Tag

Social Engineering Defense

Focuses on recognizing and countering manipulation tactics that attackers use to exploit human trust. Covers pretexting, baiting, tailgating, impersonation scams, and organizational defenses such as verification protocols, awareness campaigns, and incident reporting procedures.

posts

Securing Employee Mobile Devices

Securing Employee Mobile Devices: A Practical Guide

In 2023, a single employee's compromised personal phone gave threat actors a foothold into MGM Resorts' corporate network. The resulting breach cost the company over $100 million. The attack didn't start with some sophisticated zero-day exploit — it started with a social engineering call to the

Carl B. Johnson Apr 11, 2026 5 min read
Securing Employee Mobile Devices

Securing Employee Mobile Devices: A Practical Guide

In 2023, Verizon's Data Breach Investigations Report found that 74% of all breaches involved the human element — and mobile devices have become the primary attack surface for exploiting that weakness. I've watched organizations spend six figures on perimeter defenses while their employees check corporate email on

Carl B. Johnson Apr 07, 2026 6 min read
Stolen Credentials Dark Web

Stolen Credentials Dark Web: How Your Logins Get Sold

In April 2021, researchers discovered a database of 533 million Facebook user records — names, phone numbers, email addresses — freely circulating on a dark web forum. That same month, a compilation of 3.2 billion email-password pairs called "COMB" surfaced, aggregated from years of breaches. Stolen credentials on the

Carl B. Johnson Sep 23, 2021 7 min read
Cybersecurity Tips

Cybersecurity Tips That Actually Stop Breaches in 2021

Colonial Pipeline. SolarWinds. The Microsoft Exchange Server hack. We're barely halfway through 2021, and the breach headlines already read like a disaster film. Each one of these incidents started with something preventable — a compromised password, an unpatched system, a single employee who clicked the wrong link. The cybersecurity

Carl B. Johnson Jun 03, 2021 6 min read
Computer Security Companies

Computer Security Companies: What They Won't Tell You

Colonial Pipeline just paid $4.4 million in ransom to a criminal group called DarkSide — and they had a security vendor. SolarWinds, a company that literally sold security monitoring tools, became the vector for one of the most devastating supply chain attacks in history. If massive organizations with million-dollar security

Carl B. Johnson Jun 01, 2021 6 min read
Define Cyber

Define Cyber: What It Actually Means for Security

In May 2021, a single compromised password shut down the largest fuel pipeline in the United States. The Colonial Pipeline ransomware attack disrupted gas supplies across the Eastern Seaboard, triggered panic buying, and cost the company a $4.4 million ransom payment. If you ever needed a reason to define

Carl B. Johnson May 15, 2021 7 min read
Phishing Simulation Training

Phishing Simulation Training: Why 97% of Users Fail

In March 2021, a single phishing email led to a credential theft incident at a mid-size manufacturing firm in Ohio. The attacker impersonated the CEO, asked the controller to update direct deposit information, and walked away with $1.7 million. The email had two typos, a slightly wrong domain, and

Carl B. Johnson May 04, 2021 7 min read
Cybersecurity Tips for Small Business

Cybersecurity Tips for Small Business: A 2021 Guide

In 2020, the FBI's Internet Crime Complaint Center received 791,790 complaints — a 69% increase over 2019 — with reported losses exceeding $4.2 billion. Small businesses absorbed a disproportionate share of that damage. The Verizon 2020 Data Breach Investigations Report found that 28% of data breaches involved small

Carl B. Johnson Apr 02, 2021 7 min read