Tag

Cybersecurity Awareness

Articles on cybersecurity awareness cover the foundational knowledge individuals and organizations need to recognize and respond to digital threats. Topics include safe browsing habits, password hygiene, social engineering tactics, and building a security-first culture across teams.

posts

Password Manager

Why Use a Password Manager: The Case Is Overwhelming

The Breach That Started With "Company123!" In 2024, the credential stuffing attack against Roku compromised over 576,000 accounts. The attackers didn't exploit some exotic zero-day vulnerability. They used passwords stolen from other breaches and tried them against Roku accounts — because people reuse passwords everywhere. That

Carl B. Johnson Apr 10, 2026 6 min read
Password Manager

Why Use a Password Manager: Stop Reusing Passwords

The Breach That Started With One Reused Password In 2022, a single employee at LastPass reused credentials across personal and work accounts. A threat actor exploited that overlap, eventually compromising encrypted password vaults for millions of users. The irony — a password management company breached because of poor password hygiene — should

Carl B. Johnson Apr 08, 2026 5 min read
Supply Chain Attack Examples

Supply Chain Attack Examples That Changed Cybersecurity

A Trusted Software Update Became the Biggest Backdoor in History In December 2020, FireEye disclosed that threat actors had compromised SolarWinds Orion — a network monitoring platform used by 33,000 organizations, including multiple U.S. federal agencies. The attackers embedded malicious code into a routine software update. Every organization that

Carl B. Johnson Apr 05, 2026 5 min read
Phishing

What Is Phishing? A Security Pro's Real-World Guide

A Single Email Cost This Company $100 Million In 2017, a Lithuanian man tricked Google and Facebook employees into wiring over $100 million to bank accounts he controlled. His weapon wasn't malware. It wasn't a zero-day exploit. It was email. He sent invoices that looked like

Carl B. Johnson Apr 05, 2026 5 min read
Trojan Horse Malware

Trojan Horse Malware: What It Really Does to You

In 2023, the FBI's Internet Crime Complaint Center received over 880,000 complaints with losses exceeding $12.5 billion — and a staggering number of those incidents started with a single file that looked perfectly legitimate. That file was trojan horse malware, disguised as an invoice, a software update,

Carl B. Johnson Apr 01, 2026 5 min read
Password Manager Benefits

Password Manager Benefits That Stop 80% of Breaches

One Reused Password Cost This Company $4.6 Billion In 2017, a single set of reused credentials let threat actors walk into Equifax's systems and expose 147 million records. The total cost exceeded $4.6 billion when you factor in the FTC settlement, lawsuits, and remediation. One password.

Carl B. Johnson Mar 29, 2026 5 min read
Phish Tour

Phish Tour: Simulate Real Attacks Before Hackers Do

One Click Cost Colonial Pipeline $4.4 Million In May 2021, a single compromised credential shut down the largest fuel pipeline in the United States. Colonial Pipeline paid a $4.4 million ransom to a threat actor group called DarkSide. The entry point wasn't some exotic zero-day exploit.

Carl B. Johnson Aug 25, 2021 7 min read
Spoofing

Spoofing Attacks: How Hackers Impersonate Trust

In July 2020, a seventeen-year-old in Florida used phone-based spoofing and social engineering to compromise internal Twitter tools, hijacking the verified accounts of Barack Obama, Elon Musk, Jeff Bezos, and Apple. The attackers impersonated IT staff during phone calls to Twitter employees, spoofing caller IDs to appear legitimate. Within hours,

Carl B. Johnson Aug 25, 2021 8 min read
Spoofing

Spoof Attacks: How Threat Actors Impersonate You

In July 2021, the FBI's Internet Crime Complaint Center reported that business email compromise — overwhelmingly powered by spoof techniques — cost victims over $1.8 billion in 2020 alone. That made it the single most financially damaging category of cybercrime they tracked. Not ransomware. Not credential theft. Spoofing-driven impersonation.

Carl B. Johnson Aug 24, 2021 8 min read
Phishing

Phishing Attacks in 2021: What Actually Works to Stop Them

36% of All Breaches Start With a Phishing Email The 2021 Verizon Data Breach Investigations Report made something painfully clear: phishing was involved in 36% of all confirmed data breaches — up from 25% the year before. That's not a trend. That's an escalation. And if your

Carl B. Johnson Aug 18, 2021 7 min read