Tag

Data Breach Prevention

Explores strategies and best practices for preventing data breaches in organizations of all sizes. Covers topics like access controls, encryption, network monitoring, incident response planning, and employee awareness to help reduce the risk of unauthorized data exposure.

posts

Cyber Hygiene Checklist

Cyber Hygiene Checklist: 12 Steps That Actually Work

In 2023, MGM Resorts lost an estimated $100 million after a social engineering attack that started with a single phone call to a help desk. The attackers didn't exploit a zero-day vulnerability. They didn't write exotic malware. They called IT support, impersonated an employee, and got

Carl B. Johnson Aug 20, 2019 7 min read
Cybersecurity for Executives

Cybersecurity for Executives: What the C-Suite Gets Wrong

The CEO Who Clicked the Link In 2024, the SEC charged SolarWinds' CISO with fraud and internal control failures tied to the massive breach that compromised federal agencies and Fortune 500 companies. That case sent shockwaves through every boardroom in America — not because of the technical details, but because

Carl B. Johnson Aug 20, 2019 7 min read
Board-Level Cybersecurity Awareness

Board-Level Cybersecurity Awareness: A 2026 Guide

The SEC Changed Everything — Most Boards Still Haven't Caught Up In July 2023, the SEC adopted rules requiring public companies to disclose material cybersecurity incidents within four business days and to describe their board's oversight of cyber risk annually. Since then, I've reviewed dozens

Carl B. Johnson Aug 20, 2019 7 min read
Third Party Risk Management

Third Party Vendor Cybersecurity Risk: A Practical Guide

The Breach That Didn't Start With You In 2023, the MOVEit Transfer vulnerability didn't just hit one company. It cascaded through thousands of organizations that relied on a single file-transfer vendor. Government agencies, banks, healthcare systems, and universities all found themselves exposed — not because of anything

Carl B. Johnson Aug 14, 2019 7 min read
Vendor Risk Management

Vendor Risk Management Cybersecurity: A Practical Guide

The Breach That Didn't Start With You In 2023, the MOVEit Transfer vulnerability compromised over 2,600 organizations and exposed the data of more than 77 million individuals — not because those organizations had weak security, but because a single vendor did. Companies like Ernst & Young, the BBC,

Carl B. Johnson Aug 14, 2019 7 min read
Dark Web Monitoring

Dark Web Monitoring for Businesses: A Practical Guide

In April 2024, a credentials dump containing over 26 billion records — dubbed the "Mother of All Breaches" — surfaced on dark web forums. LinkedIn, Twitter, Dropbox, Adobe, and hundreds of other platforms were represented. Within weeks, threat actors were using those credentials in automated stuffing attacks against small and

Carl B. Johnson Aug 14, 2019 7 min read
Stolen Credentials Dark Web

Stolen Credentials Dark Web: Where Your Passwords End Up

In January 2024, a massive dataset known as the "Mother of All Breaches" surfaced containing 26 billion records — credentials scraped, aggregated, and repackaged from hundreds of previous data breaches. Usernames. Passwords. Email addresses. All of it sitting on dark web forums, available to anyone willing to pay. If

Carl B. Johnson Jul 25, 2019 7 min read
Cybersecurity Terms Explained

Cybersecurity Terms Explained: A Practical Guide

During a breach investigation last year, I watched a CFO stare blankly at an incident responder who kept saying "the threat actor used credential stuffing to pivot laterally after compromising an MFA-gapped endpoint." The CFO's response: "Can someone please speak English?" That moment cost

Carl B. Johnson Jul 20, 2019 7 min read