Tag

Data Breach Prevention

Explores strategies and best practices for preventing data breaches in organizations of all sizes. Covers topics like access controls, encryption, network monitoring, incident response planning, and employee awareness to help reduce the risk of unauthorized data exposure.

posts

Strong Passwords

Strong Password Examples That Actually Stop Hackers

The 59-Second Crack That Cost a Hospital Chain Everything In 2023, CommonSpirit Health disclosed a ransomware attack that disrupted operations across more than 140 hospitals. Post-incident analysis pointed to compromised credentials as a key factor. The password in question wasn't "password123" — it was a seemingly reasonable

Carl B. Johnson Nov 02, 2019 7 min read
Insider Threat Awareness

Insider Threat Awareness: What Most Companies Miss

The Threat Already Inside Your Building In January 2023, the FBI arrested a former GE Aviation employee who had spent years downloading thousands of proprietary turbine technology files and transferring trade secrets to a competing business in China. The insider had legitimate access. He passed every background check. He sat

Carl B. Johnson Oct 01, 2019 6 min read
Insider Threat Examples

Insider Threat Examples: Real Breaches That Cost Millions

The Threat Already Inside Your Building In 2022, a former employee at Cash App's parent company, Block, downloaded reports containing the personal information of 8.2 million customers — months after leaving the company. Block disclosed the breach in an SEC filing, and lawsuits followed. The attacker didn'

Carl B. Johnson Oct 01, 2019 7 min read
Insider Threats

How to Prevent Insider Threats Before They Cost Millions

In 2022, a former employee at Cash App's parent company, Block Inc., downloaded reports containing the personal information of over 8 million customers — months after they'd left the company. The access was never revoked. No alarm was triggered. The breach wasn't discovered until the

Carl B. Johnson Oct 01, 2019 7 min read
Insider Threats

Malicious Insider vs Negligent Insider: Real Threat Guide

One Employee Stole Data for Profit. The Other Just Clicked the Wrong Link. In 2022, a former employee of a major healthcare organization was sentenced to federal prison for stealing patient records and selling them. That same year, the Verizon Data Breach Investigations Report found that 82% of breaches involved

Carl B. Johnson Oct 01, 2019 7 min read
Insider Threat Indicators

Insider Threat Indicators: 9 Red Flags You Can't Ignore

The Breach That Came From the Inside In 2022, a former Twitter employee was convicted of spying on behalf of Saudi Arabia, accessing the personal data of dissidents using nothing more than his legitimate credentials. No malware. No phishing email. Just an insider with access and motive. That case made

Carl B. Johnson Oct 01, 2019 7 min read
Zero Trust Security Model

Zero Trust Security Model: A Practical Guide for 2026

The Breach That Proved Perimeters Don't Work In 2020, the SolarWinds breach gave roughly 18,000 organizations a brutal lesson: once a threat actor gets past your perimeter, they can move laterally for months without detection. Government agencies, Fortune 500 companies, and critical infrastructure providers all had firewalls.

Carl B. Johnson Oct 01, 2019 7 min read
Zero Trust Network Access

Zero Trust Network Access: A Practical Guide for 2026

The Breach That Proved Perimeter Security Was Dead In early 2024, a threat actor gained access to Microsoft's corporate email system — including accounts belonging to senior leadership and cybersecurity staff. The attacker didn't exploit some exotic zero-day. They used a password spray attack against a legacy

Carl B. Johnson Sep 28, 2019 8 min read
Zero Trust Implementation

Zero Trust Implementation: A Practical Guide for 2026

The Breach That Proved "Trust But Verify" Is Dead In early 2024, a major healthcare provider disclosed that attackers had spent nine months inside their network — moving laterally, escalating privileges, and exfiltrating millions of patient records. Their perimeter defenses were solid. Their VPN was enterprise-grade. None of it

Carl B. Johnson Sep 28, 2019 7 min read