Tag

Phishing Prevention

Delivers actionable advice on recognizing and preventing phishing attacks, including email phishing, spear phishing, smishing, and vishing. Covers detection techniques, employee training approaches, email security tools, and real-world phishing examples to strengthen your defenses.

posts

Cyber Security Definition

Cyber Security Definition: What It Actually Means in 2021

Colonial Pipeline Just Gave Us a Real-World Cyber Security Definition On May 7, 2021, a single compromised password shut down the largest fuel pipeline in the United States. Colonial Pipeline halted operations after a ransomware attack attributed to the DarkSide group, triggering fuel shortages across the Southeast. If you want

Carl B. Johnson May 18, 2021 6 min read
Computer Security Service

Computer Security Service: What Actually Works in 2021

Colonial Pipeline Just Showed Us What Happens Without a Real Computer Security Service On May 7, 2021, a single compromised password shut down the largest fuel pipeline in the United States. Colonial Pipeline went dark. Gas stations across the Southeast ran dry. The company paid a $4.4 million ransom

Carl B. Johnson May 18, 2021 7 min read
Cloud Computing Security

Cloud Computing Security: What Goes Wrong in Practice

Capital One Lost 100 Million Records Because of One Misconfigured Firewall In 2019, a former cloud services employee exploited a misconfigured web application firewall to steal the personal data of over 100 million Capital One customers and applicants. The breach cost Capital One over $80 million in fines from the

Carl B. Johnson May 18, 2021 6 min read
Define Cyber

Define Cyber: What It Actually Means for Security

In May 2021, a single compromised password shut down the largest fuel pipeline in the United States. The Colonial Pipeline ransomware attack disrupted gas supplies across the Eastern Seaboard, triggered panic buying, and cost the company a $4.4 million ransom payment. If you ever needed a reason to define

Carl B. Johnson May 15, 2021 7 min read
Phishing Simulation Training

Phishing Simulation Training: Why 97% of Users Fail

In March 2021, a single phishing email led to a credential theft incident at a mid-size manufacturing firm in Ohio. The attacker impersonated the CEO, asked the controller to update direct deposit information, and walked away with $1.7 million. The email had two typos, a slightly wrong domain, and

Carl B. Johnson May 04, 2021 7 min read
Phishing Prevention

How to Avoid Phishing Attacks: A Practical Guide

In December 2020, the Treasury Department and the Department of Commerce confirmed they'd been breached through a supply chain attack that started, in part, with carefully crafted phishing emails targeting key personnel. If federal agencies with dedicated security teams can get caught, your organization isn't immune

Carl B. Johnson Apr 15, 2021 7 min read
Business Email Compromise

Business Email Compromise: The $1.8B Threat in 2021

In 2020, the FBI's Internet Crime Complaint Center received 19,369 business email compromise complaints. The adjusted losses? A staggering $1.8 billion — making BEC the single most financially devastating cybercrime category in the FBI IC3 2020 Internet Crime Report. That's more than ransomware, more than

Carl B. Johnson Apr 15, 2021 7 min read
Vishing Scam Awareness

Vishing Scam Awareness: Stop Voice Phishing Attacks

In January 2021, the FBI and CISA issued a joint advisory warning about a surge in vishing attacks targeting corporate employees working from home. Threat actors were calling employees directly, impersonating IT help desks, and convincing them to hand over VPN credentials. Within hours, attackers had access to internal networks,

Carl B. Johnson Apr 14, 2021 7 min read
Social Engineering Attacks

Social Engineering Attacks: What Actually Works in 2021

The Phone Call That Cost One Company $75 Million In 2020, a teenager orchestrated one of the most high-profile social engineering attacks in history. He called Twitter employees, posed as IT staff, and convinced them to hand over credentials to internal tools. Within hours, he'd hijacked accounts belonging

Carl B. Johnson Apr 12, 2021 7 min read