Tag

Credential Theft Prevention

Addresses the tactics attackers use to steal login credentials and the countermeasures organizations can deploy. Topics include multi-factor authentication, credential monitoring, dark web surveillance, secure authentication protocols, and employee awareness training.

posts

Multi-Factor Authentication

Multi-Factor Authentication Setup: A Practical Guide

In 2023, MGM Resorts lost an estimated $100 million after a threat actor bypassed their security by social engineering the help desk into resetting an employee's credentials — credentials that lacked properly enforced multi-factor authentication at critical junctures. That single phone call cascaded into one of the most expensive

Carl B. Johnson Nov 02, 2019 8 min read
Multi-Factor Authentication

MFA vs Two-Factor Authentication: What Actually Matters

In September 2023, MGM Resorts lost roughly $100 million after a threat actor called Scattered Spider bypassed the company's authentication controls using a simple social engineering phone call. The attackers didn't crack a password vault or exploit a zero-day. They convinced a help desk employee to

Carl B. Johnson Nov 02, 2019 6 min read
Strong Passwords

Strong Password Examples That Actually Stop Hackers

The 59-Second Crack That Cost a Hospital Chain Everything In 2023, CommonSpirit Health disclosed a ransomware attack that disrupted operations across more than 140 hospitals. Post-incident analysis pointed to compromised credentials as a key factor. The password in question wasn't "password123" — it was a seemingly reasonable

Carl B. Johnson Nov 02, 2019 7 min read
Insider Threat Awareness

Insider Threat Awareness: What Most Companies Miss

The Threat Already Inside Your Building In January 2023, the FBI arrested a former GE Aviation employee who had spent years downloading thousands of proprietary turbine technology files and transferring trade secrets to a competing business in China. The insider had legitimate access. He passed every background check. He sat

Carl B. Johnson Oct 01, 2019 6 min read
VPN Best Practices

VPN Best Practices: What Actually Protects You in 2026

The Ivanti Breach Changed How I Think About VPNs In early 2024, CISA issued an emergency directive after threat actors exploited vulnerabilities in Ivanti Connect Secure VPN appliances to infiltrate multiple federal agencies. The attackers didn't brute-force passwords. They didn't trick users with phishing emails. They

Carl B. Johnson Sep 28, 2019 7 min read
Phish

How to Phish Your Own Employees Before Hackers Do

A Single Phish Email Cost One Company $37 Million In 2024, Orion SA disclosed that a single employee fell for a business email compromise scheme and wired approximately $60 million to a threat actor's accounts. The company recovered some funds, but the net loss still exceeded $37 million.

Carl B. Johnson Jul 04, 2019 6 min read
Security for System Administrators

Security for System Administrators: A 2026 Field Guide

The Breach That Started With a Single Unpatched Server In 2023, the MOVEit Transfer vulnerability (CVE-2023-34362) let the Cl0p ransomware gang compromise thousands of organizations worldwide — including federal agencies and major financial institutions. The root cause wasn't exotic malware or a sophisticated zero-day chain. It was a known

Carl B. Johnson Feb 25, 2019 7 min read
Web Security Best Practices

Web Security Best Practices That Actually Stop Breaches

The MOVEit Breach Started With One Overlooked Web Flaw In 2023, a single SQL injection vulnerability in the MOVEit Transfer web application led to one of the largest mass exploitation events in history. Over 2,600 organizations were compromised. Sensitive data from government agencies, banks, and healthcare providers was exfiltrated

Carl B. Johnson Feb 22, 2019 8 min read
Phishing Psychology

How Phishing Emails Work: The Psychology Behind the Click

Updated for 2026 A Single Email Cost This Company $121 Million In 2019, Rubin Schron's Cammeby's International Group wired $121 million to a fraudulent account after receiving what appeared to be a routine email from their attorney. The email was a phish. No malware. No zero-day

Carl B. Johnson Feb 02, 2019 7 min read