Tag

Zero Trust Security

Zero trust security content examines the principle of never trusting and always verifying every user, device, and connection. Articles explore micro-segmentation, least-privilege access, continuous monitoring, and how organizations transition from perimeter-based defenses to zero trust models.

posts

Multi-Factor Authentication

Authenticator App vs SMS Verification: Which Is Safer?

In February 2021, T-Mobile disclosed a data breach that exposed customer phone numbers and SIM information. That same month, the FBI's Internet Crime Complaint Center continued logging a surge in SIM swap complaints — a threat that directly undermines SMS-based two-factor authentication. If your organization still relies on text

Carl B. Johnson Sep 16, 2021 7 min read
Cyber Security

Cyber Security in 2021: What Actually Stops Breaches

Colonial Pipeline. JBS Foods. SolarWinds. The first half of 2021 has delivered a masterclass in what happens when cyber security fails at scale. Colonial paid $4.4 million in ransom. JBS paid $11 million. And the SolarWinds fallout — which compromised nine federal agencies and over 100 private companies — is still

Carl B. Johnson Jul 01, 2021 7 min read
Security of Cyberspace

Security of Cyberspace: What Actually Works in 2021

The Colonial Pipeline ransomware attack in May 2021 shut down fuel delivery across the U.S. East Coast for nearly a week. Gas stations ran dry. Panic buying erupted. A single compromised password — reportedly linked to an inactive VPN account without multi-factor authentication — brought critical infrastructure to its knees. If

Carl B. Johnson Jun 03, 2021 6 min read
IT Security

IT Security in 2021: What Most Organizations Get Wrong

Colonial Pipeline. SolarWinds. Microsoft Exchange. We're barely halfway through 2021 and the breach headlines are relentless. But here's what frustrates me most: the majority of these incidents didn't exploit exotic zero-day vulnerabilities. They exploited basic IT security gaps that organizations have known about for

Carl B. Johnson Jun 01, 2021 7 min read
Web Security Best Practices

Web Security Best Practices: 12 Steps That Actually Work

In March 2021, a single misconfigured web server at a major airline exposed 4.2 million passenger records. Names, email addresses, passport numbers — all sitting in an unprotected cloud bucket. The fix would have taken about fifteen minutes. The breach response cost millions and took months. That's the

Carl B. Johnson Jun 01, 2021 6 min read
Computer Security Service

Computer Security Service: What Actually Works in 2021

Colonial Pipeline Just Showed Us What Happens Without a Real Computer Security Service On May 7, 2021, a single compromised password shut down the largest fuel pipeline in the United States. Colonial Pipeline went dark. Gas stations across the Southeast ran dry. The company paid a $4.4 million ransom

Carl B. Johnson May 18, 2021 7 min read
Social Engineering Attacks

Social Engineering Attacks: What Actually Works in 2021

The Phone Call That Cost One Company $75 Million In 2020, a teenager orchestrated one of the most high-profile social engineering attacks in history. He called Twitter employees, posed as IT staff, and convinced them to hand over credentials to internal tools. Within hours, he'd hijacked accounts belonging

Carl B. Johnson Apr 12, 2021 7 min read