Compare cert salaries and plan your next career move
gespenstern wrote: » It's easy to deal with. 1-4 is free, 5-6 are pricey depending on solution chosen. 5. Filter your e-mail for spam and malware. Pretty hard to tune it by yourself, but there are a lot of cloud services and dedicated solutions such as proofpoint, etc.
OctalDump wrote: » For smaller companies, the typical clients of MSPs, I doubt that once the numbers are done that it would make any sense to host email internally.
gespenstern wrote: » But it's just me, I haven't dealt with smaller businesses for a while now and don't remember all the numbers used in those calculations. Maybe it's different now, I don't know.
OctalDump wrote: » I think Google Apps runs about $50/user/year, Office 365 is similar. If you have, say 50 users, that's $2500/year. $2500 would buy about 3 days' of MSP services where I am.
OctalDump wrote: » If you use the "free" alternatives (linux + dovecot + spamassassin etc), the set up and support costs tend to be higher. The more bespoke it becomes, the more tied the client is to that person/company for support. It is often a false economy.
OctalDump wrote: » The problem with running mail in house, is that your SMTP will get hammered by hack scripts and bots. One weak link, and it's being used as a spam relay, and then it gets blacklisted. Even worse if you are trying to support mobile clients. Either use a selfsigned certificate and deploy on every device, or add ~$100 for a public CA signed certificate. And then more firewall work. And then your internet goes out, and users don't get emails. Or hardware failure. It is rarely as reliable and effort free as a cloud service.
OctalDump wrote: » Kerio, specifically, has licensing costs not much cheaper than cloud services, and because it emulates MS Exchange, you have to be careful with patches and updates. In some instances updating a client before there is a corresponding update to Kerio can break it. More support costs.
OctalDump wrote: » The issue of control comes up, but weighed against the practical security in hosting in house, it rarely makes real sense. I suspect many MSP's would rather sell you a service like Kerio, knowing that they'll get continuing business for licensing and updates, and much more for support. And it's easy to use smoke and mirrors to hide the real costs.
StevenP2013 wrote: » Then the end user had to remove the .vvv extension from each file, then go to properties, previous versions, and restore to a previous version.
gespenstern wrote: » A grueling exercise! They totally deserved it but there's a much simpler way -- just delete all .vvv files, than right click on a folder that contains them and choose to restore everything in this folder. Would have saved hours of manual labor.
gespenstern wrote: » It's easy to deal with. 1-4 is free, 5-6 are pricey depending on solution chosen. 1. First off, a usage policy that prescribes to store personal data in home directories on a file server and common data in public directories on a file server. The file server is of course backed up regularly plus shadow copies if it's windows-based. 2. Second, configure SRP (Software Restriction Policies, built-in since Windows XP) to prohibit executables/scripts from running from anywhere in %userprofile%. Easy to configure via Group Policies. There's a good article on this on bleepingcomputer. For people who buy you a beer on a regular basis you can add an exception and allow them to run executables from "downloads" folder. Also, your major PITA would be three things: 1) Google Chrome 2) Gotomeeting 3) Webex. Vendors of these programs think that they are cocky and violate Microsoft recommendations and best practices (which prescribe to install software into %programfiles%) and put their sh!t right into a %userprofile%. But you can add exceptions, if needed. This will prevent almost any malware from executing even if some dumb person launches an attachment from unsolicited e-mail. 3. UAC! UAC! UAC! User Account Control (since Windows Vista) is your best friend. Easy to configure from Group Policies. Set its bar on at least level 2 (from the bottom). It won't prevent cryptolocker from running and encrypting stuff, but it will prevent it from deleting shadow copies on a local computer, so all the documents could be easily restored. Always restore them on external drive to avoid "shadow copies disappeared during restoration" situation as Windows destroys them on the fly if it thinks that it runs out of space. 4. If someone complained and/or you suspect bad things maybe happening -- launch compmgmt.msc on a file server go to open files and watch for users who have suspiciously too many read+write files opened and files are being renamed to name.ext.crypto or name.ext.vvv or whatever renaming scheme current version of cryptolocker uses. Kick such a user out of network immediately. 5. Filter your e-mail for spam and malware. Pretty hard to tune it by yourself, but there are a lot of cloud services and dedicated solutions such as proofpoint, etc. Also, I can configure it and support it for you if your business pays my rate. 6. Use IDS/breach detection products. Modern products allow you to watch for "bulk rewrite" indicators that get triggered when some dumba$$ uses SMB to read/write too many files at once. Set up an alert so every interested party gets a text message/e-mail/whatever when this indicator gets triggered and kick offender out of the network immediately. 7. Alternative, cryptolocker seems to encrypt only local files and files on mapped drives. Do not map drives, use UNC paths instead and create shortcuts on user's desktops with UNC paths. That way Cryptolocker encrypts only user's stuff, but you don't care (because of policy, see paragraph 1), you just reimage the PC and you are done. 8. Last but not least -- do security patching of 3rd party software on a regular basis. Adobe crap and Java on workstations should be patched in like 3 days after patch is released, same goes for MS Office. Of course I assume that basic things like OS are patched regularly...
StevenP2013 wrote: » I dealt with this yesterday. An end user received an email that says it contains and order and invoice. They opened a zip file and then clicked on a file named invoice_scan_nmjgr.js. All of their docs, vids, and pics were encrypted and now ended in .vvv. I ran malware bytes, which deleted the virus, superantispyware removed a registry entry. I searched the hard drive for all instances of how_recover.*. It found 8,000 files, I deleted them all. Then the end user had to remove the .vvv extension from each file, then go to properties, previous versions, and restore to a previous version. All from opening a zip file and clicking on a file named invoice_scan_nmjgr.js. We do educated end users all the time on this sort of thing. We also quarantine suspicious looking email, but give them the option to release from quarantine.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.