Tag

Acceptable Use Policy Cybersecurity

Explores the intersection of acceptable use policies and cybersecurity strategy. Covers how well-crafted AUPs prevent data breaches, mitigate insider threats, define boundaries for device and network usage, and support broader organizational security frameworks.

posts

Acceptable Use Policy

Acceptable Use Policy Cybersecurity: Your First Defense

The Policy Nobody Reads Until It's Too Late In 2023, a single employee at MGM Resorts called the help desk, and a threat actor used social engineering to gain access that led to a $100 million hit on operations. One phone call. No malware exploit. No zero-day vulnerability.

Carl B. Johnson Nov 08, 2020 6 min read
Acceptable Use Policy

Acceptable Use Policy Cybersecurity: Why Yours Fails

The Policy Gathering Dust in Your Shared Drive In 2023, the city of Dallas was hit by a Royal ransomware attack that crippled municipal services for weeks. Investigators traced the initial access back to a service account and poor access controls — exactly the kind of risk a well-enforced acceptable use

Carl B. Johnson Sep 20, 2019 7 min read