Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

“It Redirected Where?” -- A Case Study in Security Precautions

“It Redirected Where?” -- A Case Study in Security Precautions

Imagine what it would be like to discover that your website was suddenly redirecting to content that was decidedly more... adult... than what should be representing your business. For a company in Phoenix, Arizona, this was the unfortunate reality after they had let their IT administrator go.

The administrator, Tavis Tso, created a web in which he attempted to snare a client in an extortion scam. After lying to the client, claiming that he didn’t have their credentials to login to their GoDaddy domain registrar account, Tso changed the credentials to the GoDaddy accounts and created a separate Microsoft account that gave him considerable power over his target. His first steps were to block employees from accessing their email accounts and to redirect the company’s home page to a blank webpage. Tso then demanded $10,000 from the company to fix the problem that he had caused.

The company did not comply with his demands.

Once it was clear that the company wasn’t going to cooperate with Tso, the cybercriminal upped the ante. Rather than just redirecting the company’s home page to a blank site, Tso redirected all of the website’s traffic to a pornographic website. This redirect took several days to resolve.

Tso was ultimately sentenced to four years of probation, in addition to $9,145 as restitution for a count of wire fraud. While it is nice that a cybercriminal has been brought to justice, the damage done will be hard to undo, as he had considerable access to his company’s systems.

Would your business be able to recover from an incident like this? A good first step is to ensure your recovery is to reconsider the permissions of the users on your network--and more importantly, the permissions of former users. There is no reason to grant access to your IT where it is not needed, and there is no reason to keep an IT resource on your system once they are no longer part of your organization.

Total Tech Care can help you to make these changes, as well as many others that will benefit your IT and your network security. Reach out to us at 866-348-2602 to start a discussion.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity IT Support Smartphones Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Windows Phishing Upgrade Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Cloud Computing Office Server Save Money Windows 10 Passwords Chrome Social Media Virtualization Saving Money Holiday Gadgets Tech Term Automation Microsoft Office Managed IT Services Managed Service Cybercrime Computers Operating System Artificial Intelligence Facebook Hacking Health BYOD Mobile Device Management Internet of Things Networking IT Support Wi-Fi Information Technology Covid-19 Spam Information Office 365 Telephone Systems Alert Managed Service Provider Remote Mobility Recovery Employer-Employee Relationship Router Bandwidth BDR Social Engineering Password Money Encryption Human Resources Applications Mobile Computing Application Remote Monitoring Law Enforcement App Data Breach History Big Data Apps VPN How To Blockchain Remote Computing Paperless Office Government Mobile Office Data Storage Patch Management Private Cloud Managed IT Office Tips Training Work/Life Balance Gmail Settings Flexibility Data Security Marketing Two-factor Authentication WiFi Google Drive IT solutions Entertainment Website Mouse Budget HaaS Avoiding Downtime Vulnerability Infrastructure Windows 7 Voice over Internet Protocol Word Wireless Bring Your Own Device Servers Data Management Lithium-ion battery Cleaning Data Protection End of Support Vendor Firewall Education Managed Services Physical Security Display Safety Virtual Reality Apple HIPAA Sports Redundancy Employee/Employer Relationship Staff Social Software as a Service Keyboard Telephone System USB RMM Machine Learning User Error Connectivity Remote Work Meetings Conferencing Scam Save Time Risk Management Hacker Vendor Management The Internet of Things Computing Infrastructure Cryptocurrency Help Desk Unsupported Software SharePoint Going Green Printing Charger Virus Customer Service Comparison Compliance Battery Managed Services Provider Unified Threat Management OneNote Computer Care Environment CES Current Events Computer Accessories Shadow IT Database Telephony Fax Server Legal Samsung Content Management Remote Workers Business Technology Internet Exlporer SaaS Access Control Processor Value PDF Virtual Assistant Printer Authentication Spam Blocking Electronic Medical Records Bluetooth Hard Drive Network Congestion eWaste Proactive IT Hiring/Firing Best Practice Update Computing YouTube Black Market IT Consultant Wearable Technology Google Docs Humor Retail Identity Theft Hard Drives Instant Messaging Document Management Business Intelligence Digital Signage Robot Excel Solid State Drive Wireless Technology How to Downtime Audit Worker Biometrics IT Management Virtual Desktop Augmented Reality Data storage Botnet Fraud Automobile Procurement IT Plan Net Neutrality DDoS Workplace Strategy Remote Worker IBM Employees Employee/Employer Relationships Recycling ISP Flash Distributed Denial of Service Practices Customer Relationship Management Smart Technology Windows 365 Wiring Video Conferencing Reputation ROI Cache Streaming Media Amazon Web Services Analyitcs Supercomputer Programming Content Sales Bitcoin Safe Mode Tech Support Shortcuts Software Tips Criminal GDPR PowerPoint Laptop Cryptomining Sync Hosted Computing Windows Media Player Emails Point of Sale User Techology Personal Supply Chain Management Customers Wireless Internet Online Shopping Audiobook Monitoring Batteries File Sharing Antivirus Camera Touchpad Inventory Netflix Specifications Two Factor Authentication Windows 8.1 Windows 8 Managing Stress Digitize Windows Server 2008 R2 Wire Root Cause Analysis IT service Evernote Knowledge Travel Politics Music Customer relationships Advertising Cameras HBO Printers Manufacturing Skype Millennials Email Best Practices Tablet IT Assessment Smart Office Notifications Data loss Domains Wireless Charging Leadership Troubleshooting Computer Tips Managed IT Service Security Cameras Outlook OneDrive Virtual Private Network Biometric Security Start Menu IaaS Maintenance Workforce Virtual CIO Bloatware Peripheral Relocation Screen Mirroring Cables Loyalty Frequently Asked Questions Books Digital Security Cameras Using Data Printer Server Copiers Project Management 5G Mobile Nanotechnology Windows 10s Telecommuting Tablets Video Games Entrepreneur Worker Commute Quick Tip Cast Cortana Smartwatch Tip of the week Digital Signature webinar Experience Emergency Ergonomics Development Warranty OLED Professional Services Public Cloud Shortcut Employer Employee Relationship Scalability Assessment Cost Management Business Owner PCI DSS Virtual Machine HVAC Google Apps Employee Windows Server 2008 Analysis Social Networking 2FA Fiber Optics NarrowBand Messaging Administrator Cabling Tools Devices Search Television Policy iPhone Hypervisor Enterprise Content Management Running Cable Accountants Dark mode Trend Micro MSP SMS Microchip Default App Thought Leadership Credit Cards Memory Public Computer Procedure Consultant Files Saving Time Password Management Password Manager Chromecast Google Search Regulations Multi-Factor Security Transportation dark theme Shopping Analytics AI Search Engine IT Infrastructure Twitter Computer Fan Rootkit FinTech Best Available Colocation NIST Uninterrupted Power Supply Bing Business Mangement Smart Tech Workers Trending Benefits Science WIndows 7 Social Network Monitor Investment Addiction FENG Amazon

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code