
THREAT FACTOR | EPISODE 3
The Rush
to Publish
An urgent content push leads to unexpected consequences. Did I unknowingly prompt an online disaster?
LIKES:
Data-driven decisions, pushing the envelope creatively, being ahead of trends
DISLIKES:
Outdated marketing, lack of innovation, poor communication
JOB RESPONSIBILITIES:
• Overall company marketing
strategy
• Watching and analyzing
marketing trends
• Digital and traditional marketing
campaign management
• Marketing team management
and cross-team coordination
My Excitement Got the Best of Me
The day before we discovered the breach, I was on the phone with Jeremy, a store associate at our Dublin location in Ohio. He had filmed a video featuring our new DSLR camera that morning and was trying to send it to me to get up on our social channels. Unfortunately, the file was too large to email—and I could tell Jeremy was too nervous to post it himself for fear of possibly making a mistake.

In my usual “quick fix” mode, I suggested he use a free video compressor I found online to send me the video. I emailed him the link, and he opened it while still on the phone with me. Shortly after trying to compress the video, Jeremy received an antivirus alert about malware on his computer and informed me that the website seemed suspicious. I knew I needed to get the video live ASAP before interest died down, so I told him to go ahead and ignore it. That probably was not the best call in hindsight.
The USB Drive Incident
Fast-forward to the next day at HQ. I decided to take the Muni in to work instead of walking. It was an unusually hot day in San Francisco, and I was wearing the new blazer I’d just bought the day before. When I got to the office, I was feeling pretty uninspired and irritated by the inconsiderate people I had to deal with on my commute. I decided to clean out my desk before diving into my tasks for the day. As I dug through my drawers, I found an old USB drive I thought I’d picked up from a PR meeting. Curious and optimistic, I plugged it into my computer, hoping to find some marketing gold.
Instead, I watched as my screen automatically opened a browser window, typed out a URL I had never been to, and took me to a strange landing page. It creeped me out, so I quickly unplugged the USB and exited out of the browser window. Because I was able to unplug it so quickly, I didn’t think anything of it at the time. However, now that I’m recounting that incident, I’m wondering if that could have been what allowed the threat actor to get in. Ugh, I hope it wasn’t me.
