Tag

Data Breach Prevention

Explores strategies and best practices for preventing data breaches in organizations of all sizes. Covers topics like access controls, encryption, network monitoring, incident response planning, and employee awareness to help reduce the risk of unauthorized data exposure.

posts

Ransomware Prevention

How to Prevent Ransomware: A Practical Defense Guide

The Attack That Shut Down 100 Million Prescriptions In February 2024, a ransomware attack on Change Healthcare paralyzed pharmacy operations across the United States. Hospitals couldn't process claims. Patients couldn't fill prescriptions. UnitedHealth Group ultimately disclosed the breach affected roughly 100 million individuals — the largest healthcare

Carl B. Johnson Nov 30, 2019 7 min read
Ransomware Protection

Ransomware Protection Tips That Actually Work in 2026

A Single Click Cost One Hospital Chain $100 Million In 2024, Change Healthcare — the payment processing backbone for thousands of U.S. healthcare providers — was crippled by a ransomware attack attributed to the ALPHV/BlackCat group. UnitedHealth Group, Change Healthcare's parent company, disclosed that the incident cost over

Carl B. Johnson Nov 26, 2019 7 min read
Data Breach Prevention

Data Breach Prevention: 9 Steps That Actually Work

The Breach That Cost Change Healthcare Everything In February 2024, a threat actor used stolen credentials to access Change Healthcare's systems — systems that lacked multi-factor authentication on a critical remote access portal. The result? A ransomware attack that disrupted pharmacy operations across the United States for weeks and

Carl B. Johnson Nov 26, 2019 6 min read
Data Breach Response Plan

Data Breach Response Plan: Build One Before You Need It

The Breach Already Happened — Now What? In March 2023, Latitude Financial discovered a threat actor had accessed 14 million customer records — driver's license numbers, passport copies, financial statements. Their initial disclosure said 328,000 records. Within weeks, that number ballooned to 14 million. The company didn't

Carl B. Johnson Nov 26, 2019 7 min read
Password Security Best Practices

Password Security Best Practices That Stop Breaches

The 24 Billion Stolen Passwords Nobody Talks About In 2022, researchers at Digital Shadows found over 24 billion username-and-password pairs circulating on dark web marketplaces and criminal forums. That number has only grown. If you think your organization's credentials aren't in that pile, I'd

Carl B. Johnson Nov 26, 2019 7 min read
Password Manager

Why Use a Password Manager: The Case Is Settled

The 24 Billion Stolen Passwords Sitting on the Dark Web Researchers at Digital Shadows found over 24 billion username-and-password combinations circulating on dark web marketplaces. That number keeps climbing. If you're still asking why use a password manager, the stolen credential economy already answered for you — your reused

Carl B. Johnson Nov 02, 2019 6 min read
Password Hygiene Tips

Password Hygiene Tips That Actually Stop Breaches

The 80% Problem Nobody Wants to Talk About The 2024 Verizon Data Breach Investigations Report found that stolen credentials were involved in roughly 31% of all breaches over the past decade — and that human-element breaches, including credential theft and phishing, accounted for nearly 68% of incidents in their latest dataset.

Carl B. Johnson Nov 02, 2019 6 min read
Strong Passwords

Strong Password Examples That Actually Stop Hackers

The 59-Second Crack That Cost a Hospital Chain Everything In 2023, CommonSpirit Health disclosed a ransomware attack that disrupted operations across more than 140 hospitals. Post-incident analysis pointed to compromised credentials as a key factor. The password in question wasn't "password123" — it was a seemingly reasonable

Carl B. Johnson Nov 02, 2019 7 min read
Insider Threat Awareness

Insider Threat Awareness: What Most Companies Miss

The Threat Already Inside Your Building In January 2023, the FBI arrested a former GE Aviation employee who had spent years downloading thousands of proprietary turbine technology files and transferring trade secrets to a competing business in China. The insider had legitimate access. He passed every background check. He sat

Carl B. Johnson Oct 01, 2019 6 min read