Tag

Data Breach Prevention

Explores strategies and best practices for preventing data breaches in organizations of all sizes. Covers topics like access controls, encryption, network monitoring, incident response planning, and employee awareness to help reduce the risk of unauthorized data exposure.

posts

Cybersecurity Training

How to Train Employees on Cybersecurity in 2026

The Breach That Started With a Single Click In 2023, MGM Resorts lost an estimated $100 million after a threat actor called Scattered Spider social-engineered an IT help desk employee with a phone call that lasted about ten minutes. The attacker didn't exploit a zero-day vulnerability. They didn&

Carl B. Johnson Apr 11, 2026 5 min read
Password Manager

Why Use a Password Manager: The Case Is Overwhelming

The Breach That Started With "Company123!" In 2024, the credential stuffing attack against Roku compromised over 576,000 accounts. The attackers didn't exploit some exotic zero-day vulnerability. They used passwords stolen from other breaches and tried them against Roku accounts — because people reuse passwords everywhere. That

Carl B. Johnson Apr 10, 2026 6 min read
Password Manager

Why Use a Password Manager: Stop Reusing Passwords

The Breach That Started With One Reused Password In 2022, a single employee at LastPass reused credentials across personal and work accounts. A threat actor exploited that overlap, eventually compromising encrypted password vaults for millions of users. The irony — a password management company breached because of poor password hygiene — should

Carl B. Johnson Apr 08, 2026 5 min read
Third Party Risk

Third Party Vendor Cybersecurity Risk: A 2026 Guide

When Target lost 40 million credit card records in 2013, the attackers didn't breach Target directly. They compromised an HVAC vendor. Over a decade later, the playbook hasn't changed — it's just gotten more devastating. Third party vendor cybersecurity risk is now the single fastest-growing

Carl B. Johnson Apr 07, 2026 6 min read
Social Engineering Examples

Social Engineering Examples: 7 Real Attacks That Worked

In September 2022, a teenager allegedly convinced an Uber employee to hand over access credentials through a simple text message. No zero-day exploit. No sophisticated malware. Just a convincing story and a target who didn't verify the request. That single social engineering attack gave the threat actor access

Carl B. Johnson Apr 06, 2026 5 min read
Social Engineering Examples

Social Engineering Examples That Fool Even Experts

The Phone Call That Cost MGM Resorts $100 Million In September 2023, a threat actor called MGM Resorts' IT help desk, impersonated an employee they found on LinkedIn, and convinced the technician to reset credentials. That single phone call triggered a ransomware attack that disrupted operations across Las Vegas

Carl B. Johnson Apr 04, 2026 5 min read
Cybersecurity Awareness Training

Cybersecurity Awareness Training: Why It Works in 2026

In 2024, MGM Resorts lost an estimated $100 million after a social engineering attack that started with a single phone call to a help desk employee. The threat actor impersonated an employee, convinced IT staff to reset credentials, and within hours had access to critical systems. One conversation. No malware.

Carl B. Johnson Apr 03, 2026 5 min read
Cyber Hygiene

What Is Cyber Hygiene? The Daily Habits That Stop Breaches

A Single Unpatched Laptop Cost One Hospital $3 Million In 2023, the U.S. Department of Health and Human Services settled with a healthcare provider after a ransomware attack that started on one employee's unpatched workstation. The machine hadn't been updated in over 90 days. That

Carl B. Johnson Apr 02, 2026 5 min read