Goals
Joint workshop
1 week
Guides 15-30% revenue uplift
Upgrade
IT procures, tests
1-3 months
Scalability reduces costs 25%
Digitize
IT implements, Owner approves
3-6 months
Automation saves 40% time
Iterate
Ongoing reviews
Quarterly
Sustains competitive edge
FAQs: Client Inquiries Answered
Q: What’s the ROI timeline for digital transformation? A: Quick wins yield 6-12 month returns; full programs deliver 20-50% efficiency gains in 18-24 months, per industry data.
Q: How do we avoid disruption during rollout? A: Phase implementations, starting with non-critical processes. Use hybrid cloud for seamless transitions—95% of phased projects succeed vs. 30% big-bang approaches.
Q: Is it affordable for small firms in accounting/healthcare/charities? A: Yes—cloud tools start at $50/user/month. Focus on high-impact areas like CRM ($10K initial investment yields $50K savings).
Q: How to upskill staff without big budgets? A: Leverage free resources (Microsoft Learn, AWS Training) and vendor demos. Partner with MSPs for hands-on support.
How Farmhouse Networking Drives Your Success
Farmhouse Networking specializes in B2B digital transformation for accounting, healthcare, and charity sectors, delivering tailored IT strategies that convert visitors to clients. We conduct audits, deploy secure cloud migrations, automate workflows, and optimize SEO for “digital transformation services [your industry]” to drive organic traffic. Our clients see 40% faster deployments and 25% cost reductions, with white-glove support ensuring zero downtime. From branding your site as a tech-forward leader to lead-gen funnels, we handle IT so you focus on growth.
And God will generously provide all you need. Then you will always have everything you need and plenty left over to share with others. As the Scriptures say,
“They share freely and give generously to the poor. Their good deeds will be remembered forever.”
For God is the one who provides seed for the farmer and then bread to eat. In the same way, he will provide and increase your resources and then produce a great harvest of generosity in you. - 2 Corinthians 9:8-10
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.