Tag

Social Engineering

Learn how attackers use psychological manipulation to trick people into revealing sensitive information or performing unsafe actions. Topics include pretexting, baiting, tailgating, vishing, and real-world social engineering case studies that expose common human vulnerabilities.

posts

Cybersecurity Incident Examples

Cybersecurity Incident Examples That Changed Everything

The Breach That Cost a Pipeline Its Entire Operation In May 2021, Colonial Pipeline — the largest fuel pipeline in the United States — shut down completely after a ransomware attack. A single compromised password on a legacy VPN account gave the DarkSide threat actor group everything they needed. The company paid

Carl B. Johnson Jan 18, 2022 6 min read
Insider Threats

Malicious Insider vs Negligent Insider: Real Threats

One Cost the Company $3.4 Billion. The Other Just Forgot to Lock the Door. In 2020, a former Ubiquiti employee launched a devastating attack against his own employer — stealing proprietary data, attempting extortion, and then posing as a whistleblower to tank the company's stock. That's

Carl B. Johnson Jan 15, 2022 7 min read
Cybersecurity for Nonprofits

Cybersecurity for Nonprofits: A Practical Defense Guide

The Blackbaud Breach Should Have Been a Wake-Up Call In May 2020, a ransomware attack hit Blackbaud — one of the largest cloud computing providers serving nonprofits, hospitals, and universities. The breach exposed donor records, financial data, and Social Security numbers belonging to millions of people across hundreds of organizations. Blackbaud

Carl B. Johnson Jan 01, 2022 7 min read
Mobile Phishing Attacks

Mobile Phishing Attacks: Why Your Phone Is Now Target #1

Your Employees' Phones Are the Weakest Link Right Now In September 2021, Lookout reported that mobile phishing attacks had surged 161% since 2020. That's not a typo. The device your employees carry everywhere — the one they check 96 times a day — has become the primary attack surface

Carl B. Johnson Dec 18, 2021 7 min read
USB Drive Security Risks

USB Drive Security Risks: The Threat Already on Your Desk

A Parking Lot Full of Malware In 2016, researchers at the University of Illinois dropped 297 USB drives across a campus. Nearly 48% were picked up and plugged into a computer. Some were plugged in within six minutes of being dropped. That study still haunts me because the fundamental behavior

Carl B. Johnson Dec 18, 2021 7 min read
Tailgating Attack

Tailgating Attack Cybersecurity: The Threat at Your Door

In September 2019, a Chinese national named Yujing Zhang walked past security at Mar-a-Lago carrying a thumb drive loaded with malware. She told the front desk she was there to use the pool. That's tailgating — and it nearly compromised one of the most secured private facilities in the

Carl B. Johnson Dec 18, 2021 7 min read
Shoulder Surfing Attack

Shoulder Surfing Attack: The Low-Tech Threat You Ignore

A $10 Pair of Binoculars Can Beat Your $10 Million Security Budget In 2018, a researcher at a security conference demonstrated how he captured over 100 passwords simply by watching people type at airport gates and coffee shops over a two-week period. No malware. No phishing emails. No zero-day exploits.

Carl B. Johnson Dec 18, 2021 7 min read
Clean Desk Policy

Clean Desk Policy Cybersecurity: Your Cheapest Defense

In March 2021, a UK-based financial firm was fined after a visitor photographed sensitive client data sitting on an employee's desk — in plain sight, during a routine office tour. No hacking tools. No zero-day exploit. Just a smartphone camera and a messy workstation. That's the reality

Carl B. Johnson Dec 18, 2021 7 min read