Tag

Ransomware Protection

Understand how ransomware attacks work and what steps you can take to prevent, detect, and recover from them. Our ransomware protection articles cover backup strategies, network segmentation, incident response planning, and the latest defenses against evolving ransomware variants.

posts

Cyber Security

Cyber Security in 2021: What Actually Stops Breaches

Colonial Pipeline. JBS Foods. SolarWinds. The first half of 2021 has delivered a masterclass in what happens when cyber security fails at scale. Colonial paid $4.4 million in ransom. JBS paid $11 million. And the SolarWinds fallout — which compromised nine federal agencies and over 100 private companies — is still

Carl B. Johnson Jul 01, 2021 7 min read
Cybersecurity Tips

Cybersecurity Tips That Actually Stop Breaches in 2021

Colonial Pipeline. SolarWinds. The Microsoft Exchange Server hack. We're barely halfway through 2021, and the breach headlines already read like a disaster film. Each one of these incidents started with something preventable — a compromised password, an unpatched system, a single employee who clicked the wrong link. The cybersecurity

Carl B. Johnson Jun 03, 2021 6 min read
IT Security

IT Security in 2021: What Most Organizations Get Wrong

Colonial Pipeline. SolarWinds. Microsoft Exchange. We're barely halfway through 2021 and the breach headlines are relentless. But here's what frustrates me most: the majority of these incidents didn't exploit exotic zero-day vulnerabilities. They exploited basic IT security gaps that organizations have known about for

Carl B. Johnson Jun 01, 2021 7 min read
Computer Security Companies

Computer Security Companies: What They Won't Tell You

Colonial Pipeline just paid $4.4 million in ransom to a criminal group called DarkSide — and they had a security vendor. SolarWinds, a company that literally sold security monitoring tools, became the vector for one of the most devastating supply chain attacks in history. If massive organizations with million-dollar security

Carl B. Johnson Jun 01, 2021 6 min read
Home Computer Security

How Can You Protect Your Home Computer in 2021

Your Home Computer Is Now a High-Value Target In May 2021, the Colonial Pipeline ransomware attack shut down fuel delivery across the U.S. East Coast. The entry point? A single compromised password on a VPN account — likely tied to a home setup. If you're wondering how can

Carl B. Johnson Jun 01, 2021 7 min read
Cybersecurity Definition

Cybersecurity Definition: What It Really Means in 2021

Colonial Pipeline just paid a $4.4 million ransom to get its systems back online, shutting down fuel delivery across the U.S. East Coast for nearly a week. If you searched for a cybersecurity definition expecting a clean, academic sentence, this incident should tell you everything textbooks leave out.

Carl B. Johnson May 18, 2021 6 min read
Cloud Computing Security

Cloud Computing Security: What Goes Wrong in Practice

Capital One Lost 100 Million Records Because of One Misconfigured Firewall In 2019, a former cloud services employee exploited a misconfigured web application firewall to steal the personal data of over 100 million Capital One customers and applicants. The breach cost Capital One over $80 million in fines from the

Carl B. Johnson May 18, 2021 6 min read
Security in Cloud Computing

Security in Cloud Computing: What Goes Wrong First

In April 2021, a misconfigured cloud storage bucket at a major Android app developer exposed the personal data of over 100 million users. Names, emails, passwords, chat messages — all sitting in plain view because someone forgot to toggle a single setting. This wasn't an exotic zero-day exploit. It

Carl B. Johnson May 13, 2021 6 min read