Tag

Endpoint Security

Comprehensive resources on securing laptops, desktops, mobile devices, and other endpoints that connect to your network. Covers endpoint detection and response tools, device hardening, patch management, encryption, and policies that minimize the attack surface across distributed environments.

posts

USB Drive Security Risks

USB Drive Security Risks: Why They Still Bypass Defenses

In January 2022, the FBI issued a public warning that the cybercriminal group FIN7 had been mailing malicious USB drives — disguised as gift cards and COVID-19 guidelines — directly to U.S. companies. The drives contained ransomware. Employees plugged them in. Networks fell. That campaign wasn't some edge case

Carl B. Johnson Oct 10, 2020 6 min read
Types of Malware

Types of Malware: What Actually Hits Networks in 2026

A Single Click Cost One Hospital Chain $100 Million In 2024, Change Healthcare was hit by the ALPHV/BlackCat ransomware group. The attack disrupted insurance claims processing for thousands of healthcare providers across the United States. UnitedHealth Group eventually disclosed costs exceeding $870 million related to the incident. The entry

Carl B. Johnson May 08, 2020 7 min read
Adware vs Spyware

Adware vs Spyware: What Security Teams Must Know

In 2023, a seemingly harmless browser extension called "PDF Toolbox" was downloaded over two million times from the Chrome Web Store before researchers at Palant discovered it was quietly injecting tracking code and redirecting ad revenue — a textbook adware operation that crossed hard into spyware territory. That single

Carl B. Johnson May 08, 2020 7 min read
Trojan Horse Malware

Trojan Horse Malware: How It Gets In and How to Stop It

The Fake Invoice That Cost a Hospital $28 Million In 2024, Ascension Healthcare disclosed a ransomware attack that disrupted operations at 140 hospitals across 19 states. The initial entry point? An employee opened what appeared to be a routine file. It was trojan horse malware — a malicious payload disguised as

Carl B. Johnson May 08, 2020 7 min read
Keylogger Attack

Keylogger Attack: How They Work and How to Stop Them

In 2023, a single keylogger embedded in a phishing email gave threat actors access to credentials at over 2,000 organizations worldwide as part of the Snake Keylogger campaign. The malware silently recorded every keystroke — passwords, credit card numbers, internal messages — and exfiltrated the data before anyone noticed. A keylogger

Carl B. Johnson May 08, 2020 7 min read
Cyber Hygiene

What Is Cyber Hygiene? The Daily Habits That Stop Breaches

A Stolen Password, a $4.88 Million Problem In 2024, IBM's Cost of a Data Breach Report pegged the global average breach cost at $4.88 million — the highest figure ever recorded. The root cause in most of those incidents wasn't a sophisticated zero-day exploit. It

Carl B. Johnson Aug 20, 2019 7 min read
Malware

What Is Malware? A Security Pro's Field Guide for 2026

In 2023, the FBI's Internet Crime Complaint Center (IC3) received over 880,000 complaints with potential losses exceeding $12.5 billion — a 22% increase from the year before. A massive share of those incidents started with a single piece of malicious software landing on someone's machine.

Carl B. Johnson Jul 20, 2019 7 min read