Tag

Cybersecurity Best Practices

Provides actionable strategies and proven frameworks for strengthening your organization's security posture. Articles cover risk assessment, access controls, incident response planning, network segmentation, encryption standards, and policy development for businesses of all sizes.

posts

Cyber Incident Response Steps

Cyber Incident Response Steps That Actually Work

When SolarWinds disclosed in December 2020 that threat actors had compromised their Orion software update mechanism — affecting up to 18,000 organizations including multiple U.S. government agencies — it became the most significant supply chain attack in modern history. The organizations that responded effectively didn't improvise. They followed

Carl B. Johnson Dec 20, 2020 7 min read
Insider Threat Awareness

Insider Threat Awareness: What Your Team Isn't Telling You

In July 2020, a 17-year-old in Florida convinced a Twitter employee to hand over internal credentials. Within hours, threat actors had hijacked 130 high-profile accounts — including those of Barack Obama, Elon Musk, and Apple — and used them to run a Bitcoin scam. The breach didn't start with a

Carl B. Johnson Dec 20, 2020 7 min read
Insider Threats

How to Prevent Insider Threats: A Practical Guide

In July 2020, a 17-year-old in Florida convinced a Twitter employee to hand over internal tool credentials. Within hours, threat actors had hijacked high-profile accounts — Barack Obama, Elon Musk, Apple — and ran a Bitcoin scam that netted over $100,000. The breach didn't start with a zero-day exploit

Carl B. Johnson Dec 20, 2020 7 min read
CISA Cybersecurity Guidelines

CISA Cybersecurity Guidelines: What They Mean for You

In January 2024, CISA issued Emergency Directive 24-01 after a nation-state threat actor compromised Microsoft's corporate email environment. Federal agencies scrambled to audit their own Microsoft tenants. The directive wasn't theoretical — it was an emergency response to a real breach affecting the backbone of government communications.

Carl B. Johnson Nov 04, 2020 7 min read
Cyber Hygiene

Cyber Hygiene Definition: What It Really Means in 2026

A Single Reused Password Cost One Company Everything In 2021, the Colonial Pipeline ransomware attack shut down fuel distribution across the U.S. East Coast. The entry point? A single compromised password on a legacy VPN account that lacked multi-factor authentication. That's not a sophisticated nation-state exploit. That&

Carl B. Johnson Sep 07, 2020 6 min read
Cyber Hygiene Checklist

Cyber Hygiene Checklist: 12 Steps That Actually Work

In 2023, MGM Resorts lost an estimated $100 million after a threat actor called Scattered Spider social-engineered an IT help desk with a ten-minute phone call. No zero-day exploit. No nation-state tooling. Just sloppy basics. That breach — and hundreds like it every year — could have been prevented with a disciplined

Carl B. Johnson Sep 07, 2020 7 min read
Phishing Prevention

How to Avoid Phishing Attacks: A Practical Guide

The Email That Cost One Company $37 Million In 2024, a finance employee at a multinational firm joined a video call with what appeared to be the company's CFO and several colleagues. Every face on that call was a deepfake. The employee authorized $25.6 million in transfers

Carl B. Johnson Jan 19, 2020 7 min read
Social Engineering

How to Spot Social Engineering Before It Costs You

In January 2024, a finance employee at Arup — the engineering firm behind the Sydney Opera House — joined a video call with what appeared to be the company's CFO and several colleagues. Every face on the screen was a deepfake. By the time anyone realized what happened, the employee

Carl B. Johnson Jan 09, 2020 7 min read
Cybersecurity Best Practices

Cybersecurity Best Practices for Employees in 2026

One Click Cost This Company $36 Million In 2023, MGM Resorts lost an estimated $100 million after a threat actor socially engineered the company's help desk with a single phone call. The attacker impersonated an employee, convinced an IT worker to reset credentials, and from there pivoted through

Carl B. Johnson Dec 14, 2019 7 min read