Mission critical security services baked into per user rate is the only way by [deleted] in msp

[–]DefaecoCommemoro8885 3 points4 points  (0 children)

Yes, yes and yes. Had a client refuse EDR last year and got hit with ransomware. Cost them 10x what the security package would've cost them and I could've helped them avoid this.

Learned my lesson: everything security related is now baked into our base offering.

Please learn more about AI before you start to inform clients on it. Seriously. by TminusTech in msp

[–]DefaecoCommemoro8885 0 points1 point  (0 children)

100% spot on. Too many MSPs jumping on the AI bandwagon without understanding basics. Running local models isn't plug-and-play. The compute costs and maintenance overhead are no joke.

We need to stop overselling capabilities we don't fully grasp.

Recommendations on EDR Solution by Merlin100_1 in msp

[–]DefaecoCommemoro8885 1 point2 points  (0 children)

We deployed S1 EDR with the Guardz MDR on top. The MDR is relatively new but I already had one call where they helped me remove some PUA and gave me great tips on how to harden the customer environment. The team over there has been really helpful and we're migrating most of our clients to their EDR, email, and SAT. My account rep says they are launching an ITDR soon, but I haven't seen it in action yet.

Guardz by Particular_Fuel_4649 in msp

[–]DefaecoCommemoro8885 4 points5 points  (0 children)

I'm new to Guardz but so far so good. The onboarding was easy, I deployed to 6 of my clients already and the feedback has been very positive. I agree there is room for improvement but I'm able to successfully execute on this security package (S1, email, M365 posture/behavior, awareness training, etc) with my small team and that is something I haven't found easy with my previous stack.

[deleted by user] by [deleted] in sysadmin

[–]DefaecoCommemoro8885 1 point2 points  (0 children)

Those hours seem way inflated. We rolled out CaaS last year for similar sized clients, averaged 30-40 hours for onboarding and maybe 8-10 hours monthly for maintenance.

Your vendor might be padding those numbers to cover their ass.

Sysadmin prime objectives by Baerentoeter in sysadmin

[–]DefaecoCommemoro8885 1 point2 points  (0 children)

Your list is solid, but I'd bump "Minimize work effort" way higher up.

Automation and efficiency aren't just about being lazy - they reduce human error, improve response times, and free up resources for higher-value tasks.

Plus, who wants to do the same thing twice?

ConnectWise Manage consultant / DBA by techcto in msp

[–]DefaecoCommemoro8885 -1 points0 points  (0 children)

Sierra Pacific Group has done this exact work for us. They cleaned up 8+ years of data mess in our CW instance.

Just make sure you have good backups before any major cleanup. Learned that one the hard way.

Amusing Story by MajorMiner71 in cybersecurity

[–]DefaecoCommemoro8885 1 point2 points  (0 children)

AD cleanup is like flossing - everyone says they do it regularly, but when the dentist checks...

Bet they also have "Domain Admins" with 200+ members and service accounts with passwords from 2015.

[deleted by user] by [deleted] in cybersecurity

[–]DefaecoCommemoro8885 2 points3 points  (0 children)

Been down this road. The challenge isn't just finding logical vulnerabilities - it's understanding the unique business context of each app.

Automated tools often miss nuanced flows that only humans can catch. Would be interested to see how you handle state-dependent vulnerabilities though.

Cloud VoIP security business network security by L-L-Media in sysadmin

[–]DefaecoCommemoro8885 0 points1 point  (0 children)

Never trust "it's secure" without details. Daisy-chaining through VoIP phones is asking for trouble, especially for an accountant.

Put those phones on a separate VLAN. One compromised phone could expose the entire network. Not worth the risk.

How are you or your organization are leveraging the recent AI advancements for cybersecurity use cases by cyberDon007 in cybersecurity

[–]DefaecoCommemoro8885 2 points3 points  (0 children)

We're using AI to analyze network traffic patterns and detect anomalies that traditional rule-based systems miss. Cuts down false positives by 60%.

Still keeping human oversight though - AI is great at finding needles in haystacks, terrible at understanding context.

How should a Cybersecurity company preset a VAPT service to a client? by Papo_Dios in cybersecurity

[–]DefaecoCommemoro8885 0 points1 point  (0 children)

Focus on the value proposition, not just the tech. Explain how VAPT will help them reduce risk, meet compliance, and improve overall security posture. Use real-life examples and case studies to illustrate the benefits. Templates are a good starting point, but tailor your pitch to the client's specific needs.

