You are absolutely right regarding the non existance of silver bullets and the requirement to configure your network and
servers properly. I wasn´t giving a full guide to mitigate the problem, but pointing out the reason why, in case it happens, FreeNAS
(or a similar system) is such an effective measurement.
However
My perspective is that the best way of mitigating this sort of risk is in a traditional small / medium business environment is through client hardening,
I am sorry, but I can´t disagree more with this phrase. Client hardening with a poorly designed operating system is bad enough. But client hardening when social engineering is the main way to execute the malicious software is utterly useless. It´s the user who will run the
software, so all of his/her files will be vulnerable.
Of course you can limit the programs that a user can run, etc, but there are plenty of political and technical reasons for it not to be applicable in many cases. Client hardening would be effective if workstation operating systems were redesigned so that the privileges of a user wouldn´t be an all or nothing matter. Imagine the multi-user approach turned into what I call "multi-application". Think of it as the extensive use of sandboxing, but as one of the design principles of the operating system rather than a clever add-on. But I digress.
Protection in such a case is not only a matter of preventing it from happening, but assuming that it will sooner or later and making sure that the damage will be really minimal.
Again, a backup system whose integrity can't be compromised by the user or his/her computer is the key. And a properly configured FreeNAS system (again, properly configured, together with a properly set up network) is an example of such a system.
For example, Mac OS X has a nice backup mechanism out of the box: Time Machine. However, storing the backups on an attached hard disk doesn't make them secure. Using a FreeNAS system with a good snapshoting policy, however, is an entirely different matter.