Tag

Data Breach Prevention

Explores strategies and best practices for preventing data breaches in organizations of all sizes. Covers topics like access controls, encryption, network monitoring, incident response planning, and employee awareness to help reduce the risk of unauthorized data exposure.

posts

Securing Cloud Applications

Securing Cloud Applications: A Practical Guide for 2026

The Misconfiguration That Exposed 100 Million Records In 2019, a former Amazon Web Services employee exploited a misconfigured web application firewall to breach Capital One's cloud infrastructure. The result: over 100 million customer records exposed, a $190 million class-action settlement, and an $80 million fine from the OCC.

Carl B. Johnson Sep 10, 2019 7 min read
Shadow IT Risks

Shadow IT Risks: The Hidden Threat Draining Your Budget

One Unapproved App Cost a Hospital Network $3 Million In 2023, a regional hospital system discovered that a department had been using an unapproved file-sharing tool to exchange patient records for over a year. The tool had no encryption, no access controls, and no audit trail. When an attacker exploited

Carl B. Johnson Sep 10, 2019 8 min read
Shadow IT

What Is Shadow IT? The Hidden Risk You Can't Ignore

Your Employees Already Built a Second IT Department In 2023, a Gartner survey found that 41% of employees acquired, modified, or created technology outside of IT's visibility. By now, that number has only grown. If you're asking what is shadow IT, the short answer is this:

Carl B. Johnson Sep 08, 2019 7 min read
Clean Desk Policy

Clean Desk Policy Cybersecurity: Why It Still Matters

The Unlocked Filing Cabinet That Cost a Hospital $3 Million In 2019, the Office for Civil Rights fined Bayfront Health St. Petersburg $85,000 for a breach involving paper records left in an unsecured location. That was a small settlement. I've seen organizations lose far more when a

Carl B. Johnson Sep 01, 2019 7 min read
Cybersecurity Culture

Cybersecurity Culture in the Workplace: A Practical Guide

The Breach That Started With a Single Slack Message In September 2022, a threat actor sent a social engineering message to an Uber employee, pretending to be IT support. The employee handed over credentials. Within hours, the attacker had access to internal systems, the company's HackerOne vulnerability reports,

Carl B. Johnson Sep 01, 2019 7 min read
Cyber Hygiene

Cyber Hygiene Definition: What It Really Means in 2026

A Preventable Breach That Started With One Reused Password In 2024, the breach at Change Healthcare disrupted pharmacy operations across the United States for weeks. The root cause? A compromised credential on a system that lacked multi-factor authentication. That single gap — a basic cyber hygiene failure — led to one of

Carl B. Johnson Aug 20, 2019 6 min read
Cyber Hygiene

What Is Cyber Hygiene? The Daily Habits That Stop Breaches

A Stolen Password, a $4.88 Million Problem In 2024, IBM's Cost of a Data Breach Report pegged the global average breach cost at $4.88 million — the highest figure ever recorded. The root cause in most of those incidents wasn't a sophisticated zero-day exploit. It

Carl B. Johnson Aug 20, 2019 7 min read