Tag

Data Breach Prevention

Explores strategies and best practices for preventing data breaches in organizations of all sizes. Covers topics like access controls, encryption, network monitoring, incident response planning, and employee awareness to help reduce the risk of unauthorized data exposure.

posts

Acceptable Use Policy

Acceptable Use Policy Cybersecurity: Your First Defense

The Policy Nobody Reads Until It's Too Late In 2023, a single employee at MGM Resorts called the help desk, and a threat actor used social engineering to gain access that led to a $100 million hit on operations. One phone call. No malware exploit. No zero-day vulnerability.

Carl B. Johnson Nov 08, 2020 6 min read
NIST Cybersecurity Framework

NIST Cybersecurity Framework: A Practical Guide for 2026

The Framework 87% of Organizations Claim to Follow — But Most Get Wrong When the Change Healthcare breach exposed the records of over 100 million people in 2024, investigators found something familiar: the organization had a cybersecurity program on paper. What it lacked was disciplined execution against a proven structure. That

Carl B. Johnson Nov 04, 2020 7 min read
CISA Cybersecurity Guidelines

CISA Cybersecurity Guidelines: What They Mean for You

In January 2024, CISA issued Emergency Directive 24-01 after a nation-state threat actor compromised Microsoft's corporate email environment. Federal agencies scrambled to audit their own Microsoft tenants. The directive wasn't theoretical — it was an emergency response to a real breach affecting the backbone of government communications.

Carl B. Johnson Nov 04, 2020 7 min read
Cybersecurity for Nonprofits

Cybersecurity for Nonprofits: A Practical Defense Guide

The Breach That Cost a Children's Charity Everything In 2023, Save the Children Federation confirmed it was hit by the BianLian ransomware group, which claimed to have stolen nearly 7 GB of data including financial records, personal information, and medical data. A global nonprofit with significant resources still

Carl B. Johnson Nov 04, 2020 7 min read
Cloud Security Best Practices

Cloud Security Best Practices That Actually Stop Breaches

A Single Checkbox Left 100 Million Records Exposed In 2019, a former cloud engineer exploited a misconfigured web application firewall at Capital One and accessed over 100 million customer records stored in AWS S3 buckets. The breach cost Capital One over $270 million in settlements and remediation. The root cause

Carl B. Johnson Nov 04, 2020 7 min read
Cloud Storage Security Risks

Cloud Storage Security Risks Your Team Is Ignoring

The Misconfigured Bucket That Exposed 540 Million Records In 2019, researchers at UpGuard discovered that Facebook app developers had stored hundreds of millions of user records in Amazon S3 buckets with public access enabled. No hacking. No zero-day exploit. Just a misconfiguration checkbox that nobody reviewed. That single oversight sits

Carl B. Johnson Oct 27, 2020 7 min read
Securing Cloud Applications

Securing Cloud Applications: A Practical Guide for 2026

The Misconfiguration That Exposed 100 Million Records In 2019, Capital One learned the hard way that a single misconfigured web application firewall in AWS could expose the personal data of over 100 million customers. The breach cost the company more than $270 million in fines and remediation. That incident wasn&

Carl B. Johnson Oct 27, 2020 7 min read
Shadow IT Risks

Shadow IT Risks: The Hidden Threat Draining Your Budget

Your Employees Already Built a Second IT Department A marketing manager signs up for an AI writing tool using her corporate email. A sales rep stores client contracts in a personal Dropbox. An engineering team spins up an AWS instance without telling anyone. None of these people are malicious. Every

Carl B. Johnson Oct 27, 2020 7 min read
Shadow IT

What Is Shadow IT? The Hidden Risk Draining Your Budget

The Breach That Started With a Spreadsheet App In 2023, a midsize healthcare company discovered that an employee had been syncing patient records to an unauthorized cloud storage service for over eight months. The service had no encryption, no access controls, and no audit logging. By the time the security

Carl B. Johnson Oct 27, 2020 7 min read