Tag

security awareness training

Resources and best practices for designing and delivering effective security awareness training programs. Covers phishing simulations, compliance requirements, behavior change techniques, measuring training effectiveness, and fostering a culture of vigilance across organizations.

posts

phish

Phish: How One Click Costs Companies Millions

One Phish Email Took Down a $60 Billion Company's Defenses In 2023, MGM Resorts International lost roughly $100 million after a social engineering attack that started with a single phone call to their help desk. But most attacks don't even require that much effort. The average

Carl B. Johnson Feb 28, 2020 7 min read
phishing training for employees

Phishing Training for Employees: What Actually Works

In 2023, MGM Resorts lost roughly $100 million after a threat actor called a help desk, impersonated an employee found on LinkedIn, and talked their way past security controls. No zero-day exploit. No nation-state malware. Just a phone call. That incident crystallized something I've been telling organizations for

Carl B. Johnson Feb 09, 2020 8 min read
phishing email

How to Recognize a Phishing Email Before You Click

One Click Cost This Company $100 Million In 2023, MGM Resorts was brought to its knees — not by a sophisticated zero-day exploit, but by a phone call and a phishing email. Threat actors from the Scattered Spider group used social engineering to gain access, eventually deploying ransomware that disrupted operations

Carl B. Johnson Jan 23, 2020 7 min read
CISA cybersecurity guidelines

CISA Cybersecurity Guidelines: What Actually Matters

In January 2024, CISA itself disclosed that a threat actor had exploited vulnerabilities in Ivanti products to breach two of its own systems. Let that sink in. The federal agency responsible for setting cybersecurity standards for the entire nation got hit. If that doesn't convince you that simply

Carl B. Johnson Sep 14, 2019 7 min read
securing employee mobile devices

Securing Employee Mobile Devices: A Practical Guide

In 2024, a single compromised employee smartphone gave a threat actor full access to a healthcare company's patient records — 1.4 million individuals affected, an OCR investigation opened, and a brand reputation shattered. The initial vector? A phishing link sent via SMS that bypassed every email filter the

Carl B. Johnson Sep 08, 2019 6 min read
phishing attack

Phishing Attack Anatomy: How Breaches Actually Start

A Single Click That Cost $100 Million In 2023, MGM Resorts was brought to its knees — not by a sophisticated zero-day exploit, but by a phishing attack that started with a phone call to an IT help desk. Threat actors from the Scattered Spider group used social engineering to impersonate

Carl B. Johnson Mar 20, 2019 7 min read
FBI Gmail

FBI Gmail Warnings: What Every Organization Must Do Now

The FBI Gmail Alert That Should Have Your Full Attention In 2023, the FBI's Internet Crime Complaint Center (IC3) received over 298,000 phishing complaints — and Gmail accounts were among the most targeted. The FBI has repeatedly issued warnings about sophisticated phishing campaigns targeting Gmail users, including AI-generated

Carl B. Johnson Mar 07, 2019 6 min read
cyber security

Cyber Security in 2026: What Actually Works Now

In March 2024, Change Healthcare suffered a ransomware attack that disrupted insurance claims processing for nearly every hospital and pharmacy in the United States. The root cause? Stolen credentials on a system without multi-factor authentication. One overlooked gap in cyber security brought a $32 billion company to its knees and

Carl B. Johnson Feb 25, 2019 6 min read
computer security

Computer Security in 2026: What Actually Works Now

The Breach That Changed How I Think About Computer Security In early 2024, Change Healthcare — one of the largest health payment processors in the United States — got hit with a ransomware attack that disrupted pharmacy operations, delayed patient care, and exposed the protected health information of roughly 100 million individuals.

Carl B. Johnson Feb 25, 2019 7 min read