Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Disney Menu Debacle Can Teach Your Business a Lesson About Access Control

The Disney Menu Debacle Can Teach Your Business a Lesson About Access Control

The Disney brand centralizes its efforts on magic and wonder, but its parks’ food is one aspect that has recently been subject to concerning developments. A former Disney employee managed to access a menu-planning app and make changes to prices, add foul language, and change menu information. Since we live in a world with food allergies, you can already see where this is going.

The Federal Bureau of Investigation has issued this statement on the matter:

“The threat actor manipulated the allergen information on menus by adding information to some allergen notifications that indicated certain menu items were safe for individuals with peanut allergies, when in fact they could be deadly to those with peanut allergies.”

Thankfully, Disney nipped the issue in the bud before the menus were distributed, and there is no evidence that customers ever saw them. Additionally, there is no indication that these events are related to a prior event in 2023 when a death occurred at a Disney-owned restaurant due to allergens.

These Changes Could Have Been Prevented

This problem stems from a simple issue with network security: someone had permission when they shouldn’t have.

The FBI has reported that the accused individual, a former Disney employee and menu production manager named Michael Schuer, used his Disney credentials to access the menu-planning app to make changes. He was also able to use his old logins to access the app developer’s server. It’s a real case of a former employee doing despicable things with old login credentials.

What gave the “hack” away was the use of the Wingdings font. This is when Disney employees caught the issue and pulled the app. Before this, though, many employee accounts had been locked because the accused used scripts to automate logins. More than a dozen accounts exceeded their allowed login attempts, which made logging in difficult.

The complete criminal complaint offers more details about this event and the inciting attacks.

Pay Attention to User Permissions and Access Logs for Suspicious Activity

It might be a bit blunt of us to say, but this entire situation could (and should) have been prevented.

When an employee leaves your business or organization, you take away their login credentials right as they walk out the door. This is a standard and accepted best practice. It’s a part of ensuring proper access control for your business.

It’s easy to overlook a user’s profile when they leave your business, but you never know what baggage they’re leaving with—baggage that might cause them to lash out in unanticipated ways. We recommend that you practice the Principle of Least Privilege, where you only grant access as needed. There’s no reason that anyone who leaves your business should retain access to data, anyway, and the fewer entry points to your system for hackers (and other potential threats), the better.

To shore up your defenses and control access to your business, give Voyage Technology a call at 800.618.9844.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Passwords Quick Tips Cybersecurity Saving Money Communication Data Backup Smartphone Managed Service Android Upgrade VoIP Business Management Smartphones Data Recovery AI Mobile Devices communications Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Facebook Automation Miscellaneous Artificial Intelligence Information Gadgets Cloud Computing Covid-19 Holiday Training Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Spam IT Support Employee/Employer Relationship Windows 10 Office Government Business Continuity Data Management Virtualization Business Technology Wi-Fi Blockchain Bandwidth Windows 10 Apps Two-factor Authentication Data Security Mobile Office Vendor App Tip of the week Managed Services Employer-Employee Relationship Voice over Internet Protocol Networking Chrome Mobile Device Management Budget BYOD Gmail Apple Access Control WiFi Conferencing Computing Information Technology Hacker How To BDR Avoiding Downtime Office 365 Marketing HIPAA Applications Health 2FA Help Desk Big Data Operating System Retail Healthcare Risk Management Computers Managed IT Services Analytics Website Office Tips Augmented Reality Storage Router Password Bring Your Own Device Virtual Private Network Windows 11 The Internet of Things Paperless Office Infrastructure Monitoring Social Going Green Excel Document Management Cybercrime Remote Workers Telephone Scam Customer Service Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Firewall Physical Security Display Printer Holidays Data Storage Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Saving Time Settings Printing Wireless Content Filtering Managed IT Service Customer Relationship Management YouTube Maintenance Downloads Antivirus iPhone Cryptocurrency Hacking Licensing Presentation Vulnerabilities Entertainment Virtual Desktop Data Privacy Data storage LiFi Wireless Technology Images 101 Robot Mobility Outlook Telephone System Multi-Factor Authentication Cost Management Money Humor Word IT Management VPN Employees Meetings Sports Integration Mouse User Tip Modem Safety Computer Repair Mobile Security Processor Administration Monitors Cyber Monday Medical IT Best Practice Proxy Server Reviews Cookies Buisness Tactics Development Hotspot Transportation Small Businesses Legal IT solutions Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Business Growth Shopping SharePoint Addiction Application Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Management PCI DSS Cortana Chatbots Screen Reader Writing Distributed Denial of Service Workplace Alt Codes Lenovo Gig Economy IBM Downtime Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Hosted Solution Server Management Regulations Compliance Private Cloud Identity Identity Theft Smart Tech Memes Co-managed IT Typing Superfish Bookmark Download Net Neutrality Twitter Alerts SQL Server Technology Care Business Communications Google Drive Financial Data Competition Knowledge Error History Connectivity IT Social Engineering Break Fix Scams Browsers Smartwatch Upload Procurement 5G Remote Computing Azure Hybrid Work Multi-Factor Security Tech Human Resources Google Docs Unified Communications Social Network Telework Experience Cyber security Running Cable Tablet IoT Communitications User Dark Web Cables Bitcoin CES Google Wallet Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech File Sharing Regulations Laptop Star Wars IT Assessment How To Microsoft Excel IT Maintenance Windows 8 Data Analysis IP Address Drones Gamification Flexibility Notifications Staff Value Business Intelligence Legislation Shortcuts Organization Travel Social Networking Halloween Google Maps Smart Devices Recovery Ransmoware Techology Fileless Malware Digital Security Cameras Content Remote Working Hard Drives Wearable Technology Memory Vendors Comparison Google Play Be Proactive Health IT Domains Unified Threat Management Motherboard Data Breach Scary Stories Assessment Electronic Health Records Permissions Workforce Hacks Unified Threat Management Directions Videos Refrigeration Fun Wasting Time Threats Network Congestion Specifications Security Cameras Workplace Strategies Deep Learning Public Speaking Trend Micro Internet Exlporer Software as a Service Fraud Meta User Error Microchip Lithium-ion battery Education Username Managing Costs Amazon Entrepreneur Black Friday SSID Point of Sale eCommerce Database Surveillance Virtual Assistant Outsource IT Mobile Computing Network Management Undo Search Tech Support IT Technicians Virtual Machine Environment Media

Blog Archive