Tag

Data Breach Prevention

Explores strategies and best practices for preventing data breaches in organizations of all sizes. Covers topics like access controls, encryption, network monitoring, incident response planning, and employee awareness to help reduce the risk of unauthorized data exposure.

posts

Shadow IT Risks

Shadow IT Risks: The Hidden Threat Draining Your Budget

Your Employees Already Built a Second IT Department A marketing manager signs up for an AI writing tool using her corporate email. A sales rep stores client contracts in a personal Dropbox. An engineering team spins up an AWS instance without telling anyone. None of these people are malicious. Every

Carl B. Johnson Oct 27, 2020 7 min read
Shadow IT

What Is Shadow IT? The Hidden Risk Draining Your Budget

The Breach That Started With a Spreadsheet App In 2023, a midsize healthcare company discovered that an employee had been syncing patient records to an unauthorized cloud storage service for over eight months. The service had no encryption, no access controls, and no audit logging. By the time the security

Carl B. Johnson Oct 27, 2020 7 min read
SaaS Security Best Practices

SaaS Security Best Practices to Protect Your Stack

The SaaS Sprawl Nobody's Watching In 2023, a single misconfigured Salesforce Community site exposed sensitive health records from a government agency in Vermont. The data was public for months before anyone noticed. The application wasn't hacked in any traditional sense — it was simply left open because

Carl B. Johnson Oct 27, 2020 8 min read
Mobile Device Security Policy

Mobile Device Security Policy: What Yours Is Missing

A Single Lost Phone Cost This Company $3.3 Million In 2023, the healthcare provider Yakima Valley Memorial Hospital disclosed a data breach where a security guard used login credentials on a personal mobile device to access the records of over 400 patients. That incident triggered an OCR investigation, reputational

Carl B. Johnson Oct 27, 2020 7 min read
BYOD Security Risks

BYOD Security Risks: What's Really on Your Network

The Personal Phone That Took Down a Hospital Network In 2023, a nurse at a mid-sized hospital plugged a personal phone into a workstation USB port to charge it. That phone was already compromised with malware from a sideloaded app. Within 72 hours, threat actors had lateral movement across the

Carl B. Johnson Oct 27, 2020 7 min read
Securing Employee Mobile Devices

Securing Employee Mobile Devices: A Practical Guide

In 2023, a single compromised employee phone gave threat actors a foothold inside MGM Resorts' network. The attackers used social engineering — a phone call to the help desk — and within hours, they had enough access to deploy ransomware that cost the company over $100 million. The device that started

Carl B. Johnson Oct 27, 2020 7 min read
USB Drive Security Risks

USB Drive Security Risks: Why They Still Bypass Defenses

In January 2022, the FBI issued a public warning that the cybercriminal group FIN7 had been mailing malicious USB drives — disguised as gift cards and COVID-19 guidelines — directly to U.S. companies. The drives contained ransomware. Employees plugged them in. Networks fell. That campaign wasn't some edge case

Carl B. Johnson Oct 10, 2020 6 min read
Clean Desk Policy

Clean Desk Policy Cybersecurity: Your Cheapest Defense

The Sticky Note That Cost a Hospital $1.2 Million A few years ago, I walked into a client's office for a security assessment and found a sticky note on a monitor in the billing department. It had a username, a password, and the name of their patient

Carl B. Johnson Oct 10, 2020 7 min read
Cybersecurity Culture

Cybersecurity Culture in the Workplace: A Practical Guide

The Breach That Started With a Single Slack Message In September 2022, a threat actor sent a series of social engineering messages to an Uber employee, eventually convincing them to approve a multi-factor authentication push notification. That single lapse gave the attacker access to internal systems, Slack channels, and admin

Carl B. Johnson Oct 10, 2020 7 min read