Tag

Social Engineering

Learn how attackers use psychological manipulation to trick people into revealing sensitive information or performing unsafe actions. Topics include pretexting, baiting, tailgating, vishing, and real-world social engineering case studies that expose common human vulnerabilities.

posts

Tailgating Attack

Tailgating Attack Cybersecurity: Stop the Walk-In Breach

In 2019, a penetration tester hired by the state of Iowa walked into a locked courthouse after hours simply by following an employee through a secured door. He was arrested — despite being under contract to test exactly that vulnerability. The incident made national headlines and exposed an uncomfortable truth: a

Carl B. Johnson Oct 10, 2020 7 min read
Shoulder Surfing Attack

Shoulder Surfing Attack: The Low-Tech Threat You Ignore

A former employee at a financial services firm in Chicago watched his coworker type her password every morning for two weeks. He memorized it character by character. After he was terminated for performance issues, he used those stolen credentials to access the company's client database from a public

Carl B. Johnson Oct 10, 2020 7 min read
Clean Desk Policy

Clean Desk Policy Cybersecurity: Your Cheapest Defense

The Sticky Note That Cost a Hospital $1.2 Million A few years ago, I walked into a client's office for a security assessment and found a sticky note on a monitor in the billing department. It had a username, a password, and the name of their patient

Carl B. Johnson Oct 10, 2020 7 min read
Cybersecurity Culture

Building a Cybersecurity Culture That Actually Works

A Fortune 500 Company Got Breached by a Phone Call In September 2023, a threat actor called MGM Resorts' IT help desk, impersonated an employee found on LinkedIn, and convinced a technician to reset credentials. The result? Over $100 million in losses, days of operational chaos, and a stock

Carl B. Johnson Oct 10, 2020 7 min read
CEO Fraud

CEO Fraud Email Scam: How Attackers Steal Millions

A Single Email Cost This Company $47 Million In 2015, Ubiquiti Networks disclosed that attackers impersonating company executives tricked finance employees into wiring $46.7 million to overseas accounts controlled by threat actors. No malware. No zero-day exploit. Just a carefully crafted CEO fraud email scam that exploited trust, urgency,

Carl B. Johnson Sep 07, 2020 7 min read
Executive Phishing Attacks

Executive Phishing Attacks: Why the C-Suite Is Target #1

The CEO Who Wired $47 Million to a Threat Actor In 2016, Austrian aerospace manufacturer FACC fired its CEO after the company lost €42 million (roughly $47 million) in a business email compromise attack. A threat actor impersonated the CEO via email and convinced a finance employee to wire funds

Carl B. Johnson Sep 07, 2020 6 min read
Identity Theft Protection

Identity Theft Protection for Businesses: A 2026 Guide

The Breach That Started With a Single Stolen Identity In 2023, a midsize accounting firm in the Midwest lost access to its entire client database — not because of a sophisticated zero-day exploit, but because a threat actor used a partner's stolen credentials purchased on the dark web. The

Carl B. Johnson May 11, 2020 7 min read