(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

“It Redirected Where?” -- A Case Study in Security Precautions

“It Redirected Where?” -- A Case Study in Security Precautions

Imagine what it would be like to discover that your website was suddenly redirecting to content that was decidedly more... adult... than what should be representing your business. For a company in Phoenix, Arizona, this was the unfortunate reality after they had let their IT administrator go.

The administrator, Tavis Tso, created a web in which he attempted to snare a client in an extortion scam. After lying to the client, claiming that he didn’t have their credentials to login to their GoDaddy domain registrar account, Tso changed the credentials to the GoDaddy accounts and created a separate Microsoft account that gave him considerable power over his target. His first steps were to block employees from accessing their email accounts and to redirect the company’s home page to a blank webpage. Tso then demanded $10,000 from the company to fix the problem that he had caused.

The company did not comply with his demands.

Once it was clear that the company wasn’t going to cooperate with Tso, the cybercriminal upped the ante. Rather than just redirecting the company’s home page to a blank site, Tso redirected all of the website’s traffic to a pornographic website. This redirect took several days to resolve.

Tso was ultimately sentenced to four years of probation, in addition to $9,145 as restitution for a count of wire fraud. While it is nice that a cybercriminal has been brought to justice, the damage done will be hard to undo, as he had considerable access to his company’s systems.

Would your business be able to recover from an incident like this? A good first step is to ensure your recovery is to reconsider the permissions of the users on your network--and more importantly, the permissions of former users. There is no reason to grant access to your IT where it is not needed, and there is no reason to keep an IT resource on your system once they are no longer part of your organization.

NTConnections can help you to make these changes, as well as many others that will benefit your IT and your network security. Reach out to us at (703) 288-9767 to start a discussion.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 19 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Mobile Devices Efficiency IT Support Business VoIP Managed Service Provider Email Miscellaneous IT Services Server Workplace Tips Disaster Recovery Business Continuity Upgrade Innovation Network Data Windows Hardware Software Save Money Saving Money Business Management Communication Computer Network Security Mobile Device Management Android Smartphones Managed IT Services Browser Holiday Smartphone communications Microsoft Office User Tips Virtualization Outsourced IT WiFi Windows 10 Computers BYOD Data Backup Hacking Chrome Social Media Operating System Mobile Computing IT Solutions Alert Small Business Apple Cybercrime Proactive IT Application Remote Monitoring Avoiding Downtime Employer-Employee Relationship The Internet of Things Managed IT Services Office Budget Collaboration Quick Tips Big Data Information Technology Ransomware Passwords Social Engineering Automation Marketing Mobility Health Bring Your Own Device VPN Data Recovery Gadgets spam Recovery Telephone Systems Going Green Remote Computing Cloud Computing Bandwidth Compliance Vendor Management Wireless Technology User Error iPhone Two-factor Authentication Cybersecurity Save Time Firewall How To App Managed IT BDR IT Support Private Cloud Networking Risk Management Mouse Redundancy Windows 10 Antivirus Office 365 Internet of Things PowerPoint Analytics Router Website Excel Phone System Content Filtering Vulnerability Downtime Office Tips History Artificial Intelligence Tablet Value Gmail Lithium-ion battery Retail Memory Search Customer Relationship Management Google Drive Environment Data Storage Law Enforcement Solid State Drive Saving Time Best Available Word SaaS People Document Management Programming Business Intelligence Safety Network Congestion Online Currency Government Trending Workers Meetings Printer Business Owner HaaS Fax Server IT Management Humor Black Market OneNote Data Management Current Events Statistics Maintenance Work/Life Balance Unsupported Software Internet Exlporer Data storage Outlook Biometrics Flexibility Money Intranet Public Cloud Identity Theft Data Security Administration Hard Drives Phishing Facebook Credit Cards Entertainment Running Cable Skype Unified Threat Management Physical Security DDoS Robot IT Consultant Mobile Office Apps Laptop Settings LinkedIn Amazon Tip of the week Virus Tools Distributed Denial of Service Infrastructure Virtual Desktop Data Protection Debate Computer Accessories Touchpad IT service Human Resources Amazon Web Services Computer Fan Windows Server 2008 Relocation Applications Company Culture Virtual Reality Password Manager Training Windows 8.1 Update Comparison Uninterrupted Power Supply Files Cameras Password Domains Video Surveillance Online Shopping FENG Windows 7 Productivity Botnet Consultant Wi-Fi IaaS Bloatware Education Customer Service Specifications Data Warehousing Cleaning Colocation Printer Server Evernote Regulations Travel Entrepreneur Piracy Millennials Hosted Solution Worker Commute Tech Support Computing Infrastructure Hacker Wireless Charging Print Server Servers User Cost Management Licensing Workforce IT Plan Shadow IT End of Support Mobile Device Wireless Samsung Science Fiber-Optic Flash Computer Repair Software as a Service Twitter Streaming Media Net Neutrality Instant Messaging Internet exploMicrosoft Shortcut Telecommuting SharePoint Crowdfunding Windows 8 Cables Root Cause Analysis Sync Update Encryption Advertising Bluetooth Remote Work Software Tips Patch Management Sports Monitor eWaste Tablets Unified Communications Data loss Telephony Google Docs Notifications Touchscreen USB Scam Windows Media Player YouTube Charger Reputation Wearable Technology Theft Start Menu Voice over Internet Protocol Audit Social Hybrid Cloud Hiring/Firing HBO NarrowBand Computer Care WIndows 7 Customers Cortana Mobile Multi-Factor Security Screen Mirroring HIPAA Best Practice Social Networking Chromecast Fraud Spam Blocking Frequently Asked Questions Professional Services Managing Stress Analyitcs Google Apps Lifestyle Cast Keyboard Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology Electronic Medical Records Public Computer Legal Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Users Webinar Emergency Worker Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar PDF Benefits Loyalty Conferencing