(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

“It Redirected Where?” -- A Case Study in Security Precautions

Imagine what it would be like to discover that your website was suddenly redirecting to content that was decidedly more... adult... than what should be representing your business. For a company in Phoenix, Arizona, this was the unfortunate reality after they had let their IT administrator go.

The administrator, Tavis Tso, created a web in which he attempted to snare a client in an extortion scam. After lying to the client, claiming that he didn’t have their credentials to login to their GoDaddy domain registrar account, Tso changed the credentials to the GoDaddy accounts and created a separate Microsoft account that gave him considerable power over his target. His first steps were to block employees from accessing their email accounts and to redirect the company’s home page to a blank webpage. Tso then demanded $10,000 from the company to fix the problem that he had caused.

The company did not comply with his demands.

Once it was clear that the company wasn’t going to cooperate with Tso, the cybercriminal upped the ante. Rather than just redirecting the company’s home page to a blank site, Tso redirected all of the website’s traffic to a pornographic website. This redirect took several days to resolve.

Tso was ultimately sentenced to four years of probation, in addition to $9,145 as restitution for a count of wire fraud. While it is nice that a cybercriminal has been brought to justice, the damage done will be hard to undo, as he had considerable access to his company’s systems.

Would your business be able to recover from an incident like this? A good first step is to ensure your recovery is to reconsider the permissions of the users on your network--and more importantly, the permissions of former users. There is no reason to grant access to your IT where it is not needed, and there is no reason to keep an IT resource on your system once they are no longer part of your organization.

NTConnections can help you to make these changes, as well as many others that will benefit your IT and your network security. Reach out to us at (703) 288-9767 to start a discussion.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 19 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Efficiency Mobile Devices IT Support Business VoIP Miscellaneous IT Services Managed Service Provider Server Business Continuity Workplace Tips Network Disaster Recovery Data Upgrade Innovation Software Hardware Email Computer Windows Save Money Saving Money Business Management Communication Mobile Device Management Virtualization User Tips Network Security Smartphones Browser Microsoft Office Android WiFi Windows 10 Holiday Managed IT Services Smartphone Social Media Operating System Mobile Computing communications BYOD Hacking Proactive IT Remote Monitoring Outsourced IT Avoiding Downtime Application IT Solutions Computers Small Business Apple Cybercrime Chrome Information Technology Big Data Passwords Marketing Automation The Internet of Things Office Alert Quick Tips Budget Collaboration Data Backup Ransomware Recovery Social Engineering spam Employer-Employee Relationship Going Green Remote Computing Managed IT Services Health Mobility VPN Bring Your Own Device Telephone Systems App Save Time Firewall Managed IT Vendor Management Wireless Technology iPhone User Error Gadgets Cybersecurity Office Tips PowerPoint Website Excel Phone System Content Filtering Downtime Gmail Lithium-ion battery History Tablet Private Cloud Retail Memory Search Mouse Bandwidth IT Support Compliance Redundancy Networking Office 365 Antivirus Analytics Router Data Recovery Hard Drives Outlook Intranet Facebook Money Flexibility Unsupported Software Artificial Intelligence Public Cloud Physical Security DDoS Administration Robot BDR Phishing How To Entertainment Vulnerability Running Cable Google Drive Data Security Environment Value Skype Apps IT Consultant Unified Threat Management SaaS Mobile Office Safety Customer Relationship Management Government Saving Time Cloud Computing Document Management Law Enforcement Best Available Risk Management Meetings Solid State Drive People Online Currency HaaS Fax Server Programming Black Market Data Storage Network Congestion Trending Data Management Printer Word Two-factor Authentication Internet of Things Windows 10 Business Owner Internet Exlporer Current Events Data storage Humor Biometrics Statistics Maintenance Work/Life Balance Twitter Notifications Servers YouTube USB Internet exploMicrosoft Crowdfunding Reputation Root Cause Analysis Wearable Technology IT Plan Social Flash Touchscreen NarrowBand Software as a Service Patch Management Advertising Customers Data loss Social Networking Best Practice Sync Chromecast Update Scam Windows Media Player Software Tips Analyitcs Telephony Laptop Google Docs Settings Hybrid Cloud Hiring/Firing Distributed Denial of Service Computer Care WIndows 7 Start Menu Virtual Desktop HIPAA Touchpad Spam Blocking Voice over Internet Protocol IT service Audit Human Resources Relocation Managing Stress HBO Virtual Reality Mobile Training Uninterrupted Power Supply LinkedIn Multi-Factor Security Domains Virus Screen Mirroring IaaS Frequently Asked Questions Bloatware Professional Services Customer Service Debate Company Culture Cleaning Computer Fan Lifestyle Windows 8.1 Update Computer Accessories Cast Applications Tip of the week Entrepreneur Tools Files Tech Support Video Surveillance FENG Data Protection Productivity Cameras Hacker Wi-Fi Consultant Windows Server 2008 Cost Management Workers Colocation Education Shadow IT Wireless Printer Server Business Intelligence Science Streaming Media Windows 7 Print Server Instant Messaging Botnet Shortcut Hosted Solution Worker Commute Computing Infrastructure Piracy OneNote SharePoint Data Warehousing Windows 8 Encryption User Regulations Net Neutrality Sports Travel Computer Repair Bluetooth End of Support Licensing Samsung Monitor eWaste IT Management Tablets IBM Webinar Emergency Worker Content Supercomputer IT solutions Rootkit Video Games Audiobook Knowledge Netflix Charger Scalability Politics Transportation How to webinar Benefits PDF Loyalty Conferencing Keyboard Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Password Television Troubleshooting Comparison Electronic Medical Records Techology Public Computer Specifications Employer Employee Relationship Legal Automobile Data Breach Emails Books Users CrashOverride Mobile Device