ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

“It Redirected Where?” -- A Case Study in Security Precautions

“It Redirected Where?” -- A Case Study in Security Precautions

Imagine what it would be like to discover that your website was suddenly redirecting to content that was decidedly more... adult... than what should be representing your business. For a company in Phoenix, Arizona, this was the unfortunate reality after they had let their IT administrator go.

The administrator, Tavis Tso, created a web in which he attempted to snare a client in an extortion scam. After lying to the client, claiming that he didn’t have their credentials to login to their GoDaddy domain registrar account, Tso changed the credentials to the GoDaddy accounts and created a separate Microsoft account that gave him considerable power over his target. His first steps were to block employees from accessing their email accounts and to redirect the company’s home page to a blank webpage. Tso then demanded $10,000 from the company to fix the problem that he had caused.

The company did not comply with his demands.

Once it was clear that the company wasn’t going to cooperate with Tso, the cybercriminal upped the ante. Rather than just redirecting the company’s home page to a blank site, Tso redirected all of the website’s traffic to a pornographic website. This redirect took several days to resolve.

Tso was ultimately sentenced to four years of probation, in addition to $9,145 as restitution for a count of wire fraud. While it is nice that a cybercriminal has been brought to justice, the damage done will be hard to undo, as he had considerable access to his company’s systems.

Would your business be able to recover from an incident like this? A good first step is to ensure your recovery is to reconsider the permissions of the users on your network--and more importantly, the permissions of former users. There is no reason to grant access to your IT where it is not needed, and there is no reason to keep an IT resource on your system once they are no longer part of your organization.

i-medIT can help you to make these changes, as well as many others that will benefit your IT and your network security. Reach out to us at 630-549-6199 to start a discussion.



No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Google Hackers Privacy Cloud Backup Business Computing Microsoft Hardware Smartphones Small Business Innovation Business Cybercrime Ransomware Efficiency Software Malware Data Cybersecurity Android Managed IT Services Productivity User Tips VoIP Email Internet Mobile Devices Business Continuity Server Automation Computers Network Security Safety Bring Your Own Device Operating System Social Media Mobile Device Management Communication Gadgets Business Management How To Chrome App Upgrade Data Breach Spam Computer Windows Law Enforcement Data Backup Social Engineering Collaboration Browser Network Artificial Intelligence Physical Security Internet Exlporer Cloud Computing Data storage Data Storage Private Cloud Disaster Recovery Google Drive Windows 10 Redundancy Passwords Avoiding Downtime Save Money Public Cloud Wi-Fi Office 365 Unsupported Software Miscellaneous The Internet of Things Hosted Solutions Phishing Bandwidth Spam Blocking Telephone Systems Smartphone Money Router Government Data Security Downtime Word Windows 10 Recovery Outsourced IT Alert Quick Tips Managed IT Services Saving Money Netflix Multi-Factor Security Advertising Automobile FENG Flash Current Events Travel DDoS IT Support Trending IT Management Knowledge Outlook Health Comparison Sync Microsoft Office Facebook Gmail OneNote IT Plan Network Congestion Data Recovery Humor YouTube Hybrid Cloud Settings Specifications Apps Communications Virtualization IT Consultant Remote Monitoring Productivity Files Business Intelligence Telephony Office Root Cause Analysis Software Tips Update Monitor History Going Green Uninterrupted Power Supply Skype Black Market Relocation BYOD webinar NarrowBand Office Tips Windows 10s Computer Care Frequently Asked Questions Networking Start Menu Internet of Things Meetings Wireless Technology Conferencing Google Docs Hiring/Firing User Error Cleaning Vulnerability Samsung Excel IBM Tools Patch Management HaaS Sports HBO Emails Website IT Services Reputation Tech Support Solid State Drive Value Tip of the week Supercomputer Scam Robot Apple Data loss Voice over Internet Protocol End of Support Laptop Customer Shadow IT Audit Windows Server 2008 Budget Managed IT Flexibility iPhone Screen Mirroring Chromecast Two-factor Authentication Internet exploMicrosoft Marketing Touchpad Hacking Computer Fan Windows 7 BDR Botnet Managed Service Provider Cast Search Politics Firewall Legal Worker How to Work/Life Balance Wearable Technology Thank You Assessment Keyboard Smart Technology Best Practice Rootkit Television USB Congratulations Experience Two Factor Authentication Mobile Device Training Public Computer Troubleshooting CrashOverride Music Video Games PDF Vendor Management Battery Big Data Electronic Medical Records Scalability Information Technology Charger Education Content Books Password Data Management WiFi Save Time Workplace Tips Computing Infrastructure Audiobook Emergency Techology Instant Messaging Applications Entertainment Employer Employee Relationship Wireless Users Holiday IT Support Webinar Computer Accessories Loyalty Virtual Reality Transportation VPN IT solutions Bluetooth SaaS Worker Commute Risk Management Benefits Mobility Remote Computing