ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

Managing permissions for their network is something that many organizations may only consider when it’s too late to do anything about it. This can provide outsiders with access to sensitive information that shouldn’t be seen by anyone but your employees. To learn a few lessons about user permissions, let’s look at the misfortune of PA Online, a Pennsylvania-based Internet service provider.

A former system administrator for PA Online was issued a prison sentence of two years, alongside a fine of $26,000, for using the company network when he wasn’t supposed to. Dariusz J. Prugar, who had been fired just days before the incident, found that his credentials were still valid. He then proceeded to cause the network to crash, leaving countless residents and Pennsylvania businesses without an Internet connection.

Prugar used these credentials to infiltrate the network and steal back software which he claimed was rightfully his. He continued to plant backdoors across the network, and to keep his antics hidden, Prugar enabled scripts that would delete the network’s access logs.

However, the results of this action were far from the intended purpose. The scripts used by Prugar caused the entire system to crash, which led to the company calling Prugar in to assist with getting the systems back online. He then made the mistake of demanding to renegotiate the rights to “his” software, which was a major red flag for PA Online. The ISP called in the FBI to investigate the occurrence, and… well, you know the rest.

The end result was that PA Online’s customers went a week without an Internet connection, and the company eventually had to shut itself down. The effects of a rogue admin led to the demise of the ISP, and it’s only because this former employee still had his own credentials to access the company network.

There is a clear lesson to be learned here; a user who doesn’t need access to your network shouldn’t be able to do so. Often times, an employee who gets terminated or leaves the company for some reason may do so with their credentials intact, and in the confusion of losing a worker, your IT department may forget to revoke their access to the network. Enforcing this practice will help you avoid a premature failing due to a situation similar to what happened to PA Online.

ClearView IT is the ideal solution to these system access problems, as we can monitor your network access in real time for discrepancies, as well as restrict permissions as the need arises. You can know for certain that any users who aren’t currently employed by your business won’t have credentials to access the network. To learn more, reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup communications Smartphone Small Business Microsoft Office Upgrade Smartphones Mobile Devices Network Managed IT Services Communication Data Recovery Productivity Quick Tips VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Disaster Recovery Covid-19 Passwords Holiday Managed Service Windows 10 IT Support Apps Browser Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Data Management Internet of Things Remote Work Operating System Government Saving Money Networking Windows Gadgets Artificial Intelligence Managed IT services Workplace Strategy App Mobile Device Management Virtualization Business Technology Spam Blockchain Server Bandwidth Information WiFi Remote Encryption Employee/Employer Relationship Budget Gmail Office Two-factor Authentication History Office 365 Apple Information Technology Wi-Fi Big Data BDR Health Conferencing Analytics Access Control Cybercrime Data Security Vendor Remote Monitoring Help Desk Hacking Voice over Internet Protocol Employer-Employee Relationship Cost Management IT Management Training Hacker Document Management Remote Computing Save Money Compliance Patch Management Applications IBM Website Project Management BYOD Vulnerabilities Computing Search... Vendor Management Mobile Office Hard Drive Best Practice Managed Services Retail Data loss Alert Money Legal Customer Service Hiring/Firing Unified Threat Management Outlook Data storage Firewall Password Augmented Reality Word Antivirus Black Market Cleaning Maintenance Router Robot Mobile Computing Windows 11 Monitoring Marketing The Internet of Things Healthcare YouTube Running Cable Websites Remote Workers Meetings Mobility Storage Laptop Windows 7 Free Resource Twitter Google Maps Scam Law Enforcement How To End of Support Printer VPN Social Sports User SaaS DDoS Update iPhone Travel Virtual Reality Education Data Breach Cortana Chrome Social Engineering Cryptocurrency Paperless Office Content Filtering PowerPoint Cooperation Physical Security Administration Video Conferencing Processors Politics Presentation Virtual Machines Machine Learning Specifications Settings Computer Repair IT Consultant Multi-factor Authentication Start Menu Professional Services Computer Care Solid State Drive Downloads Customer Relationship Management Vulnerability Saving Time Co-Managed IT Entertainment Chromebook Software as a Service Drones Managed Services Provider Wireless Technology eWaste Data Protection Computers Bitcoin Automobile Virtual Private Network Telephone Downtime Current Events Safety How To Microchip Excel Solutions Flexibility Virtual Desktop HIPAA Experience Integration Tech Terms Images 101 Identity Theft Display Hack Notifications Managed IT Unified Communications Virtual Assistant Digital Employees Google Docs Disaster Taxes Avoiding Downtime Bluetooth Distributed Denial of Service Office Tips Holidays Lithium-ion battery Private Cloud Processor Memory Username LiFi File Sharing Virtual Machine Entrepreneur Botnet Rental Service Redundancy Reviews Micrsooft Startup Optimization Documents Freedom of Information Smart Technology Application email scam Teamwork Business Intelligence Navigation 2FA Flash Cache Addiction Electronic Payment Telephone Systems Unified Threat Management Data Storage Business Growth Workers Mobile Security Hypervisor User Tip Shopping Legislation Securty News Medical IT CCTV SQL Server Domains Printing Evernote Paperless Network Management Banking Touchscreen PCI DSS Phone System Google Wallet Licensing Messenger Emergency Proxy Server Gig Economy Deep Learning Emails Humor Computer Malfunction Fake News Supply Chain Computing Infrastructure Azure Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Business Metrics Management Regulations Compliance Hosted Solution Samsung Device security Managed IT Service Books Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Public Speaking Computer Accessories Society Business Cards Tech Human Resources Language Business Mangement Going Green Net Neutrality Streaming Media Error Financial Data Tablets Keyboard Reading Bookmark Risk Management Monitors IT Visible Light Communication Scams Hard Drives Windows 8 Supercomputer Piracy intranet Google Calendar Term Google Apps Download Virus Telework HTML Wireless Shortcut Heating/Cooling Environment Relocation Browsers Smartwatch Displays Nanotechnology Communitications Advertising Motion Sickness Microsoft 365 Cables Work/Life Balance Google Drive Upload Procurement Windows XP Tech Support Software License Social Networking Comparison Google Play Social Network FinTech Point of Sale Knowledge Data Analysis CES Troubleshooting Corporate Profile Screen Reader IT Assessment Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value In Internet of Things Television Security Cameras Hacks Customer Resource management Organization Network Congestion Cabling Devices Cyber security Shortcuts G Suite Tip of the week Reliable Computing Fileless Malware Writing Tablet Smart Devices VoIP Gamification Remote Working Tracking Company Culture Mouse Telephone System AI Regulations Trend Micro Staffing Be Proactive Web Server Transportation IP Address Scalability Directions Digital Security Cameras Business Owner Backup and Disaster Recovery Electronic Health Records Text Messaging Content Proactive IT Digital Payment Desktop Wasting Time Administrator SharePoint Bring Your Own Device Electronic Medical Records Worker Accountants eCommerce Modem Workplace Strategies Videos Access Database Surveillance Time Management Music Public Cloud Managing Costs Health IT Equifax Recovery SSID Competition Hard Drive Disposal Employer/Employee Relationships Audit Media Inbound Marketing Spyware Tactics Development

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?