Data Breach Impact: How a Security Breach Can Destroy Your Business Reputation

Carmine J. Corridore

Carmine J. Corridore

Carmine Corridore is a seasoned professional in the I.T. industry with over 30 years of experience. He has held various positions from field tech, team lead, service manager, project manager, and Director of I.T. Currently, he serves as the Client Facing Chief Strategy Officer and President of Underdog Cyber Defense. Carmine is a Rotarian and serves on the local chamber board and several committees. Carmine believes in giving back to the community, and he accomplishes that through donations and sourcing local talent and goods. Carmine is Credentialed and Certified in Cybersecurity.

Book a 15 Minute Strategy Session

Frank thought he was doing everything right. But when his business suffered a devastating data breach, he learned the hard way that it wasn’t just his data at risk—it was his hard-earned business reputation.

Frank’s Story

Frank spent over a decade building his accounting practice from the ground up. He and his wife, Elsa, worked tirelessly to ensure each client felt they were a priority. His mission was to provide good-quality accounting and excellent customer service. 

His success was apparent. He now had 2 locations and over a dozen employees on his team. If you asked someone for a referral for a good accountant, Franks’s name was at the top of everyone’s list.

Frank thought he was doing everything correctly. He adhered to IRS guidelines, had the latest technology, processed and stored returns digitally, e-filed returns, and had no paper storage of files, which allowed his team to work efficiently regardless of which office they worked from.

 It took just one day to ruin his Business Reputation.

What Frank didn’t know, what Frank couldn’t have known, is he had hidden vulnerabilities that would soon suffer a data breach that would put his business at risk and his business reputation in jeopardy. 

It was a busy January day as the team was getting things ready to prepare dozens of tax returns. At this time of the year, everyone is multitasking. Sue Ann, the Office Manager, received an email. The email came from the practice management software vendor. It appeared urgent; it requested that Sue Ann change her login credentials due to a security issue. She clicked on the link in the email and entered her login details.

The Start of the Data Breach:

 Cybercriminals are becoming more sophisticated. They are developing new ways to trick an end user into falling for phishing scams. Security awareness training trains users to spot phishing attempts, ask questions, and help deter social engineering. 

If Sue Ann had the proper training, she may have noticed something off about the email. 

The criminals now had administrative controls over the cloud-based practice management software. Over the decade that Frank has been in business, he has seen hundreds of companies and individuals with thousands of records in their practice software. The type of information in their databases included

  • Names and Addresses
  • Social Security and EINs
  • Bank Account and Routing Numbers

It also included the firm’s banking, EIN, and credentials for submitting returns. 

The Aftermath: A Business Reputation at Risk

It was almost midway through the “tax season” when clients started to call Frank’s office about not receiving their tax refunds. Getting a few calls during the season was customary, but the volume of calls was extraordinary. Clients also reported unauthorized access to their bank accounts and identity theft incidents. At the same time, Frank noticed some odd things going on with their bank accounts. That is when he suspected a data breach! 

Incidence Response

Realizing that something was not right, Frank reached out to Underdog Cyber Defense. He explained what was happening, and we began our investigation. We determined the event’s root cause and the breach’s extent. The phishing email was not the beginning of the security breach. It turned out that the cybercriminals had been in the email system much longer than initially thought. After all, they determined that Sue Ann was the correct person to target and what software to use. How do you think they knew that?

Actual Root Cause of the Data Breach

Earlier, we mentioned that Frank had hidden vulnerabilities. Because the practice was all digital, Frank’s team could work from home.

  •  They used their home computers, which did not have adequate protection.  
  • They had weak passwords and did not use MFA for anything. 
  • Their email system did not have advanced protections. 
  • They had outdated software running on their home computers.
  • They had an IT provider that was not actively monitoring and patching vulnerabilities. 

So, sometime around August of the year prior, Mike, one of the employees, was working from. Mike checked his email and clicked on a phishing email. The email downloaded malware executable to Mike’s computer. Once the malware executed, it downloaded a keylogger and remote control software on Mike’s computer. At this point, it started reporting all the keystrokes to a control server.

Furthering the attack

The cybercriminals could access Mike’s email and review all messages going in and out. They could then “look” around how the organization was set up. They still needed the correct permissions to see all messages going in and out of the mail system. So, they ran internal phishing scams on the employees to find someone with admin access to the system.

Finally, they sent a phishing email to Frank. Once they got Frank’s credentials, they created rules and permissions, allowing them to “insert” themselves into the conversation while remaining hidden. 

They learned more about Frank’s company and where the interesting data is kept. This was where they learned of the practice management software and, through careful monitoring, that Sue Ann was the admin of that software. 

Conclusion of the Data Breach and the Aftermath

After concluding the investigation, Frank had to notify his employees, clients, and the government of his breach. Frank’s problems only began.

  • He faces fines and litigation for not having the proper cyber protection.
  • He faced a financial loss to his business due to the Incident Response, Breach Notification, and Monitoring he needed to do.
  • He faces a loss in business as he notifies his clients. 
    • They are either taking their business elsewhere.
    • They are no longer referring to Frank’s business.
    • They are telling people what happened.

Over a dozen families directly relied on Frank’s business, which is also in jeopardy. 


