631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Would You Pay $10 Grand To Keep Your Website Away From XXX Content?

Would You Pay $10 Grand To Keep Your Website Away From XXX Content?

Have you ever thought about what would happen if your IT administrator were to go rogue and create redirects on your website that take your visitors to inappropriate content? Well, it happened to one unfortunate company in Arizona, and it ended poorly for both parties involved. What started as a ransom ended up as four years of probation and a huge sum of cash paid in restitution.

The technician in question--a man by the name of Tavis Tso, from Arizona--attempted to extort $10,000 dollars from a client in Phoenix. Tso had reportedly told the client that he didn’t have the login information for their domain registrar GoDaddy account, but that was a lie. He certainly did have the information, and to keep them from finding out about it, he changed the contact information in GoDaddy. He had planned to defraud the company--a plan which backfired in a spectacular way. He even went so far as to create a separate Microsoft account so that he could take over the company’s domain.

Tso made it so that the company employees couldn’t access their email accounts, and worse yet, he set up a redirect for the company’s home page that showed up as a blank page. He then demanded that the company hand over $10,000 to make the problem disappear. The victim company made the right call and didn’t give into Tso’s cyber torment. When it became clear that they had no intention of footing the bill for Tso’s treachery, he made the issue much, much worse by redirecting all of the website traffic to an unsavory porn site.

The redirect existed for several days before it was resolved, and Tso was sentenced to four years of probation in addition to $9,145 in restitution on an account of wire fraud. However, the damage done by this rogue IT administrator will be difficult to recover from, regardless of the amount of punishment he receives.

How can your business prepare itself for a disaster scenario like this? You should start by considering how you handle the permissions of any user on your network at any given time. If anyone is terminated or leaves the company for any reason, you should take prompt action to remove any permissions that they have on your network. Ideally, you want to make these precautionary changes before they leave. Do you have any other concerns about your network security? If so, reach out to Suffolk Computer Consultants at 631-905-9617.

What Does a SMiShing Attempt Look Like?
Tip of the Week: 4 Ways to Speed Up Your Chrome Br...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, August 17 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Business Computing Technology Cloud Privacy Cybersecurity Managed IT Services Communications Malware Tech Term Network Security Backup Hardware Microsoft Smartphones Outsourced IT Passwords Communication Hosted Solutions Software Ransomware Hackers Business Business Management VoIP Android Wi-Fi Email Productivity Small Business Save Money Alert Social Media Google Internet Router Data Backup Computer Data Recovery Twitter Microsoft Office Business Intelligence Applications Smartphone Employer-Employee Relationship Data Breach Virtualization BDR Efficiency Mobile Devices Blockchain Data Password Apps Internet of Things Windows 10 Excel Office Cloud Computing Browser Patch Management Network Settings Government Automation Vulnerability Innovation IT Services Analytics VoIP User Tips Bandwidth Miscellaneous Collaboration Data Management Saving Money IT Support Phishing Holiday Mobile Device Management Virus Tech Terms Business Continuity Managed IT Services Access Control WiFi Cybercrime Word Scam Virtual Assistant Retail Information How To Battery VPN Cortana Workers Wireless Charging Computers Productivity Gadgets Physical Security Managed IT Service App Data Protection Gmail Hacking Artificial Intelligence Company Culture Paperless Office Networking Politics Website Office 365 IT Support Compliance Cost Management Remote Monitoring Windows Spam Tip of the week Remote Computing Law Enforcement Wireless Chrome Lead Generation Mobile Security Proactive IT Connectivity Specifications Bring Your Own Device eCommerce Voice over Internet Protocol Hard Drives Laptop Printing Printer Server Spam Blocking Business Technology Data loss Unified Communications Two-factor Authentication Facebook Shortcut Telecommuting Spyware Entertainment Biometrics Copy Apple Reporting Operating System Disaster Recovery News Remote Monitoring and Management Server Network Attached Storage Streaming Media Recovery Multi-Factor Security Conferencing Google Maps Technology Tips Hybrid Cloud Maintenance Licensing Online Shopping Paper Cleaning Printers Email Management Sales Staff RAM Tech Support CrashOverride Millennials HP Database Access Paste iPhone Medical IT WannaCry Environment Safety Telephone System Analysis Server Management Downloads Content Filtering Backup and Disaster Recovery Marketing Antivirus Travel Amazon Ink Tablet Spotify Websites Microsoft Teams Document Management Tactics BYOD GDPR HIPAA e-waste Education Smart Technology Managed Service Trends Phone System SSD Live Streaming Workplace Tips Hiring/Firing IT budget PowerPoint Big Data Knowledge Users Managing Stress Files Telephony Digital Internet Explorer SaaS Telephone Systems File Sharing Dark Web User Tip Hard Drive disposal Remote Support Work/Life Balance Machine Learning A.I. Inventory WhatsApp Plug-In Managed IT IT Management Sports Staffing Google Drive Comparison Office Tips Automobile Dongle G Suite Voice over IP Cables Botnet Edge Threat Remote Control User Security Movies Gadget Processors Value Information Technology Hosted Solution Telecommute Yahoo Emoji Encryption Windows 10 Printer Emergency Public Speaking HaaS Search Mobile Device Presentation Unified Threat Management Lithium-ion battery Vendor Management Autocorrect Augmented Reality Avoiding Downtime Current Events Wireless Technology Leadership 5G Dark Data Scheduling IBM Samsung Hacker The Internet of Things Computer Care Budget Net Neutrality Managed Service Provider Personal Information DDoS Competition Instagram Customer Relationship Management IP Address Money Gaming Console Employer Employee Relationship Storage Fun Customer Service Scalability Freedom of Information Synergy Mobile Office Upgrade Video Games Error Worker Domains IaaS Credit Cards Television Regulation

Newsletter Sign Up