Tag

Social Engineering Defense

Focuses on recognizing and countering manipulation tactics that attackers use to exploit human trust. Covers pretexting, baiting, tailgating, impersonation scams, and organizational defenses such as verification protocols, awareness campaigns, and incident reporting procedures.

posts

Cybersecurity Culture

Building a Cybersecurity Culture That Actually Works

The Breach That Started With a Single Slack Message In September 2022, a threat actor sent a push notification to an Uber contractor's phone — over and over, for more than an hour. The contractor eventually approved the multi-factor authentication request just to make it stop. That single moment

Carl B. Johnson Sep 01, 2019 6 min read
Security of Cyberspace

Security of Cyberspace: What Actually Works in 2026

In February 2024, Change Healthcare — one of the largest health payment processors in the United States — suffered a ransomware attack that disrupted pharmacy operations, delayed insurance claims, and exposed the protected health information of roughly 100 million people. One set of stolen credentials. No multi-factor authentication on a critical system.

Carl B. Johnson Feb 25, 2019 6 min read
Cybersecurity Tips

Cybersecurity Tips That Actually Stop Breaches in 2026

In 2024, the average cost of a data breach hit $4.88 million globally, according to IBM's Cost of a Data Breach Report. That number didn't come from sophisticated nation-state attacks or exotic zero-days. Most of those breaches started with stolen credentials, a phishing email, or

Carl B. Johnson Feb 25, 2019 6 min read