My worst nightmare as an IT Admin just came true tonight

The critical stuff is on a closed network, and since you have to have access to the building and have an account to get on the network, infections are largely going to be through insider threats.

Or vulnerable or unknown security holes that gets you when you least expect it.

That sucks when you have to work the weekend. Will you get paid overtime for it?

Salaried pay says what?
 
Or vulnerable or unknown security holes that gets you when you least expect it.
Someone would have to be at Solid Snake tier to get through multiple 2FA badged doors, and get on a network that requires a separate 2FA to be able to log in.

We practice RBAC pretty hard, so your basic user account is heavily restricted. We also have DLP running, so it immediately blocks external media devices, and flags the user/computer.

So if any form of malware got on there, it’s almost certain that it’s an admin, and intentional.
 
That's the reason why I would never work salary. You get paid the same amount of pay regardless of how many hours you work that week. A former boss of mine checked the laws (state and federal laws) and there isn't any lay saying how many hours they can make you work in a week if you're salary. So the company can make you work as many as they want.

At my hubby's job, he gets overtime after 40 hours but he also gets overtime if we works more than 8 hours in a day. If he stays longer than his 8 hours shift, it's automatically time and a half even if he hasn't worked his 40 hours yet for the week. But he also goes from time and a half to double time if he makes it to 56 hours in the week. It doesn't happen very often that he makes it past 56 hours but it does happen once in a while.
 
That's the reason why I would never work salary. You get paid the same amount of pay regardless of how many hours you work that week. A former boss of mine checked the laws (state and federal laws) and there isn't any lay saying how many hours they can make you work in a week if you're salary. So the company can make you work as many as they want.

At my hubby's job, he gets overtime after 40 hours but he also gets overtime if we works more than 8 hours in a day. If he stays longer than his 8 hours shift, it's automatically time and a half even if he hasn't worked his 40 hours yet for the week. But he also goes from time and a half to double time if he makes it to 56 hours in the week. It doesn't happen very often that he makes it past 56 hours but it does happen once in a while.
It sucks when it does happen, and seems more “fair” at face value, being salaried can work in your favor by being paid the same despite working less hours.
 
Someone would have to be at Solid Snake tier to get through multiple 2FA badged doors, and get on a network that requires a separate 2FA to be able to log in.

We practice RBAC pretty hard, so your basic user account is heavily restricted. We also have DLP running, so it immediately blocks external media devices, and flags the user/computer.

So if any form of malware got on there, it’s almost certain that it’s an admin, and intentional.

RBAC and DLP?

That's the reason why I would never work salary. You get paid the same amount of pay regardless of how many hours you work that week. A former boss of mine checked the laws (state and federal laws) and there isn't any lay saying how many hours they can make you work in a week if you're salary. So the company can make you work as many as they want.

At my hubby's job, he gets overtime after 40 hours but he also gets overtime if we works more than 8 hours in a day. If he stays longer than his 8 hours shift, it's automatically time and a half even if he hasn't worked his 40 hours yet for the week. But he also goes from time and a half to double time if he makes it to 56 hours in the week. It doesn't happen very often that he makes it past 56 hours but it does happen once in a while.

It sucks when it sucks, but when I can sneak out early on Friday and still get the same pay it is great.
 
RBAC and DLP?

RBAC is basically a more in-depth concept of least privileges. So for the admins you can break it down by tier 1, 2, or 3, and only give specific rights for each role, that way nobody has god rights on your systems. So for example, tier 3 can have server admin rights to things like your domain controller, but be missing rights on workstations like tier 1 admins would have.

There’s various ways of controlling DLP based on the types of information/data you work with and you can control it at various states. The one we have can quarantine users when they plug in a flash drive or external drive by locking out their PC and flagging it in the system, so we know who and where it happened.
 
Back
Top