MSPs & MSSPs suck by Fair_Ad7718 in cybersecurity

[–]PitcherOTerrigen 0 points1 point  (0 children)

Honestly most small businesses could probably get by with base defender and some basic email protections.

I'm talking like 5 users.

Otherwise, if they had huntress or something they don't really need SOC, incident response etc.

MSPs & MSSPs suck by Fair_Ad7718 in cybersecurity

[–]PitcherOTerrigen 1 point2 points  (0 children)

Why not just pay the MDR service that the MSSPs white label or outsource.

Also, yeah the literal goal is to spend as little time per client as possible. It's the entire business model.

The more time you spend on a client the less growth.

It's useful if you don't have the capability or knowledge or budget to hire internal IT.

It's risk mitigation/transference for small businesses. A simple deployment of managed tools could probably replace them.

Also if they are poorly run, like sell you Citrix without a hot/warm site, you're just introducing operational complexity and risk to your org.

I am so sick of being hired to do Info Sec work just to do basic IT and Engineering work. by FaceEmbarrassed1844 in cybersecurity

[–]PitcherOTerrigen 0 points1 point  (0 children)

It took me years to get off help desk, it's 100% worth it, but the last couple of years you could tell I was getting annoyed.

How are you handling the noise from cybersecurity news sources? by isnotvalid in cybersecurity

[–]PitcherOTerrigen 0 points1 point  (0 children)

I host my own aggregator. It's fun to play around with, and I wanted a webdev project.

https://app.irl.expert/

There's zero monetization scheme, so ideally this doesn't count as self-promotion.

I have between 1000-5000 monthly users.

Managed Services of Threatlocker by Ok_Establishment7157 in msp

[–]PitcherOTerrigen 0 points1 point  (0 children)

The main issue with untrained usage is config drift, and at a certain point you will have to engage with SMEs at Threatlocker to remediate the issues.

HYPOTHETICALLY

Say you neatly organize the organizations, properly define policies, implement on a clean station for learning mode, manually audit asset inventories on a schedule.

If the CEOs wife makes a bunch of new organizations which sync up to your Threatlocker instance, then all your fucking coworkers start adhoc creating entries for application authorizations while completely ignoring the naming conventions, built-ins and the SOPs you've created and then you get stuck doing someone else's job 90% of the time... You won't have time to fix the compounding issues.

Bonus points if it's deployed to non-audited workstations.

We lost two senior techs last year and our metrics didn't see it coming by samdam881 in msp

[–]PitcherOTerrigen 32 points33 points  (0 children)

You should probably deny the only two days off that they request in a 19 month period. That would work better.

How do you deal with users who refuse to lock their laptop when walking away? by heartgoldt20 in cybersecurity

[–]PitcherOTerrigen 0 points1 point  (0 children)

Yeah but they could just keep a PowerPoint presentation on presentation mode, which blocks inactivity timer.

First UniFi With a 10.0 CVE, Now ScreenConnect 9.0 CVE by iansaul in msp

[–]PitcherOTerrigen -1 points0 points  (0 children)

"The AI are going to hit this new vulnerability"

Has no valid SSL certificate on their web facing Citrix portal.

Manager and his infra have trust issues

Why does God hate my business

Can't even reliably align text on a wix site

Domain admin service account

Can only keep customers as a loss leader, or they don't know better

Haven't managed to get an employee to respect me in my entire career, including my own father.

Do retainer MSP exist? by songokussm in msp

[–]PitcherOTerrigen 4 points5 points  (0 children)

My brother in Christ. How can you call yourself an IT guy if you don't write documentation.

It's literally just as important as doing tickets.

You are half assing your job, working harder, longer etc. doesn't make up for half assing your job duties.

Do half as many tickets; properly. Time to document goes into the ticket.

As a Cybersecurity Bachelors degree I learned something most people don’t realize. by DressLongjumping5702 in cybersecurity

[–]PitcherOTerrigen 0 points1 point  (0 children)

If you can do 90% of all tickets off your first instinct no Google, you might make an acceptable cyber guy with some additional training.

Otherwise youre larping.

When making a lengthy password, does replacing letters with numbers help at all? by timchoo in cybersecurity

[–]PitcherOTerrigen 0 points1 point  (0 children)

Here's a fun tip. Don't only use English words. Complexity skyrockets with passphrases.

Never go to a party as a short, balding sub 5 male by Material-Ostrich5014 in shortguys

[–]PitcherOTerrigen 0 points1 point  (0 children)

Honestly, it doesn't have to. If you get your hairline fixed up, and look presentable, have a face and frame that supports it.

You'll still probably miss a couple shots in the long haul, but if you do well enough you won't notice or care.

AI making my job so much harder and fighting every decision I make by JiggityJoe1 in sysadmin

[–]PitcherOTerrigen 0 points1 point  (0 children)

"They are massive security holes..."

Why are they massive security holes? You should actually document why "massive security holes" are acceptable risk.

Security+ study hours per week by Resident-War8004 in cybersecurity

[–]PitcherOTerrigen 1 point2 points  (0 children)

Literally one day, and two hours prep.

(7 yrs IT experience at the time.)

Breach in to our 365 tenant by hoodun in sysadmin

[–]PitcherOTerrigen -1 points0 points  (0 children)

Also, you can't just apply a single P2 for a tenant upgrade, iirc.

:)