Tag

Data Breach Prevention

Explores strategies and best practices for preventing data breaches in organizations of all sizes. Covers topics like access controls, encryption, network monitoring, incident response planning, and employee awareness to help reduce the risk of unauthorized data exposure.

posts

Spear Phishing

What Is Spear Phishing? The Targeted Attack Behind Major Breaches

In 2020, a single spear phishing email sent to a Twitter employee gave attackers access to internal admin tools — and ultimately let them hijack verified accounts belonging to Barack Obama, Elon Musk, and Apple. The attackers walked away with over $100,000 in Bitcoin. That breach didn't start

Carl B. Johnson Apr 15, 2021 7 min read
Social Engineering Attacks

Social Engineering Attacks: What Actually Works in 2021

The Phone Call That Cost One Company $75 Million In 2020, a teenager orchestrated one of the most high-profile social engineering attacks in history. He called Twitter employees, posed as IT staff, and convinced them to hand over credentials to internal tools. Within hours, he'd hijacked accounts belonging

Carl B. Johnson Apr 12, 2021 7 min read
Social Engineering

How to Spot Social Engineering Before It Costs You

In July 2020, a teenager convinced Twitter employees to hand over internal credentials through a phone-based social engineering attack. The result: hijacked accounts belonging to Barack Obama, Elon Musk, Joe Biden, and Apple — broadcasting a Bitcoin scam to hundreds of millions of followers. The attacker didn't exploit a

Carl B. Johnson Apr 12, 2021 7 min read
Pretexting Attacks

Pretexting Attack Examples: Real Scams That Bypass Security

In 2020, a teenager and two accomplices convinced a Twitter employee they were from the company's IT department. That single phone call gave them access to internal tools, which they used to hijack 130 high-profile accounts — including those of Barack Obama, Elon Musk, and Apple — netting over $100,

Carl B. Johnson Apr 12, 2021 7 min read
Cybersecurity Awareness Training

Cybersecurity Awareness Training: What Actually Works

In March 2021, a single employee at a water treatment plant in Oldsmar, Florida, watched someone remotely take control of their screen and attempt to increase sodium hydroxide levels to dangerous concentrations. The attacker got in through a shared TeamViewer password. No advanced exploit. No zero-day. Just poor cybersecurity awareness

Carl B. Johnson Apr 12, 2021 6 min read
Employee Cybersecurity Training

Employee Cybersecurity Training: What Actually Works

In December 2020, FireEye disclosed one of the most sophisticated supply chain attacks in history — the SolarWinds breach. Threat actors compromised a trusted software update, slipping past automated defenses at over 18,000 organizations including multiple U.S. government agencies. But here's the detail that gets buried: investigators

Carl B. Johnson Apr 02, 2021 7 min read
Cybersecurity Best Practices

Cybersecurity Best Practices for Employees: A 2021 Guide

The Click That Cost One Company $46 Million In 2020, Ubiquiti Networks disclosed a breach that started with a single employee's compromised credentials. Attackers impersonated company executives, manipulated employees through social engineering, and walked away with $46.7 million in fraudulent wire transfers. The technology was fine. The

Carl B. Johnson Apr 02, 2021 8 min read
Cybersecurity Training

How to Train Employees on Cybersecurity That Sticks

In December 2020, a SolarWinds employee reportedly used the password "solarwinds123" on an update server — a detail that surfaced during Congressional hearings about one of the most devastating supply chain attacks in history. Thousands of organizations, including multiple U.S. government agencies, were compromised. The root cause wasn&

Carl B. Johnson Apr 02, 2021 7 min read