Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

“It Redirected Where?” -- A Case Study in Security Precautions

“It Redirected Where?” -- A Case Study in Security Precautions

Imagine what it would be like to discover that your website was suddenly redirecting to content that was decidedly more... adult... than what should be representing your business. For a company in Phoenix, Arizona, this was the unfortunate reality after they had let their IT administrator go.

The administrator, Tavis Tso, created a web in which he attempted to snare a client in an extortion scam. After lying to the client, claiming that he didn’t have their credentials to login to their GoDaddy domain registrar account, Tso changed the credentials to the GoDaddy accounts and created a separate Microsoft account that gave him considerable power over his target. His first steps were to block employees from accessing their email accounts and to redirect the company’s home page to a blank webpage. Tso then demanded $10,000 from the company to fix the problem that he had caused.

The company did not comply with his demands.

Once it was clear that the company wasn’t going to cooperate with Tso, the cybercriminal upped the ante. Rather than just redirecting the company’s home page to a blank site, Tso redirected all of the website’s traffic to a pornographic website. This redirect took several days to resolve.

Tso was ultimately sentenced to four years of probation, in addition to $9,145 as restitution for a count of wire fraud. While it is nice that a cybercriminal has been brought to justice, the damage done will be hard to undo, as he had considerable access to his company’s systems.

Would your business be able to recover from an incident like this? A good first step is to ensure your recovery is to reconsider the permissions of the users on your network--and more importantly, the permissions of former users. There is no reason to grant access to your IT where it is not needed, and there is no reason to keep an IT resource on your system once they are no longer part of your organization.

Total Tech Care can help you to make these changes, as well as many others that will benefit your IT and your network security. Reach out to us at 866-348-2602 to start a discussion.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 15 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Smartphones Business Continuity Communication IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Upgrade Windows Phishing Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Data Recovery Cloud Computing Office Windows 10 Passwords Chrome Gadgets Virtualization Saving Money Holiday Tech Term Social Media Managed IT Services Microsoft Office Managed Service Automation Cybercrime Operating System Artificial Intelligence Computers Facebook IT Support Health Hacking Internet of Things Wi-Fi BYOD Mobile Device Management Networking Managed Service Provider Remote Spam Alert Office 365 Covid-19 Information Telephone Systems Information Technology Recovery Employer-Employee Relationship Router Social Engineering BDR Mobility Bandwidth Data Breach Human Resources Big Data Law Enforcement Remote Monitoring Mobile Computing Password Money App Application History Encryption Applications Government Remote Computing Private Cloud Mobile Office How To Blockchain Managed IT Paperless Office Apps Office Tips Data Storage Patch Management Training VPN Settings Servers Two-factor Authentication Avoiding Downtime Data Security Mouse HaaS Flexibility Marketing WiFi Bring Your Own Device Data Management IT solutions Work/Life Balance Entertainment Website Budget Wireless Vulnerability Infrastructure Voice over Internet Protocol Windows 7 Word Gmail Google Drive HIPAA Sports Redundancy Firewall Keyboard Vendor Management Data Protection Virtual Reality Apple Social User Error Save Time Vendor Meetings Managed Services Staff Software as a Service Display Telephone System Cleaning Machine Learning Risk Management Connectivity Hacker Remote Work USB Employee/Employer Relationship Conferencing End of Support The Internet of Things RMM Lithium-ion battery Scam Education Physical Security Safety Botnet Customer Service PDF Fraud IT Plan Environment Digital Signage Remote Worker Fax Server Proactive IT Unsupported Software Cryptocurrency Best Practice SaaS YouTube Charger Black Market Procurement Workplace Strategy Compliance Comparison Net Neutrality OneNote Computer Care CES Help Desk Network Congestion Current Events Virus Printing eWaste Document Management Telephony Solid State Drive Wireless Technology Samsung Unified Threat Management Content Management How to Business Technology Downtime Computer Accessories Access Control Value Managed Services Provider Virtual Assistant Data storage Spam Blocking Authentication Electronic Medical Records Database Wearable Technology Automobile Retail Hard Drives Remote Workers Instant Messaging Robot Computing Infrastructure Printer Excel Hiring/Firing Bluetooth Going Green Processor Update Biometrics Virtual Desktop Hard Drive Google Docs Battery Shadow IT Identity Theft DDoS IT Consultant Legal Business Intelligence Computing SharePoint Audit Internet Exlporer Worker IT Management Humor Augmented Reality Search Engine Computer Fan Twitter Messaging Rootkit Cabling NIST Policy Business Mangement Hypervisor Relocation Workers Smart Tech Trend Micro Benefits Trending Antivirus Consultant Dark mode FENG Analytics Addiction SMS Windows 8 Amazon Default App IT service Video Games Procedure IBM Recycling Saving Time Practices Shopping Smart Technology Google Search Worker Commute Flash Best Available Wiring dark theme Experience WIndows 7 Cache AI Tablet Amazon Web Services IT Infrastructure Bing Domains Scalability Software Tips Safe Mode FinTech Supercomputer Criminal GDPR Emails Hosted Computing Social Network Business Owner Sync IaaS Maintenance Wireless Internet NarrowBand Online Shopping Investment Employee/Employer Relationships Search File Sharing Employees Bloatware Camera Windows 365 iPhone Netflix Inventory Two Factor Authentication Specifications ISP User Root Cause Analysis PowerPoint Wire Video Conferencing Tablets Windows Media Player Evernote ROI Bitcoin Music Travel Shortcuts HBO Sales Entrepreneur Knowledge Printers Point of Sale Files Personal Millennials Cryptomining Skype Managing Stress Shortcut Data loss Smart Office Supply Chain Management Chromecast Wireless Charging Batteries Troubleshooting Outlook Monitoring Cost Management Leadership Virtual Private Network Windows 8.1 Social Networking Colocation Cameras Digitize Uninterrupted Power Supply Workforce Start Menu Screen Mirroring Loyalty Cables Windows Server 2008 R2 Books Frequently Asked Questions Customer relationships Monitor Project Management Email Best Practices Windows 10s Nanotechnology IT Assessment Telecommuting Manufacturing Running Cable Mobile Cast Memory Cortana Digital Signature Managed IT Service Streaming Media Emergency Security Cameras Tip of the week Computer Tips Reputation webinar Warranty Virtual CIO Public Cloud Printer Server OneDrive Tech Support Employer Employee Relationship Biometric Security Content Professional Services Techology HVAC Peripheral Laptop Assessment Google Apps Analysis Using Data Windows Server 2008 Digital Security Cameras Customers Administrator Devices Copiers Science 5G Audiobook Tools Enterprise Content Management Quick Tip Touchpad Television Accountants Smartwatch MSP Ergonomics Microchip Customer Relationship Management Advertising Thought Leadership Development Credit Cards OLED Distributed Denial of Service Politics Password Management PCI DSS Analyitcs Public Computer Password Manager Virtual Machine Fiber Optics Notifications Transportation Multi-Factor Security Employee Regulations 2FA Programming

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code