Tag

Ransomware Defense

Provides in-depth coverage of ransomware threats, attack vectors, and defense strategies. Articles address backup best practices, endpoint protection, network segmentation, incident response procedures, and recovery planning to help organizations withstand ransomware attacks.

posts

Trojan Horse Malware

Trojan Horse Malware: What It Really Does to You

In 2023, the FBI's Internet Crime Complaint Center received over 880,000 complaints with losses exceeding $12.5 billion — and a staggering number of those incidents started with a single file that looked perfectly legitimate. That file was trojan horse malware, disguised as an invoice, a software update,

Carl B. Johnson Apr 01, 2026 5 min read
Cybersecurity for Financial Services

Cybersecurity for Financial Services: A 2026 Playbook

The Industry That Can't Afford a Single Mistake In November 2023, the SEC fined several financial advisory firms a combined total of nearly $750,000 for cybersecurity failures following credential theft incidents that exposed thousands of customer records. The firms had the basics — firewalls, antivirus — but lacked the

Carl B. Johnson Mar 29, 2026 5 min read
NIST Cybersecurity Framework

NIST Cybersecurity Framework: A Practical Guide for 2026

The Framework 83% of Organizations Claim to Follow — But Few Actually Implement When the City of Dallas was hit by a devastating ransomware attack in May 2023, investigations revealed systemic gaps in risk management, incident response, and access controls — the exact areas the NIST Cybersecurity Framework was designed to address.

Carl B. Johnson Mar 28, 2026 6 min read
Trojan Horse Malware

Trojan Horse Malware: What It Is and How to Stop It

In July 2021, the REvil ransomware gang exploited a vulnerability in Kaseya's VSA software and dropped a trojan payload onto the systems of roughly 1,500 businesses worldwide. The attack didn't arrive as an obvious virus. It masqueraded as a legitimate software update — the textbook definition

Carl B. Johnson Sep 03, 2021 7 min read
Security of Cyberspace

Security of Cyberspace: What Actually Works in 2021

The Colonial Pipeline ransomware attack in May 2021 shut down fuel delivery across the U.S. East Coast for nearly a week. Gas stations ran dry. Panic buying erupted. A single compromised password — reportedly linked to an inactive VPN account without multi-factor authentication — brought critical infrastructure to its knees. If

Carl B. Johnson Jun 03, 2021 6 min read
Computer Security Security

Computer Security Security: Layers That Actually Work

The Colonial Pipeline Just Proved Your Security Needs Security On May 7, 2021, a single compromised password shut down 5,500 miles of fuel pipeline. Colonial Pipeline paid a $4.4 million ransom within hours. The attack didn't exploit some exotic zero-day. It walked through a legacy VPN

Carl B. Johnson Jun 01, 2021 6 min read
Computer Security Service

Computer Security Service: What Actually Works in 2021

Colonial Pipeline Just Showed Us What Happens Without a Real Computer Security Service On May 7, 2021, a single compromised password shut down the largest fuel pipeline in the United States. Colonial Pipeline went dark. Gas stations across the Southeast ran dry. The company paid a $4.4 million ransom

Carl B. Johnson May 18, 2021 7 min read
Social Engineering Attacks

Social Engineering Attacks: What Actually Works in 2021

The Phone Call That Cost One Company $75 Million In 2020, a teenager orchestrated one of the most high-profile social engineering attacks in history. He called Twitter employees, posed as IT staff, and convinced them to hand over credentials to internal tools. Within hours, he'd hijacked accounts belonging

Carl B. Johnson Apr 12, 2021 7 min read
Data Breach Prevention

Data Breach Prevention: 9 Steps That Actually Work

In December 2020, SolarWinds disclosed that threat actors had compromised its Orion software platform, ultimately breaching at least nine U.S. federal agencies and over 100 private companies. The attack went undetected for months. It wasn't a zero-day exploit that got them in — it was a compromised build

Carl B. Johnson Feb 24, 2021 7 min read
Cost of a Data Breach

Cost of a Data Breach: What 2021 Trends Tell Us

The Cost of a Data Breach Is Already Staggering — And the Trajectory Is Alarming In 2020, the average cost of a data breach hit $3.86 million globally, according to IBM and the Ponemon Institute's annual Cost of a Data Breach Report. That number has been climbing steadily

Carl B. Johnson Jan 14, 2021 6 min read