ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

“It Redirected Where?” -- A Case Study in Security Precautions

“It Redirected Where?” -- A Case Study in Security Precautions

Imagine what it would be like to discover that your website was suddenly redirecting to content that was decidedly more... adult... than what should be representing your business. For a company in Phoenix, Arizona, this was the unfortunate reality after they had let their IT administrator go.

The administrator, Tavis Tso, created a web in which he attempted to snare a client in an extortion scam. After lying to the client, claiming that he didn’t have their credentials to login to their GoDaddy domain registrar account, Tso changed the credentials to the GoDaddy accounts and created a separate Microsoft account that gave him considerable power over his target. His first steps were to block employees from accessing their email accounts and to redirect the company’s home page to a blank webpage. Tso then demanded $10,000 from the company to fix the problem that he had caused.

The company did not comply with his demands.

Once it was clear that the company wasn’t going to cooperate with Tso, the cybercriminal upped the ante. Rather than just redirecting the company’s home page to a blank site, Tso redirected all of the website’s traffic to a pornographic website. This redirect took several days to resolve.

Tso was ultimately sentenced to four years of probation, in addition to $9,145 as restitution for a count of wire fraud. While it is nice that a cybercriminal has been brought to justice, the damage done will be hard to undo, as he had considerable access to his company’s systems.

Would your business be able to recover from an incident like this? A good first step is to ensure your recovery is to reconsider the permissions of the users on your network--and more importantly, the permissions of former users. There is no reason to grant access to your IT where it is not needed, and there is no reason to keep an IT resource on your system once they are no longer part of your organization.

i-medIT can help you to make these changes, as well as many others that will benefit your IT and your network security. Reach out to us at 630-549-6199 to start a discussion.

 

Comments

No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Google Privacy Business Computing Hackers Backup Microsoft Cloud Innovation Small Business Business Cybercrime Smartphones Email Software Hardware Android Network Security Ransomware Efficiency VoIP Data Backup Windows Malware Mobile Devices Data How To Computers Productivity Business Management User Tips Internet Business Continuity Cybersecurity Cloud Computing Social Engineering Managed IT Services Browser Chrome Bring Your Own Device Data Breach Spam Two-factor Authentication Mobile Device Management Gadgets Upgrade Operating System Social Media Telephone Systems Smartphone App Internet of Things Data Recovery Computer Communication Money Law Enforcement Windows 10 Outsourced IT Server Alert Automation Collaboration Managed IT Services Disaster Recovery Safety Phishing Artificial Intelligence Physical Security Gmail Spam Blocking Private Cloud Google Drive Miscellaneous The Internet of Things Virtualization Data Security Wi-Fi Public Cloud Vulnerability Bandwidth Hosted Solutions Communications Redundancy Office 365 Avoiding Downtime Comparison Downtime BDR Remote Monitoring Business Intelligence Router Government Windows 10 Data Storage Recovery Quick Tips IT Management CES Saving Money OneNote Network IT Plan Internet Exlporer Data storage Unsupported Software Word Save Money Passwords Software Tips HIPAA Electronic Medical Records Voice over Internet Protocol Advertising Windows Server 2008 Automobile Charger Identity Theft Workers Legal Humor Managed IT YouTube BYOD webinar Human Resources Windows 7 Windows 10s Work/Life Balance Computer Care Credit Cards Keyboard Networking Infrastructure Botnet Health Meetings Conferencing Staff Hiring/Firing Multi-Factor Security Facebook Flash Microsoft Office Samsung Fraud IBM Password Manager Patch Management Monitor Travel Uninterrupted Power Supply HBO Emails Data Protection Apps Trending Hybrid Cloud Going Green Black Market Solid State Drive Value Amazon Supercomputer Business Mangement Scam Files NarrowBand Data Management Data loss Office Tips Digital Signature PDF Sync Office Audit Amazon Web Services Budget Recycling History Wireless Technology Screen Mirroring Cleaning Specifications Online Shopping Password Relocation Sports Computer Fan eWaste Cast Tech Support Netflix Evernote Robot Telephony FENG Current Events Criminal Update User Error Laptop Shadow IT IT Support Millennials Wireless Charging HaaS Skype Knowledge IT Services Chromecast Touchpad Frequently Asked Questions Reputation Workforce Holiday Cortana Start Menu Apple Network Congestion Content Management Google Docs End of Support Excel Customer Settings Telecommuting Google Apps Flexibility Tools iPhone DDoS IT Consultant Blockchain Productivity Website Internet exploMicrosoft Marketing Tip of the week Hacking Remote Work Employer-Employee Relationship Big Data Outlook Managed Service Provider Root Cause Analysis Search Congratulations Politics Books How to Save Time Best Practice Emergency Experience Mobile Device Employer Employee Relationship Music Video Games Webinar Battery Computer Accessories Loyalty Scalability Transportation IT solutions Encryption Education Bluetooth Information Technology Content SaaS Workplace Tips Benefits Computing Infrastructure Techology Audiobook Instant Messaging Firewall Applications Worker Assessment Wearable Technology VPN Entertainment Smart Technology WiFi Users Rootkit Wireless Television IT Support USB Remote Computing Two Factor Authentication Virtual Reality Training Public Computer Troubleshooting CrashOverride Thank You Worker Commute Vendor Management Risk Management Mobility