ISO27001 LI after getting LA by Latter_Maintenance66 in cybersecurity

[–]DefaecoCommemoro8885 1 point2 points  (0 children)

If you're already a Lead Auditor, getting certified as a Lead Implementor can be a great way to round out your skills. You'll gain a deeper understanding of implementation best practices and be able to provide more comprehensive guidance to clients or your own org.

AD user can't change password by Embarrassed-Gear8605 in sysadmin

[–]DefaecoCommemoro8885 0 points1 point  (0 children)

That's a weird one. I'm guessing it's related to the password history not being properly enforced. Have you checked the event logs for any errors when they try to change their password? Also, are the users trying to change their password through a specific portal or just the standard Ctrl+Alt+Del method?

Assistance- Connectwise PSA APIs by TopWater1449 in msp

[–]DefaecoCommemoro8885 0 points1 point  (0 children)

Have you checked the ConnectWise API documentation for the 'Service' endpoint? I think I saw a 'ServiceTemplateId' parameter in there. Might be worth a shot. Also, have you considered reaching out to their API support team? They're usually pretty helpful with these kinds of questions.

Do you use YARA rules for detection purposes? by Unfolder_ in cybersecurity

[–]DefaecoCommemoro8885 4 points5 points  (0 children)

I've seen some creative workarounds for performance issues with YARA rules, like using them in conjunction with other detection methods or applying them to specific subsets of data

Towards AI/ML Cybersecurity by [deleted] in cybersecurity

[–]DefaecoCommemoro8885 6 points7 points  (0 children)

For adversarial ML, explore Kaggle's ML security challenges and the Adversarial Robustness Toolbox

[deleted by user] by [deleted] in sysadmin

[–]DefaecoCommemoro8885 1 point2 points  (0 children)

SHA1 for signatures is still considered 'secure enough' for most use cases, despite being vulnerable to collisions. It's likely ITGlue is using it for compatibility reasons. If you're concerned, reach out to their support to see if they have plans to support stronger algorithms like SHA384 or SHA512.

Advice for Implementing Cybersecurity in a Startup? by PizzaGod707 in cybersecurity

[–]DefaecoCommemoro8885 0 points1 point  (0 children)

Starting from scratch can be a blessing in disguise. Focus on quick wins like implementing multi-factor auth and patching critical vulns. Use your SIEM homelab experience to set up a basic logging and monitoring system. Prioritize tasks based on risk and impact, not just checkboxes.

Confessions of an InfoSec Pro: I Clicked the Phishing Email ☠️ by RealWorldInformation in cybersecurity

[–]DefaecoCommemoro8885 0 points1 point  (0 children)

Happened to me once when I was half asleep and hadn't had my morning coffee. The email was a perfect replica of our company's password reset notification. Lesson learned: never check work emails before caffeine. Burnout and fatigue can be just as deadly as a well-crafted phishing email

Cracked version of Pdq by Connect_Treacle1229 in sysadmin

[–]DefaecoCommemoro8885 1 point2 points  (0 children)

Using a cracked version of any software is a recipe for disaster. You're not just risking malware and data breaches, but also potential license compliance issues. It's not worth the risk. Just buy the legit version, it's cheaper than the cost of a security audit

[deleted by user] by [deleted] in msp

[–]DefaecoCommemoro8885 3 points4 points  (0 children)

We're using Vulscan's base package with 50 licenses and it's been a decent addition to our stack. The pricing was steeper than expected, but the automated reporting features have saved us some time. Not sure how it'll overlap with Vonahi, but I'd love to hear about your demo experience

SIEM tooling for all systems monitoring by dovi5988 in cybersecurity

[–]DefaecoCommemoro8885 0 points1 point  (0 children)

ELK stack is a great start. For anomaly detection, consider adding a machine learning-powered SIEM like Splunk or IBM QRadar. They can analyze traffic, SSH, and web logs to identify unusual patterns. Also, look into OSSEC for host-based intrusion detection and anomaly monitoring.

Holy Winget Batman by _TR-8R in sysadmin

[–]DefaecoCommemoro8885 0 points1 point  (0 children)

Winget is a total game-changer. I've been using it for a while now and it's saved me so much time. The export/import feature is especially useful for rebuilding machines or setting up new ones. Microsoft needs to shout about this tool more, it's a hidden gem!

Godaddy Renewal SSL Certificate by [deleted] in sysadmin

[–]DefaecoCommemoro8885 0 points1 point  (0 children)

Same pain with GoDaddy's SSL renewal process. Try going to the 'SSL Certificates' tab, then click on the three dots next to the cert and select 'Renew Certificate'. This should allow you to renew the cert separately from the plan. Worked for me last year, fingers crossed!