Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

An Extreme Example of a Fired IT Administrator Taking Revenge

An Extreme Example of a Fired IT Administrator Taking Revenge

It can be easy to underestimate the importance of maintaining permissions on your network. In fact, sometimes it takes a good dose of misfortune to present the consequences of unchecked access to your network. This time, the misfortune befell PA Online, an Internet service provider located in Pennsylvania.

A former system administrator for the ISP was recently handed down a prison sentence of two years and a fine of $26,000 for his activities on the company network--activities that ultimately caused the network to crash, plunging thousands of residents and businesses into an Internet blackout in 2010. The perpetrator, Dariusz J. Prugar, had been fired days before by PA Online, but his credentials were still valid.

With these credentials, Prugar attempted to steal software he believed to belong to him by planting backdoor access points into the network. In an attempt to hide his theft, Prugar also enabled scripts that were intended to delete access log files

What happened was somewhat more extreme. In reaction to those scripts, the entire system crashed, plunging thousands of users into Internet darkness. Prugar was called in to help, but aroused suspicion by demanding that the rights to the stolen software be renegotiated. PA Online called in the FBI on their suspicions, and the rest is history.

At the end of it all, PA Online’s customers spent a week waiting for the network to be rebuilt, and the company eventually had to close its doors--and all because a former employee could still access the company network.

The lesson here is clear: if an individual doesn’t need access to your infrastructure, they should not be able to access it. Enforcing this in your business could be the difference between a secure and successful business, and what happened to PA Online.

Voyage Technology can help you manage your solutions to make sure that those who shouldn’t be able to get in, don’t. In fact, a managed IT service provider like Voyage Technology can manage employee permissions for you, meaning that all you have to do is contact us about who needs to be removed from your systems and we’ll remote into your network and take care of the rest. For more information, give us a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 13 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Workplace Tips Google Email Computer Workplace Strategy Hosted Solutions Collaboration Backup Small Business AI Users Managed Service Ransomware Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Smartphones Business Management communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Cloud Computing Gadgets Training Covid-19 Compliance Remote Work IT Support Server Managed Service Provider Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Data Management Government Wi-Fi Blockchain Vendor Business Technology Bandwidth Windows 10 Virtualization Apps Two-factor Authentication Mobile Office Managed Services Data Security BYOD Employer-Employee Relationship Tip of the week Chrome Budget Mobile Device Management Apple Networking Voice over Internet Protocol Gmail App WiFi Computing Physical Security Information Technology HIPAA Access Control Applications Office 365 Hacker Avoiding Downtime Marketing Password Conferencing Managed IT Services How To BDR Operating System Virtual Private Network Risk Management Router Health Computers Analytics Office Tips Augmented Reality Website 2FA Retail Help Desk Storage Bring Your Own Device Healthcare Big Data Social Vendor Management Windows 7 Cybercrime Microsoft 365 Display Solutions Printer Customer Service Paperless Office Infrastructure Document Management Windows 11 Monitoring Excel Scam Data loss Firewall Remote Workers Managed IT Service Telephone The Internet of Things Going Green Patch Management Save Money Remote Monitoring Cooperation Free Resource Vulnerability Project Management End of Support Content Filtering Images 101 IT Management Telephone System VPN Multi-Factor Authentication YouTube Meetings Mobility Cost Management Cryptocurrency Customer Relationship Management Computer Repair Employees Virtual Desktop LiFi Integration Data storage Hacking Presentation User Tip Modem Mobile Security Processor Outlook Wireless Technology Machine Learning Money Holidays Humor Data Storage Smart Technology Supply Chain Maintenance Video Conferencing Antivirus Managed Services Provider Word Sports Saving Time Mouse Virtual Machines Professional Services Administration Downloads Safety iPhone Licensing Robot Entertainment Vulnerabilities Data Privacy Settings Printing Wireless Data Analysis Unified Threat Management Star Wars IT Assessment Application Hosted Solution Microsoft Excel IT Maintenance Gamification Flexibility Typing Staff Value Business Intelligence Organization IBM Social Networking Legislation Shortcuts Network Congestion Ransmoware Knowledge Fileless Malware Digital Security Cameras Google Drive User Error Smart Devices Content Remote Working Wearable Technology Memory Vendors Health IT Motherboard Data Breach Point of Sale Comparison Google Play Be Proactive 5G Unified Communications Permissions Workforce Experience Directions Videos Google Docs Assessment Electronic Health Records Competition Bitcoin Network Management Wasting Time Threats Running Cable Tech Support Monitors Google Wallet Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Microchip Internet Exlporer Software as a Service Username Windows 8 Managing Costs Amazon Laptop Websites Drones eCommerce User Black Friday SSID Virtual Assistant Outsource IT Electronic Medical Records SharePoint Database Surveillance IT Technicians Virtual Machine Environment Halloween Media Writing Proxy Server Reviews IP Address Lenovo Cookies Cyber Monday Medical IT Hotspot Transportation Small Businesses Virtual Reality Tactics Development Hacks Server Management Mirgation Hypervisor Displays Scary Stories Private Cloud Fun Shopping Superfish Nanotechnology Optimization Recovery Identity Theft PowerPoint Hard Drives Deep Learning Language Employer/Employee Relationships Outsourcing Twitter Addiction Management PCI DSS Domains Chatbots Error Navigation Social Engineering Gig Economy Screen Reader Education Distributed Denial of Service Workplace Refrigeration Computing Infrastructure Teamwork Hiring/Firing Remote Computing Service Level Agreement Internet Service Provider Regulations Compliance Public Speaking Mobile Computing Identity Evernote Paperless Search Bookmark Lithium-ion battery Smart Tech Memes Tablet Co-managed IT Best Practice Alerts SQL Server Technology Care Entrepreneur Alert Download Net Neutrality Financial Data Managed IT History Buisness File Sharing Business Communications Dark Data How To Browsers Smartwatch Legal Connectivity IT IT solutions Break Fix Scams Undo Business Growth Azure Hybrid Work Notifications Upload Procurement Social Network Telework Cyber security Travel Multi-Factor Security Tech Human Resources Cortana CES Techology IoT Communitications Google Maps Dark Web Cables Alt Codes Trends Supply Chain Management Customer Resource management FinTech Regulations Downtime Unified Threat Management Google Calendar Term Google Apps

Blog Archive