Punishing clients for their transgressions.

thecomputerguy

Well-Known Member
Reaction score
1,399
Lets say you have a client that deserves to be financially punished for poor behavior like this for example below.

On a Sunday, they got an 800 number popup, called it and allowed a scammer to compromise their system. While they were being compromised they proceeded to spam call you, email you, and text you that they were on the phone with Microsoft because their WiFi Firewall is infected. You, feeling pitiful respond to them and tell them to turn their system off and hang up the phone because they are being scammed.

They explain that they need their computer operational NOW. You explain that you will need to get back to them on Monday.

Monday you get back to them and login to their computer to find the typically Google Search for something, they click on the first Ad, this sends them into pop-up hell 800 numbers flying everywhere. You discover that this is one of those typical VERY basic intrusions where all they do is install AnyDesk and send the client to the event viewer.

You search all the common areas for Teamviewer, AnyDesk, Screen Connect etc. You search all the common areas for Keyloggers and basically within 5 minutes find nothing aside from AnyDesk and then uninstall it.

You are PRETTY sure the system is safe but you explain to the customer there is no way to know for sure unless the system is wiped, which we're trying to avoid. This client is not in contract and contacts you twice a year for a random hour here or there.

You know you don't have to but you want to fill out the other 55 minutes of time while looking busy. I typically tell the client they may not see the mouse moving but I am still working.

Anyone know of anything that look H@x0R IT T3CH support command prompt loops aside from ping 8.8.8.8 /t

?
 
Anyone know of anything that look H@x0R IT T3CH support command prompt loops aside from ping 8.8.8.8 /t

I can neither confirm nor deny that running robocopy in "report only" mode to list the files to a log, but not copy them anywhere looks sufficiently like real work for the uninformed. Then delete the log at the end.

robocopy c:\ c:\temp /r:2 /w:2 /e /tee /xo /xx /l /log:copylog.txt

:D
 
  • Haha
Reactions: GTP
No way to trust a machine that's been configured by an untrusted source. N&P
No way to be certain that a machine that is improperly managed doesn't have unsanctioned code on it somewhere. N&P
Only way to prove the machine is safe requires full implementation of an XDR, with a human monitoring it heavily for 90 plus days, all of which is likely outside of the user's budget.

Punishment? The "punishment" is in the cost of the downtime as well as the repair. Bill accordingly.

Best idea I've got?

Sell them KnowB4, but probably can't do that too because... too darned small.

Customer is the problem, customer cannot easily be corrected, patching the brain is required.
 
Punishment? The "punishment" is in the cost of the downtime as well as the repair. Bill accordingly.


Sell them KnowB4.

Yup
And...Yup (well, we use the competitor product, BreachSecureNow/PII Protect..but I have used KnowB4 before BSN)

But also, even for 1x off non contract clients, first time I touch their network, I set their DNS forwarders to quad 9....removing the default "obtain auto from ISP" settings. A free yet effective layer of protection..cuts down quite a bit on "bad stuff". I don't want calls like this, esp on a weekend or after 5pm.
 
The same way I "punish" all clients. With a huge a$$ bill. If a client spam calls me, they're done. I'll quote them whatever it takes to get them to go somewhere else. I've been doing this far too long to accept pain in the a$$ clients. I'm in the phase of my life where I value the ease of my job more than the money. When I was in my 20's I'd slog through horrible jobs and horrible clients because I wanted the money but now I'd rather have a little less money for 90% less stress and BS.
 
Back
Top