631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Suffolk Computer Consultants has been serving the Speonk area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would You Pay $10 Grand To Keep Your Website Away From XXX Content?

Would You Pay $10 Grand To Keep Your Website Away From XXX Content?

Have you ever thought about what would happen if your IT administrator were to go rogue and create redirects on your website that take your visitors to inappropriate content? Well, it happened to one unfortunate company in Arizona, and it ended poorly for both parties involved. What started as a ransom ended up as four years of probation and a huge sum of cash paid in restitution.

The technician in question--a man by the name of Tavis Tso, from Arizona--attempted to extort $10,000 dollars from a client in Phoenix. Tso had reportedly told the client that he didn’t have the login information for their domain registrar GoDaddy account, but that was a lie. He certainly did have the information, and to keep them from finding out about it, he changed the contact information in GoDaddy. He had planned to defraud the company--a plan which backfired in a spectacular way. He even went so far as to create a separate Microsoft account so that he could take over the company’s domain.

Tso made it so that the company employees couldn’t access their email accounts, and worse yet, he set up a redirect for the company’s home page that showed up as a blank page. He then demanded that the company hand over $10,000 to make the problem disappear. The victim company made the right call and didn’t give into Tso’s cyber torment. When it became clear that they had no intention of footing the bill for Tso’s treachery, he made the issue much, much worse by redirecting all of the website traffic to an unsavory porn site.

The redirect existed for several days before it was resolved, and Tso was sentenced to four years of probation in addition to $9,145 in restitution on an account of wire fraud. However, the damage done by this rogue IT administrator will be difficult to recover from, regardless of the amount of punishment he receives.

How can your business prepare itself for a disaster scenario like this? You should start by considering how you handle the permissions of any user on your network at any given time. If anyone is terminated or leaves the company for any reason, you should take prompt action to remove any permissions that they have on your network. Ideally, you want to make these precautionary changes before they leave. Do you have any other concerns about your network security? If so, reach out to Suffolk Computer Consultants at 631-905-9617.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Cloud Privacy Business Computing Technology Malware Cybersecurity Best Practices Communications Outsourced IT Managed IT Services Hackers Backup Business Microsoft Software Smartphones Hardware Hosted Solutions Small Business Productivity Alert VoIP Passwords Network Security Microsoft Office Excel Smartphone Business Management VoIP Router Phishing Settings Email Android Save Money Office Ransomware Miscellaneous Google Windows 10 Vulnerability Computer Data Breach Retail Battery Hacking IT Support Chrome IT Services Access Control Twitter App Office 365 Website Remote Monitoring Government Saving Money Politics Mobile Device Management Bandwidth Windows Holiday Password Business Continuity Scam Apps Productivity Tip of the week Gadgets Workers Employer-Employee Relationship Word Data Backup User Tips Social Media IT Support Virtualization How To Cloud Computing Internet Law Enforcement Wi-Fi Applications Patch Management WiFi Cortana Communication Managed IT Services Marketing Voice over IP Disaster Recovery Cleaning Hosted Solution Specifications Access eCommerce Work/Life Balance Internet of Things Apple Copy Conferencing Multi-Factor Security BYOD Phone System Online Shopping Smart Technology Licensing Education iPhone Paste Content Filtering Data Recovery Spam Data Management Analytics Botnet Wireless Charging Travel Data Protection Business Intelligence Gmail Two-factor Authentication Gadget Lead Generation Live Streaming File Sharing Telephone Systems User Tip Dark Web Tech Support Efficiency Printer Server Shortcut Virtual Assistant Spotify WhatsApp Entertainment User Security Recovery Remote Control WannaCry Remote Computing Hiring/Firing Printers CrashOverride Virus Browser Business Technology Spam Blocking HIPAA Telecommuting Innovation News Sales Email Management Paperless Office Hard Drive Millennials Company Culture Automation Wireless Managed IT Telephone System Tablet Automobile Office Tips Processors Managed IT Service Server Physical Security Staffing Knowledge Cybercrime Information Technology Spyware Telephony Files Collaboration Remote Support Comparison Google Drive Biometrics Google Maps HP Hacker Unified Threat Management Scheduling Current Events Customer Relationship Management Samsung Document Management Emergency IP Address VPN Computer Care Instagram Net Neutrality Customer Service Digital Mobile Office Gaming Console Domains Cost Management Hard Drives Freedom of Information Edge Mobile Devices Video Games Public Speaking Worker Yahoo Lithium-ion battery Television Augmented Reality Data Printer Autocorrect Safety The Internet of Things Avoiding Downtime Maintenance Budget Dark Data Leadership Competition Fun Big Data DDoS Antivirus Users Personal Information Money Network Upgrade Employer Employee Relationship SaaS Search Scalability Windows 10 Synergy IaaS Presentation Encryption Credit Cards Mobile Device Emoji 5G HaaS Wireless Technology Vendor Management Managed Service Provider Facebook IBM

Newsletter Sign Up