Tag

Phishing Awareness

Phishing awareness articles teach readers to identify and avoid phishing attacks across email, SMS, voice calls, and social media. Content includes real-world phishing examples, red flags to watch for, reporting procedures, and tips for running phishing simulation campaigns.

posts

Phishing Links

What Is a Phishing Link? How Attackers Steal Data

In July 2021, a single phishing link sent to an employee at a Florida IT management company led to the Kaseya ransomware attack — one of the largest supply chain compromises in history. Over 1,500 businesses were affected downstream. That's the reality of what a phishing link can

Carl B. Johnson Aug 08, 2021 7 min read
AI Phishing Attacks

Gmail Users Warned About Sophisticated AI-Driven Phishing

Last month, a finance director at a mid-sized logistics company received a Gmail message that looked exactly like a Google Workspace security alert. The branding was pixel-perfect. The language was flawless. The sender address passed a casual glance test. She clicked, entered her credentials, and within 90 minutes a threat

Carl B. Johnson Jul 29, 2021 7 min read
Group Online Svindel

Group Online Svindel: How Organized Fraud Rings Work

A $12 Billion Problem You Can't Ignore In June 2021, Europol dismantled a massive fraud network spanning dozens of countries. The ring had siphoned millions from victims through coordinated romance scams, investment fraud, and business email compromise. This wasn't a lone hacker in a basement. It

Carl B. Johnson Jul 29, 2021 7 min read
PayPal DocuSign Phishing

PayPal DocuSign Phishing: How to Spot This Attack

Last month, a finance manager at a mid-sized logistics company received what looked like a routine DocuSign envelope — a payment authorization supposedly routed through PayPal. She clicked, entered her PayPal credentials on a pixel-perfect fake login page, and within 90 minutes, the attacker had initiated $38,000 in wire transfers.

Carl B. Johnson Jul 29, 2021 7 min read
Is It Legit

Removed App: Is It Legit or a Security Risk?

When "Removed" Shows Up, Your Instincts Are Right to Question It Last month, I received three separate emails from readers asking the same question: they'd encountered an app, service, or website branded as "Removed" and wanted to know — removed is it legit? The fact

Carl B. Johnson Jul 13, 2021 7 min read
Spear Phishing

What Is Spear Phishing? The Targeted Attack Behind Major Breaches

In December 2020, the world learned that SolarWinds — a company whose software sat inside thousands of government and corporate networks — had been compromised by a sophisticated nation-state threat actor. The initial intrusion vector? Targeted, carefully crafted communications designed to exploit trust. If you're asking what is spear phishing,

Carl B. Johnson Jul 01, 2021 8 min read
Cyber Security

Cyber Security in 2021: What Actually Stops Breaches

Colonial Pipeline. JBS Foods. SolarWinds. The first half of 2021 has delivered a masterclass in what happens when cyber security fails at scale. Colonial paid $4.4 million in ransom. JBS paid $11 million. And the SolarWinds fallout — which compromised nine federal agencies and over 100 private companies — is still

Carl B. Johnson Jul 01, 2021 7 min read
IT Security

IT Security in 2021: What Most Organizations Get Wrong

Colonial Pipeline. SolarWinds. Microsoft Exchange. We're barely halfway through 2021 and the breach headlines are relentless. But here's what frustrates me most: the majority of these incidents didn't exploit exotic zero-day vulnerabilities. They exploited basic IT security gaps that organizations have known about for

Carl B. Johnson Jun 01, 2021 7 min read
Web Security Best Practices

Web Security Best Practices: 12 Steps That Actually Work

In March 2021, a single misconfigured web server at a major airline exposed 4.2 million passenger records. Names, email addresses, passport numbers — all sitting in an unprotected cloud bucket. The fix would have taken about fifteen minutes. The breach response cost millions and took months. That's the

Carl B. Johnson Jun 01, 2021 6 min read
Security in Cloud Computing

Security in Cloud Computing: What Goes Wrong First

In April 2021, a misconfigured cloud storage bucket at a major Android app developer exposed the personal data of over 100 million users. Names, emails, passwords, chat messages — all sitting in plain view because someone forgot to toggle a single setting. This wasn't an exotic zero-day exploit. It

Carl B. Johnson May 13, 2021 6 min read