Tag

Security Awareness Training

Discover resources and strategies for building effective security awareness training programs. Posts cover curriculum design, engagement techniques, compliance requirements, and methods for measuring training impact to reduce human-related security incidents across organizations.

posts

Data Breach Response Plan

Data Breach Response Plan: What Actually Works

When SolarWinds disclosed in December 2020 that threat actors had compromised their Orion software update mechanism — infiltrating roughly 18,000 customer networks including multiple U.S. government agencies — the breach didn't just expose data. It exposed how many organizations had no real data breach response plan in place.

Carl B. Johnson Jan 14, 2021 8 min read
Data Breach Notification Requirements

Data Breach Notification Requirements: A 2021 Guide

The SolarWinds Breach Just Made Notification a National Crisis In December 2020, FireEye disclosed that a sophisticated threat actor had compromised SolarWinds Orion software, giving attackers access to roughly 18,000 organizations — including the U.S. Treasury, the Department of Homeland Security, and Fortune 500 companies. Weeks later, we'

Carl B. Johnson Jan 14, 2021 8 min read
Strong Passwords

How to Create a Strong Password: A Practical Guide

In the 2020 Verizon Data Breach Investigations Report, over 80% of hacking-related breaches involved stolen or brute-forced credentials. Not sophisticated zero-day exploits. Not nation-state malware. Passwords. The single thing most people treat as an afterthought is the single thing that gets most organizations compromised. Knowing how to create a strong

Carl B. Johnson Jan 14, 2021 7 min read
Password Manager Benefits

Password Manager Benefits: Why Pros Won't Work Without One

The Breach That Started With a Sticky Note In 2020, a senior employee at a Florida water treatment facility reportedly reused passwords across multiple systems — including the one controlling sodium hydroxide levels in the public water supply. That incident, disclosed in early February 2021, showed exactly how a single weak

Carl B. Johnson Jan 14, 2021 6 min read
Password Manager

Why Use a Password Manager: A Security Pro's Take

In December 2020, SolarWinds disclosed one of the most devastating supply chain compromises in history. But buried in the early reporting was a detail that made every security professional wince: a critical password — "solarwinds123" — had been publicly accessible on GitHub. One weak, reused, laughably simple password contributed to

Carl B. Johnson Jan 03, 2021 6 min read
Strong Password Examples

Strong Password Examples That Actually Stop Hackers

The Breach That Started With "Password123" In 2020, the Verizon Data Breach Investigations Report confirmed what security professionals already suspected: over 80% of hacking-related breaches involved brute force or the use of lost or stolen credentials. That's not a typo. Four out of five breaches trace

Carl B. Johnson Dec 20, 2020 7 min read
Cyber Incident Response Steps

Cyber Incident Response Steps That Actually Work

When SolarWinds disclosed in December 2020 that threat actors had compromised their Orion software update mechanism — affecting up to 18,000 organizations including multiple U.S. government agencies — it became the most significant supply chain attack in modern history. The organizations that responded effectively didn't improvise. They followed

Carl B. Johnson Dec 20, 2020 7 min read
Cyber Incident Reporting

How to Report a Cyber Incident: A Step-by-Step Guide

In July 2020, Twitter suffered one of the most visible cyber incidents of the year — a coordinated social engineering attack that compromised high-profile accounts including Barack Obama, Elon Musk, and Apple. The attackers walked away with over $100,000 in Bitcoin. But what stood out to me wasn't

Carl B. Johnson Dec 20, 2020 7 min read