Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Disney Menu Debacle Can Teach Your Business a Lesson About Access Control

The Disney Menu Debacle Can Teach Your Business a Lesson About Access Control

The Disney brand centralizes its efforts on magic and wonder, but its parks’ food is one aspect that has recently been subject to concerning developments. A former Disney employee managed to access a menu-planning app and make changes to prices, add foul language, and change menu information. Since we live in a world with food allergies, you can already see where this is going.

The Federal Bureau of Investigation has issued this statement on the matter:

“The threat actor manipulated the allergen information on menus by adding information to some allergen notifications that indicated certain menu items were safe for individuals with peanut allergies, when in fact they could be deadly to those with peanut allergies.”

Thankfully, Disney nipped the issue in the bud before the menus were distributed, and there is no evidence that customers ever saw them. Additionally, there is no indication that these events are related to a prior event in 2023 when a death occurred at a Disney-owned restaurant due to allergens.

These Changes Could Have Been Prevented

This problem stems from a simple issue with network security: someone had permission when they shouldn’t have.

The FBI has reported that the accused individual, a former Disney employee and menu production manager named Michael Schuer, used his Disney credentials to access the menu-planning app to make changes. He was also able to use his old logins to access the app developer’s server. It’s a real case of a former employee doing despicable things with old login credentials.

What gave the “hack” away was the use of the Wingdings font. This is when Disney employees caught the issue and pulled the app. Before this, though, many employee accounts had been locked because the accused used scripts to automate logins. More than a dozen accounts exceeded their allowed login attempts, which made logging in difficult.

The complete criminal complaint offers more details about this event and the inciting attacks.

Pay Attention to User Permissions and Access Logs for Suspicious Activity

It might be a bit blunt of us to say, but this entire situation could (and should) have been prevented.

When an employee leaves your business or organization, you take away their login credentials right as they walk out the door. This is a standard and accepted best practice. It’s a part of ensuring proper access control for your business.

It’s easy to overlook a user’s profile when they leave your business, but you never know what baggage they’re leaving with—baggage that might cause them to lash out in unanticipated ways. We recommend that you practice the Principle of Least Privilege, where you only grant access as needed. There’s no reason that anyone who leaves your business should retain access to data, anyway, and the fewer entry points to your system for hackers (and other potential threats), the better.

To shore up your defenses and control access to your business, give Voyage Technology a call at 800.618.9844.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Productivity Passwords Saving Money Communication Cybersecurity Smartphone Managed Service Data Backup Android Upgrade AI Data Recovery VoIP Business Management Smartphones Disaster Recovery Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Artificial Intelligence Information Facebook Miscellaneous Automation Covid-19 Gadgets Cloud Computing Holiday Training Managed Service Provider Remote Work Server Outsourced IT Compliance Employee/Employer Relationship Encryption Spam IT Support Office Windows 10 Business Continuity Data Management Government Bandwidth Blockchain Windows 10 Virtualization Wi-Fi Business Technology Vendor Data Security Apps Two-factor Authentication Mobile Office Chrome Mobile Device Management Budget Gmail Apple Networking App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Tip of the week HIPAA How To Applications WiFi BDR Computing Conferencing Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Augmented Reality Retail Storage Password Bring Your Own Device Router Managed IT Services Big Data 2FA Help Desk Operating System Risk Management Virtual Private Network Computers Healthcare Health Analytics Website Office Tips Document Management Windows 7 Microsoft 365 Firewall Solutions Scam Data loss The Internet of Things Windows 11 Social Going Green Patch Management Save Money Remote Monitoring Monitoring End of Support Vulnerability Vendor Management Excel Cybercrime Physical Security Customer Service Display Remote Workers Printer Telephone Paperless Office Infrastructure Cooperation Free Resource Project Management Money Images 101 Humor Word Mobility Telephone System Multi-Factor Authentication Cost Management Maintenance Antivirus Sports Mouse Employees Safety Administration Integration Modem User Tip Processor Mobile Security Holidays Robot Data Storage Settings Wireless Smart Technology Supply Chain Printing Video Conferencing Content Filtering IT Management Customer Relationship Management Managed Services Provider YouTube Meetings Virtual Machines Professional Services VPN Saving Time Cryptocurrency Hacking Managed IT Service Presentation Computer Repair Downloads Virtual Desktop iPhone Data storage LiFi Wireless Technology Licensing Vulnerabilities Entertainment Outlook Data Privacy Machine Learning Star Wars IT Assessment Hard Drives Writing Microsoft Excel IT Maintenance Lenovo Data Analysis Gamification Flexibility Domains Virtual Reality Staff Value Business Intelligence Legislation Shortcuts Hacks Server Management Organization Scary Stories Private Cloud Social Networking Identity Theft Smart Devices Refrigeration Fun Ransmoware Superfish Fileless Malware Digital Security Cameras Deep Learning Content Remote Working Public Speaking Twitter Wearable Technology Memory Vendors Comparison Google Play Be Proactive Health IT Lithium-ion battery Error Motherboard Data Breach Education Assessment Electronic Health Records Social Engineering Permissions Workforce Entrepreneur Directions Videos Remote Computing Wasting Time Threats Specifications Security Cameras Workplace Strategies Mobile Computing Trend Micro Microchip Tablet Internet Exlporer Software as a Service Undo Search Fraud Meta Best Practice Username Alert Managing Costs Amazon eCommerce Dark Data Black Friday SSID Managed IT Buisness File Sharing IT solutions Database Surveillance How To Virtual Assistant Outsource IT Legal Media Business Growth Notifications IT Technicians Virtual Machine Environment Cookies Application Cyber Monday Medical IT Proxy Server Reviews Travel Techology Google Maps Tactics Development Cortana Hotspot Transportation Small Businesses Alt Codes IBM Mirgation Hypervisor Displays Downtime Unified Threat Management Nanotechnology Optimization PowerPoint Shopping Unified Threat Management Hosted Solution Addiction Language Employer/Employee Relationships Outsourcing Navigation Typing Management PCI DSS Chatbots Screen Reader Network Congestion Distributed Denial of Service Workplace Gig Economy Google Drive User Error Service Level Agreement Internet Service Provider Competition Knowledge Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Regulations Compliance Identity Point of Sale Smart Tech Memes 5G Co-managed IT Bookmark Google Docs Unified Communications Download Net Neutrality Experience Alerts SQL Server Technology Care Business Communications Bitcoin Network Management Financial Data Running Cable Tech Support History User Connectivity IT Monitors Break Fix Scams Google Wallet Browsers Smartwatch Upload Procurement Azure Hybrid Work Multi-Factor Security Tech Human Resources Windows 8 Social Network Telework IP Address Laptop Websites Cyber security IoT Communitications Dark Web Cables Drones CES SharePoint Trends Supply Chain Management Electronic Medical Records Google Calendar Term Google Apps Customer Resource management FinTech Halloween Regulations Recovery

Blog Archive