(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

“It Redirected Where?” -- A Case Study in Security Precautions

“It Redirected Where?” -- A Case Study in Security Precautions

Imagine what it would be like to discover that your website was suddenly redirecting to content that was decidedly more... adult... than what should be representing your business. For a company in Phoenix, Arizona, this was the unfortunate reality after they had let their IT administrator go.

The administrator, Tavis Tso, created a web in which he attempted to snare a client in an extortion scam. After lying to the client, claiming that he didn’t have their credentials to login to their GoDaddy domain registrar account, Tso changed the credentials to the GoDaddy accounts and created a separate Microsoft account that gave him considerable power over his target. His first steps were to block employees from accessing their email accounts and to redirect the company’s home page to a blank webpage. Tso then demanded $10,000 from the company to fix the problem that he had caused.

The company did not comply with his demands.

Once it was clear that the company wasn’t going to cooperate with Tso, the cybercriminal upped the ante. Rather than just redirecting the company’s home page to a blank site, Tso redirected all of the website’s traffic to a pornographic website. This redirect took several days to resolve.

Tso was ultimately sentenced to four years of probation, in addition to $9,145 as restitution for a count of wire fraud. While it is nice that a cybercriminal has been brought to justice, the damage done will be hard to undo, as he had considerable access to his company’s systems.

Would your business be able to recover from an incident like this? A good first step is to ensure your recovery is to reconsider the permissions of the users on your network--and more importantly, the permissions of former users. There is no reason to grant access to your IT where it is not needed, and there is no reason to keep an IT resource on your system once they are no longer part of your organization.

NTConnections can help you to make these changes, as well as many others that will benefit your IT and your network security. Reach out to us at (703) 288-9767 to start a discussion.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 24 April 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Hackers Business Computing Microsoft Productivity Backup Malware Hosted Solutions Internet Mobile Devices Google Efficiency Business IT Support VoIP IT Services Email Network Security Miscellaneous Managed Service Provider Server Innovation Business Continuity Network Data Workplace Tips Disaster Recovery Software Windows Upgrade Hardware Business Management Smartphone Browser Save Money Saving Money Android Mobile Device Management Communication Virtualization Computer Smartphones User Tips Managed IT Services Data Backup Holiday communications Microsoft Office WiFi Computers Outsourced IT Cybercrime BYOD Windows 10 Remote Monitoring Operating System Mobile Computing Hacking Chrome Big Data Small Business Ransomware Cloud Computing Social Media Avoiding Downtime Managed IT Services Data Recovery IT Solutions VPN Alert Apple Application Proactive IT Social Engineering Passwords Employer-Employee Relationship Marketing Office Budget Collaboration The Internet of Things Quick Tips Internet of Things Information Technology Automation Telephone Systems BDR Going Green Remote Computing Cybersecurity Health Mobility Bring Your Own Device Gadgets spam Recovery IT Support App Bandwidth Gmail Compliance Private Cloud Wireless Technology Vulnerability User Error Data Security Redundancy Vendor Management Two-factor Authentication iPhone How To Data Protection Save Time Managed IT Firewall Business Intelligence Value Tech Term Memory Retail Search Lithium-ion battery Artificial Intelligence Windows 10 Networking Apps Mouse Identity Theft Document Management Risk Management Office 365 Data Management PowerPoint Antivirus Website Excel Phishing Phone System Money Content Filtering Downtime History Router Analytics Tablet Office Tips Hard Drives Law Enforcement Unified Threat Management Solid State Drive Skype Intranet Facebook Mobile Office IT Management Productivity Customer Relationship Management Workers DDoS IT Plan Physical Security Robot Best Available Business Owner People CES Google Drive Programming Environment Unsupported Software OneNote Network Congestion Trending Human Resources Update IT Consultant SaaS Training Mobile Device Work/Life Balance Safety Saving Time Government Humor Cleaning Meetings Statistics Online Currency HaaS Credit Cards Data loss Fax Server Black Market Printer Public Cloud Outlook Current Events Flexibility Internet Exlporer HIPAA Data Storage Data storage Maintenance Encryption Biometrics Word Administration eWaste Comparison Entertainment Running Cable Wearable Technology Specifications Data Warehousing Reputation Regulations Computer Fan Social Evernote Applications Recycling Travel Touchscreen Managing Stress NarrowBand IoT Files Millennials Customers Servers FENG Virus Best Practice Social Networking Password LinkedIn Wireless Charging Wi-Fi Criminal Chromecast Debate Smart Tech Analyitcs Colocation Workforce Flash Computer Accessories Electronic Medical Records Fiber-Optic Software as a Service Laptop Settings Distributed Denial of Service Hosted Solution Insurance Computing Infrastructure Telecommuting Sync Cameras Virtual Desktop Legal Video Surveillance Cables IT service Content Management Consultant Touchpad Relocation Education Practices Virtual Reality End of Support Remote Work Software Tips Telephony Printer Server Uninterrupted Power Supply Unified Communications Domains Blockchain Google Docs Worker Commute IaaS Piracy Hosted Computing Bloatware Internet exploMicrosoft Start Menu Company Culture Root Cause Analysis Customer Service Theft Staff Voice over Internet Protocol Audit User Windows 8.1 Update Patch Management Licensing Inventory Entrepreneur Advertising HBO Cortana Mobile Tech Support Samsung Twitter Digital Signature Hacker Multi-Factor Security Screen Mirroring Frequently Asked Questions Scam Access Control Cost Management Fraud Crowdfunding Google Apps Professional Services Shadow IT Charger Wireless Strategy Science Lifestyle Cast Tip of the week Print Server Streaming Media Authentication Instant Messaging Hybrid Cloud Amazon Infrastructure Tools Computer Care Shortcut SharePoint Analysis Windows 8 Windows Server 2008 Spam Blocking Windows Media Player PDF Amazon Web Services Password Manager Bluetooth Net Neutrality Computer Repair Sports Keyboard Accountants Tablets Monitor Windows 7 Notifications Hiring/Firing Online Shopping Business Mangement USB Botnet WIndows 7 YouTube Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Automobile Data Breach Emails Books CrashOverride IBM Webinar Emergency Worker Content Supercomputer IT solutions Rootkit Video Games Audiobook Knowledge Netflix Scalability Politics Transportation How to webinar Benefits Nanotechnology Loyalty Users Conferencing Windows 10s Smart Technology Battery