The Alert | ĢTV Signals Trouble
Dave Bloom, founder of Trumbull Tech—FlexKeeper’s trusted MSP—was driving his kids to swim practice when he received an alert from ĢTV. Thanks to ĢTV Managed Identity Threat Detection and Response (formerly MDR for Microsoft 365), Bloom and his team could
rely on constant, proactive monitoring to ensure their clients’ systems stayed secure. “ITDR lets us protect our clients at scale," Bloom explains. "Our engineers can’t be everywhere at once, but with ITDR actively monitoring tenants, we’re confident our clients maintain a strong and efficient security baseline.”
The alert flagged a suspicious VPN login from Toronto, an anomaly that immediately raised red flags. While Plett might be a big hockey fan, Bloom knew she wasn’t anywhere near Canada. This was an intruder in her network, poking around where they didn’t belong. Unfortunately for
them, they had just run into a brick wall.
Taking Action | Locking Down the Threat
Bloom wouldn’t return to his home until later in the evening, but by the time he began his investigation, ĢTV’s automated response had already handled the situation. It promptly shut down the intruder, rotated passwords, and locked the threat out of the system. “Without ĢTV Managed ITDR, we wouldn’t have had visibility into the threat or the unauthorized access, and the threat actor could’ve maintained access to the data and tenant indefinitely,” he says.
How It All Began | It’s Hard to Catch a Phish When You’re Fatigued
As the dust settled, Plett couldn’t shake the nagging sense of how it all started. It began innocently enough when a seemingly harmless DocuSign email hit her inbox earlier that day. Having spent years in IT, she knew the drill. Just because it looked legit, didn’t mean it was. Fatigue can cloud even the sharpest judgment, so in a momentary lapse, she clicked. In that instant, she unwittingly provided her personal credentials. “I always preach to my team, ‘Don’t click on that!’ And then, guess what I did?” she recalls with a mix of humor and disbelief.
Only in retrospect did Plett realize she had been caught in a phishing attack. Hackers had exploited her one moment of vulnerability to gain access to FlexKeeper’s most sensitive data.