An employee's account was compromised, triggering a NetSafe® MDR alert for activity from an unknown endpoint. The attacker was actively using the VPN to access the client's internal server.
Client Success Story
An employee's account was compromised, triggering a NetSafe® MDR alert for activity from an unknown endpoint. The attacker was actively using the VPN to access the client's internal server.

Following a NetSafe MDR report, Net Friends IT Experts promptly initiated the standardized response playbook. Compromised accounts were immediately disabled, and targeted servers were isolated to contain the threat. Comprehensive system scans verified the complete removal of all malicious accounts and software. Once the threat was fully neutralized, services were safely restored by re-enabling access and removing affected servers from isolation.
The Net Friends on-call team immediately executed the standard incident response playbook, rapidly containing the breach by disabling the account and isolating the server before major damage could occur.
The Monday debrief confirmed the successful containment but highlighted the difficulty in tracing the root cause without an obvious phishing attempt, emphasizing the critical need for users to report suspicious links or emails.
To prevent future incidents, the team recommended a series of security enhancements: implementing MFA, disabling the public VPN login page, auditing service accounts, enforcing a lockout policy, and migrating the on-prem server to SharePoint. This quick response became the catalyst for a crucial security upgrade.
Book a meeting, or just send a message and someone from our team of friendly IT experts will get right back to you!