Tag

Security Awareness Training

Discover resources and strategies for building effective security awareness training programs. Posts cover curriculum design, engagement techniques, compliance requirements, and methods for measuring training impact to reduce human-related security incidents across organizations.

posts

Ransomware Prevention

How to Prevent Ransomware: A Practical Defense Guide

The Attack That Shut Down 100 Million Prescriptions In February 2024, a ransomware attack on Change Healthcare paralyzed pharmacy operations across the United States. Hospitals couldn't process claims. Patients couldn't fill prescriptions. UnitedHealth Group ultimately disclosed the breach affected roughly 100 million individuals — the largest healthcare

Carl B. Johnson Nov 30, 2019 7 min read
Ransomware Examples 2026

Ransomware Examples 2026: Real Attacks Hitting Now

A single phishing email brought down a regional hospital chain's entire electronic health records system for eleven days in January. The attackers demanded $14 million in cryptocurrency. The hospital paid. That's where we are right now — and if you're searching for ransomware examples 2026,

Carl B. Johnson Nov 30, 2019 7 min read
Ransomware

How Ransomware Spreads: 7 Paths Into Your Network

In May 2021, a single compromised VPN password shut down the largest fuel pipeline in the United States. The Colonial Pipeline attack didn't start with some exotic zero-day exploit. It started with a stolen credential. That's the reality of how ransomware spreads — and it's

Carl B. Johnson Nov 30, 2019 6 min read
Ransomware Protection

Ransomware Protection Tips That Actually Work in 2026

A Single Click Cost One Hospital Chain $100 Million In 2024, Change Healthcare — the payment processing backbone for thousands of U.S. healthcare providers — was crippled by a ransomware attack attributed to the ALPHV/BlackCat group. UnitedHealth Group, Change Healthcare's parent company, disclosed that the incident cost over

Carl B. Johnson Nov 26, 2019 7 min read
Data Breach Prevention

Data Breach Prevention: 9 Steps That Actually Work

The Breach That Cost Change Healthcare Everything In February 2024, a threat actor used stolen credentials to access Change Healthcare's systems — systems that lacked multi-factor authentication on a critical remote access portal. The result? A ransomware attack that disrupted pharmacy operations across the United States for weeks and

Carl B. Johnson Nov 26, 2019 6 min read
Data Breach Response Plan

Data Breach Response Plan: Build One Before You Need It

The Breach Already Happened — Now What? In March 2023, Latitude Financial discovered a threat actor had accessed 14 million customer records — driver's license numbers, passport copies, financial statements. Their initial disclosure said 328,000 records. Within weeks, that number ballooned to 14 million. The company didn't

Carl B. Johnson Nov 26, 2019 7 min read
Data Breach Examples

Data Breach Examples 2026: Lessons from This Year

2026 Has Already Been Brutal for Data Security We're barely halfway through the year, and the data breach examples from 2026 already paint a grim picture. Healthcare systems, school districts, financial platforms, and major retailers have all made headlines — not for innovation, but for failing to protect customer

Carl B. Johnson Nov 26, 2019 6 min read
Password Security Best Practices

Password Security Best Practices That Stop Breaches

The 24 Billion Stolen Passwords Nobody Talks About In 2022, researchers at Digital Shadows found over 24 billion username-and-password pairs circulating on dark web marketplaces and criminal forums. That number has only grown. If you think your organization's credentials aren't in that pile, I'd

Carl B. Johnson Nov 26, 2019 7 min read
Strong Passwords

Strong Password Examples That Actually Stop Hackers

The 59-Second Crack That Cost a Hospital Chain Everything In 2023, CommonSpirit Health disclosed a ransomware attack that disrupted operations across more than 140 hospitals. Post-incident analysis pointed to compromised credentials as a key factor. The password in question wasn't "password123" — it was a seemingly reasonable

Carl B. Johnson Nov 02, 2019 7 min read