Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Disney Menu Debacle Can Teach Your Business a Lesson About Access Control

The Disney Menu Debacle Can Teach Your Business a Lesson About Access Control

The Disney brand centralizes its efforts on magic and wonder, but its parks’ food is one aspect that has recently been subject to concerning developments. A former Disney employee managed to access a menu-planning app and make changes to prices, add foul language, and change menu information. Since we live in a world with food allergies, you can already see where this is going.

The Federal Bureau of Investigation has issued this statement on the matter:

“The threat actor manipulated the allergen information on menus by adding information to some allergen notifications that indicated certain menu items were safe for individuals with peanut allergies, when in fact they could be deadly to those with peanut allergies.”

Thankfully, Disney nipped the issue in the bud before the menus were distributed, and there is no evidence that customers ever saw them. Additionally, there is no indication that these events are related to a prior event in 2023 when a death occurred at a Disney-owned restaurant due to allergens.

These Changes Could Have Been Prevented

This problem stems from a simple issue with network security: someone had permission when they shouldn’t have.

The FBI has reported that the accused individual, a former Disney employee and menu production manager named Michael Schuer, used his Disney credentials to access the menu-planning app to make changes. He was also able to use his old logins to access the app developer’s server. It’s a real case of a former employee doing despicable things with old login credentials.

What gave the “hack” away was the use of the Wingdings font. This is when Disney employees caught the issue and pulled the app. Before this, though, many employee accounts had been locked because the accused used scripts to automate logins. More than a dozen accounts exceeded their allowed login attempts, which made logging in difficult.

The complete criminal complaint offers more details about this event and the inciting attacks.

Pay Attention to User Permissions and Access Logs for Suspicious Activity

It might be a bit blunt of us to say, but this entire situation could (and should) have been prevented.

When an employee leaves your business or organization, you take away their login credentials right as they walk out the door. This is a standard and accepted best practice. It’s a part of ensuring proper access control for your business.

It’s easy to overlook a user’s profile when they leave your business, but you never know what baggage they’re leaving with—baggage that might cause them to lash out in unanticipated ways. We recommend that you practice the Principle of Least Privilege, where you only grant access as needed. There’s no reason that anyone who leaves your business should retain access to data, anyway, and the fewer entry points to your system for hackers (and other potential threats), the better.

To shore up your defenses and control access to your business, give Voyage Technology a call at 800.618.9844.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Computer Workplace Tips Phishing Hosted Solutions IT Services Collaboration Users Mobile Device Workplace Strategy Ransomware Small Business Quick Tips Cybersecurity Microsoft Passwords Communication Data Backup Saving Money Smartphone Backup Android Managed Service Business Management VoIP Smartphones Mobile Devices communications Upgrade Disaster Recovery Browser Data Recovery Social Media Microsoft Office Windows Managed IT Services Current Events Productivity Network Remote Tech Term Internet of Things Facebook AI Automation Artificial Intelligence Gadgets Covid-19 Cloud Computing Holiday Miscellaneous Remote Work Server Managed Service Provider Outsourced IT Information Compliance Encryption Spam Employee/Employer Relationship Training Office Windows 10 Government Data Management Business Continuity Virtualization Blockchain Wi-Fi Business Technology IT Support Windows 10 Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Apple Networking App Employer-Employee Relationship BYOD Managed Services Mobile Device Management Voice over Internet Protocol Chrome Gmail Budget WiFi How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Tip of the week Conferencing Bring Your Own Device Big Data Managed IT Services Operating System Computers Router Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality Healthcare Retail Storage Password Free Resource The Internet of Things Scam Project Management Data loss Windows 7 Social Cooperation Microsoft 365 Going Green Patch Management Solutions Save Money Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Cybercrime Physical Security Windows 11 Display Printer 2FA Paperless Office Excel Infrastructure Monitoring Remote Workers Firewall Document Management Telephone Data Privacy Mouse Licensing Images 101 Entertainment Administration Multi-Factor Authentication Mobility Telephone System Robot Customer Relationship Management Cost Management Settings Employees Printing Wireless Integration Content Filtering Hacking IT Management Presentation VPN YouTube Meetings Holidays Cryptocurrency Wireless Technology User Tip Modem Processor Computer Repair Mobile Security Data Storage Supply Chain Virtual Desktop Video Conferencing Managed Services Provider Data storage LiFi Virtual Machines Professional Services Word Smart Technology Outlook Machine Learning Money Saving Time Humor iPhone Managed IT Service Safety Maintenance Sports Downloads Vulnerabilities Antivirus Browsers Education Connectivity Social Engineering Break Fix Supply Chain Management FinTech Term Google Apps Upload Remote Computing Multi-Factor Security IT Assessment IT Maintenance Mobile Computing Social Network Value Business Intelligence Tablet IoT Search Dark Web Flexibility Organization Shortcuts Application Best Practice Trends Alert Managed IT Customer Resource management Buisness File Sharing Regulations Digital Security Cameras Dark Data Google Calendar Smart Devices Ransmoware Memory Vendors IBM Legal Data Analysis IT solutions Star Wars How To Microsoft Excel Remote Working Notifications Staff Data Breach Google Play Be Proactive Business Growth Gamification Travel Social Networking Videos Legislation Electronic Health Records Workforce Wasting Time Threats Techology Fileless Malware Google Maps Cortana Wearable Technology Trend Micro Security Cameras Workplace Strategies Alt Codes Content Competition Health IT Downtime Unified Threat Management Motherboard Comparison Software as a Service Meta Managing Costs Amazon Unified Threat Management Directions Hosted Solution Assessment Permissions eCommerce SSID Typing Network Congestion Specifications Surveillance Virtual Assistant Outsource IT Virtual Machine Environment Google Drive User Error Microchip Media User Internet Exlporer Knowledge Fraud Reviews Medical IT Username Point of Sale 5G Black Friday Development Transportation Small Businesses Hypervisor Displays IP Address Google Docs Unified Communications Database Experience Running Cable Tech Support IT Technicians Shopping Optimization PowerPoint Bitcoin Network Management Google Wallet Proxy Server Cookies Monitors Cyber Monday Employer/Employee Relationships Outsourcing Navigation Recovery Tactics Hotspot PCI DSS Laptop Websites Mirgation Gig Economy Workplace Hard Drives Windows 8 Domains Drones Nanotechnology Internet Service Provider Teamwork Hiring/Firing SharePoint Evernote Paperless Addiction Electronic Medical Records Language Regulations Compliance Halloween Chatbots Memes Co-managed IT Refrigeration Management Public Speaking Lenovo Screen Reader Writing Distributed Denial of Service Net Neutrality SQL Server Technology Care Financial Data History Lithium-ion battery Business Communications Service Level Agreement Virtual Reality Computing Infrastructure Entrepreneur Scary Stories Private Cloud Identity Smartwatch IT Scams Hacks Server Management Azure Hybrid Work Superfish Bookmark Identity Theft Smart Tech Fun Procurement Telework Cyber security Tech Human Resources Deep Learning Download Twitter Alerts Error CES Communitications Cables Undo

Blog Archive