Tag

Phishing Awareness

Phishing awareness articles teach readers to identify and avoid phishing attacks across email, SMS, voice calls, and social media. Content includes real-world phishing examples, red flags to watch for, reporting procedures, and tips for running phishing simulation campaigns.

posts

Securing Employee Mobile Devices

Securing Employee Mobile Devices: A Practical Guide

In 2023, a single compromised employee phone gave threat actors a foothold inside MGM Resorts' network. The attackers used social engineering — a phone call to the help desk — and within hours, they had enough access to deploy ransomware that cost the company over $100 million. The device that started

Carl B. Johnson Oct 27, 2020 7 min read
Mobile Phishing Attacks

Mobile Phishing Attacks: Why Your Phone Is Now Target #1

82% of Phishing Sites Now Target Mobile Devices In late 2024, a wave of toll-road smishing texts hit millions of Americans. The messages claimed unpaid tolls from agencies like E-ZPass and SunPass, directing victims to pixel-perfect payment pages optimized for mobile screens. The FBI's Internet Crime Complaint Center

Carl B. Johnson Oct 10, 2020 7 min read
Cyber Hygiene

Cyber Hygiene Definition: What It Really Means in 2026

A Single Reused Password Cost One Company Everything In 2021, the Colonial Pipeline ransomware attack shut down fuel distribution across the U.S. East Coast. The entry point? A single compromised password on a legacy VPN account that lacked multi-factor authentication. That's not a sophisticated nation-state exploit. That&

Carl B. Johnson Sep 07, 2020 6 min read
Executive Phishing Attacks

Executive Phishing Attacks: Why the C-Suite Is Target #1

The CEO Who Wired $47 Million to a Threat Actor In 2016, Austrian aerospace manufacturer FACC fired its CEO after the company lost €42 million (roughly $47 million) in a business email compromise attack. A threat actor impersonated the CEO via email and convinced a finance employee to wire funds

Carl B. Johnson Sep 07, 2020 6 min read
Third Party Risk Management

Third Party Vendor Cybersecurity Risk: A Practical Guide

In 2023, a single compromised file transfer tool — MOVEit — cascaded into breaches affecting over 2,600 organizations and roughly 90 million individuals. The threat actor, the Cl0p ransomware group, didn't need to hack each victim directly. They exploited one vendor, and the dominoes fell. That's third

Carl B. Johnson Jul 27, 2020 7 min read
Stolen Credentials Dark Web

Stolen Credentials Dark Web: How Your Logins End Up for Sale

In May 2024, the FBI and international partners seized BreachForums — one of the largest marketplaces where stolen credentials on the dark web were bought and sold in bulk. The forum had facilitated the sale of billions of compromised records, including credentials tied to U.S. government agencies, healthcare organizations, and

Carl B. Johnson Jun 25, 2020 7 min read
Identity Theft Protection

Identity Theft Protection for Businesses: A 2026 Guide

The Breach That Started With a Single Stolen Identity In 2023, a midsize accounting firm in the Midwest lost access to its entire client database — not because of a sophisticated zero-day exploit, but because a threat actor used a partner's stolen credentials purchased on the dark web. The

Carl B. Johnson May 11, 2020 7 min read