Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

An Extreme Example of a Fired IT Administrator Taking Revenge

An Extreme Example of a Fired IT Administrator Taking Revenge

It can be easy to underestimate the importance of maintaining permissions on your network. In fact, sometimes it takes a good dose of misfortune to present the consequences of unchecked access to your network. This time, the misfortune befell PA Online, an Internet service provider located in Pennsylvania.

A former system administrator for the ISP was recently handed down a prison sentence of two years and a fine of $26,000 for his activities on the company network--activities that ultimately caused the network to crash, plunging thousands of residents and businesses into an Internet blackout in 2010. The perpetrator, Dariusz J. Prugar, had been fired days before by PA Online, but his credentials were still valid.

With these credentials, Prugar attempted to steal software he believed to belong to him by planting backdoor access points into the network. In an attempt to hide his theft, Prugar also enabled scripts that were intended to delete access log files

What happened was somewhat more extreme. In reaction to those scripts, the entire system crashed, plunging thousands of users into Internet darkness. Prugar was called in to help, but aroused suspicion by demanding that the rights to the stolen software be renegotiated. PA Online called in the FBI on their suspicions, and the rest is history.

At the end of it all, PA Online’s customers spent a week waiting for the network to be rebuilt, and the company eventually had to close its doors--and all because a former employee could still access the company network.

The lesson here is clear: if an individual doesn’t need access to your infrastructure, they should not be able to access it. Enforcing this in your business could be the difference between a secure and successful business, and what happened to PA Online.

Telesys Voice and Data can help you manage your solutions to make sure that those who shouldn’t be able to get in, don’t. In fact, a managed IT service provider like Telesys Voice and Data can manage employee permissions for you, meaning that all you have to do is contact us about who needs to be removed from your systems and we’ll remote into your network and take care of the rest. For more information, give us a call at (800) 588-4430.


No comments yet
Already Registered? Login Here
Friday, 21 February 2020
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Business Computing Best Practices Hackers Malware Privacy Business Email Productivity Hosted Solutions Network Security Microsoft Internet Software IT Services Productivity Computer Windows 10 Data Backup Managed Service Provider Backup Ransomware Innovation Mobile Devices Business Continuity Smartphone Outsourced IT Data Hardware Efficiency Google Upgrade Android User Tips Managed IT services Disaster Recovery Social Media Data Recovery IT Support Browser Communication IT Support Workplace Tips Small Business Business Management Cloud Computing Managed IT Services Data Management App Smartphones Office Server Remote Monitoring Cybersecurity Miscellaneous Internet of Things Holiday Microsoft Office Phishing Network VoIP Office 365 Windows WiFi Facebook Paperless Office communications Password Tech Term Artificial Intelligence Gmail Spam Big Data Passwords Save Money Encryption Collaboration Windows 10 Employer-Employee Relationship Saving Money Document Management Risk Management Vendor Management Compliance Customer Relationship Management Unified Threat Management Bandwidth Firewall Robot Apps Hosted Solution Recovery Wi-Fi Operating System Healthcare Tip of the week Remote Computing Analytics Word Hacker Chrome How To Windows 7 Content Filtering Apple Government Avoiding Downtime Money Work/Life Balance Downtime Managed IT Mobile Device Management Infrastructure Customer Service Office Tips Telephone Systems File Sharing Two-factor Authentication Settings Business Growth Presentation Automation Managed Service The Internet of Things Computers Vulnerability Going Green Alert Help Desk Printing Outlook Data storage Data Security Applications Computing Education Software as a Service IT Management Cybercrime Health Virtual Reality Training Mobile Device Antivirus Redundancy SaaS BYOD Hacking Mobile Computing Social Project Management Data loss BDR Website Tech Support Business Technology Legal Humor Display LiFi Laptops Analyitcs Twitter Politics Monitors Patch Management Travel Solid State Drive Google Drive Scam Identity Theft Websites Physical Security Augmented Reality Regulations Specifications Taxes Botnet IBM Electronic Health Records Running Cable VPN Net Neutrality Assessment Samsung Licensing Proactive User Server Management Virtual Private Network Smart Technology Meetings Bring Your Own Device Search Sports Storage Consultation Digital Payment Remote Monitoring and Management HIPAA Retail IT service Router Maintenance Cortana Virtualization Mobile Security Best Practice Computer Care Administration Lithium-ion battery Business Owner IT solutions Safety Marketing Tablet Wireless Technology Automobile Upgrades Wireless Budget End of Support Competition Access Control Mouse IoT YouTube Information Technology Unified Communications Utility Computing Processor Application Lenovo Microsoft Excel CCTV Digital Emoji Tracking Gadget Users Cables Co-Managed IT Environment Public Speaking Unified Threat Management Cooperation Downloads Shortcut Fort Worth Uninterrupted Power Supply Mobile Data Monitoring Hacks RMM Superfish Blockchain Spyware Wires Business Telephone Troubleshooting business communications systems Staff Multi-Factor Security flu shot Consulting Current Events Procurement Laptop Cost Management Active Directory Hard Drives Permissions G Suite How To Processors Virtual Desktop Internet Protocol Flexibility Phone System Heating/Cooling Google Calendar Fort Worth IT Motion Sickness Hard Disk Drive Remote Worker Halloween Google Docs Hard Drive Windows Server Refrigeration Networking Fraud Firefox Supercomputer Writing MSP VoIP streamlines Operations Servers Legislation DFW IT Service Deep Learning Personal Information Fun Social Networking Professional Services Scary Stories Recycling User Management IT Consultant IT Budget Machine Learning Social Engineering business network infrastructure Wearable Technology Cyberattacks Virtual Assistant Computer Repair Motherboard Management Batteries Undo Techology Internet Exlporer Cleaning Notifications Relocation Software Tips iPhone IP Address Bookmarks Statistics Voice over Internet Protocol Mail Merge Distributed Denial of Service Webcam Alt Codes Electronic Medical Records Google Wallet Dark Data Enterprise Resource Planning Remote Work Disaster Resistance data services Crowdsourcing Technology Tips Private Cloud WPA3 Mobile Office IT Technicians Favorites Bluetooth Modem Address Managed IT Service Point of Sale Corporate Profile Typing Drones Buisness Mobile File Management Proactive IT Hotspot Quick Tips User Error Comparison Error History Fleet Tracking Mirgation Conferencing Cookies Manufacturing Break Fix WannaCry Cryptocurrency Knowledge Company Culture Telephone IT Consulting Language PowerPoint Time Management Printer Mobility Black Friday Cabling Asset Tracking Migration Employees Experience Nanotechnology Gadgets Consumers Dark Web Web Server Bitcoin Update Staffing Vulnerabilities Mobile VoIP Data Breach Computing Infrastructure Network Management Cyber Monday Administrator 3D Printing Remote Workers Chatbots Zero-Day Threat Proactive Maintenance Data Warehousing Cameras VoIP Windows 8 Chromebook GPS Law Enforcement Google Maps Network Congestion Geography Windows Server 2008 eWaste Domains Technology Laws Alerts Touchscreen SharePoint Entrepreneur flu season IT Sevices Disaster Unsupported Software Information 5G Identity Backup and Disaster Recovery

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...