Tag

Phishing Response

Covers the steps individuals and organizations should take immediately after identifying a phishing attempt or falling victim to one. Topics include reporting phishing emails, containing credential exposure, notifying affected parties, and restoring account security after an attack.

posts

Data Breach Response Plan

Data Breach Response Plan: What Actually Works

When SolarWinds disclosed in December 2020 that threat actors had compromised their Orion software update mechanism — infiltrating roughly 18,000 customer networks including multiple U.S. government agencies — the breach didn't just expose data. It exposed how many organizations had no real data breach response plan in place.

Carl B. Johnson Jan 14, 2021 8 min read
Incident Response

How to Respond to a Cyberattack: A Practical Guide

In 2023, MGM Resorts lost an estimated $100 million after a social engineering attack that started with a single phone call to an IT help desk. The threat actor impersonated an employee, convinced a technician to reset credentials, and within hours had deployed ransomware across critical systems. Slot machines went

Carl B. Johnson Oct 09, 2019 7 min read