How protected is your business? Give us a call today 570-243-9205 or book an appointment to have a candid conversation.


author avatar
Carmine Corridore

Monroe County, Pennsylvania (PA)

Analomink – Appenzell – Arlington Heights – Arrowhead Lake – Barton Glen – Bartonsville – Blakeslee – Blakeslee Estates – Blue Mountain Pines – Bossardsville – Brainerd Center – Briar Crest Woods – Brodheadsville – Buck Hill Falls – Camelot Forest – Canadensis – Castle Garden – Castle Rock Acres – Chestnuthill Township – Coolbaugh – Coolbaugh Township – Coveville – Craigs Meadow – Crescent Lake – Cresco – Delaware Water Gap – Dotters Corners – East Stroudsburg – East Swiftwater – Easton Anglers – Echo Lake – Effort – El-Do Lake – Eldred Township – Emerald Lakes – Fernridge – Fiddletown – Forest Glen – Foxtown Hill – Frutchey – Gilbert – Gravel Place – Hamilton Square – Hamilton Township – Henryville – Indian Mountain Lake – Jackson – Jackson Township – Jonas – Kahkhout Mountain – Kellersville – Kemmererville – Kingswood Estates – Kresgeville – Kunkletown – Lake Naomi Estates – Little Summit – Locust Lakes Village – Long Pond – Lower Tannersville – Marshalls Creek – McIlhaney – McMichael – Mechanicsville – Meisertown – Merwinsburg – Middle Smithfield Township – Minisink Hills – Monroe Lake – Monroe Township – Mount Pocono – Mount Zion – Mountain Top Estates – Mountainhome – Mushroom Farms – Neola – North Water Gap – Oak Grove – Paradise Crossing – Paradise Township – Paradise Valley – Parkside – Penn Estates – Pleasant Valley Estates – Pleasant View Lake – Pocono Country Place – Pocono Farms East – Pocono Heights – Pocono Lake – Pocono Laurel Lake – Pocono Manor – Pocono Pines – Pocono Playhouse – Pocono Summit – Pocono Summit Estates – Pocono Township – Polk Township – Poplar Bridge – Pocono Township – Price Township – Preserve – Red Ledge Manor Estates – Reeders – Resica Falls – Robin Hood Lakes – Ross Common – Ross Township – Rossland – Sandhill – Saylorsburg – Sciota – Scotrun – Shawnee on Delaware – Shoemakers – Sierra View – Ski Haven Lake Estates – Skytop – Smith Gap – Smithfield Township – Snow Hill Falls – Snydersville – Spruce Hill – Stillwater Lake Estates – Stillwater Lakes – Stormville – Stroud Township – Stroudsburg – Sun Valley – Swiftwater – Tannersville – Tobyhanna – Tobyhanna Township – Tunkhannock Township – Turn Villa – Wagners – Wagners Forest Park – Warnertown – Weir Lake – Wigwam Lake Estates – Wilderness Acres – Winona Lakes – Wiscasset – Wooddale.

Alburtis – Allen Junction – Alton Park – Allentown – Ancient Oaks – Arlington Knolls – Balliettsville – Best Station – Bethlehem – Bittners Corner – Breinigsville – Bungalow Park – Catasauqua – Cedarbrook County Home – Cementon – Center Valley – Centreville – Chapman – Chestnut Hill – Claussville – Coffeetown – Colesville – Coplay – Corning – Crackersport – Custer – DeSales University – Dewey Heights – Diebertsville – Dillingerville – Dorneyville – East Allentown – East Fogelsville – East Texas – Egypt – Emerald – Emmaus – Emmaus Junction – Evergreen Park – Farmington – Fogelsville – Fountain Hill – Friedens – Friedensville – Fullerton – Gauff Hill – Germansville – Greenawalds – Griesemersville – Guth – Guthsville – Haafsville – Haines – Hanover Acres – Hawktown – Helfrichsville – Hensingersville – Hillside – Hilltown – Hokendauqua – Home Park – Hosensack – Hynemansville – Ironton – Jacksonville – Jordan Valley – Juniper Circle – Kaywin – Kernsville – Krassdale – Krocksville – Kuhnsville – Lanark – Laurys Station – Leather Corner Post – Lehigh Furnace – Lehigh Gap – Limeport – Litzenberg – Lochland – Lockridge – Locust Valley – Lynnport – Lynnville – Lyon Valley – Macungie – Mechanicsville – Metamora Station – Meyersville – Mickleys – Mickleys Gardens – Midway Manor – Milford Park – Minesite – Mosserville – Mountainville – Neffs – New Smithville – New Tripoli – Newhard – Newside – Newtown – North Coplay – North Fogelsville – Notre Dame Hills – Old Zionsville – Orefield – Ormrod – Overlook Springs – Park Way Manor – Parkside Courts – Peters Store – Pleasant Corners – Powder Valley – Raberts Corner – Raubs Mills – Rextown – Rising Sun – Ritterville – River View – Rockdale – Rosemont Terrace – Ruchsville – Ruppsville – Saegersville – Saucon Valley – Saucon Valley Terrace – Scheidy – Scherersville – Schnecksville – Schneidersville – Seiberlingville – Seiple – Seipstown – Shankweilers – Shimerville – Sigmund – Slateville – Slatedale – Slatington – Spring Creek – Steinsville – Sterlingworth – Stetlersville – Stiles – Stines Corner – Summit Lawn – Switzer – Trexlertown – Trout Creek – Unionville – Vera Cruz – Vera Cruz Station – Walbert – Waldheim Park – Wanamakers – Weidasville – Weilersville – Weisenberg – Wellington – Welshtown – Wennersville – Werleys Corner – Wescosville – West Catasauqua – Westwood Heights – Wilbur – Williamstown – Woodlawn – Zionsville

more insights

Book a 15-Minute Strategy Session!

Are you ready to take the next step toward your business’s cyber security? Contact us today with any questions you might have or to request a no-hassle strategy session — we’re ready to fight for you!

New Look. New Name. New Focus.

Underdog Cyber Defense, formerly know as Underdog Computer and Network Solutions LLC., has rebranded to communicate that we are now focusing our exceptional IT and network capabilities on the vast challenges associated with Cyber Security.