Tag

Zero Trust Security

Zero trust security content examines the principle of never trusting and always verifying every user, device, and connection. Articles explore micro-segmentation, least-privilege access, continuous monitoring, and how organizations transition from perimeter-based defenses to zero trust models.

posts

Cybersecurity Awareness Month

Cybersecurity Awareness Month: What Actually Works

One Month Won't Save You — But It Can Start Something That Does In October 2020, during Cybersecurity Awareness Month, a major hospital chain — Universal Health Services — was fighting off one of the largest ransomware attacks in U.S. healthcare history. The Ryuk ransomware hit over 400 facilities. Staff

Carl B. Johnson Apr 02, 2021 6 min read
Ransomware Attack Prevention

Ransomware Attack Prevention: A Practical Guide

The Attack That Shut Down a Pipeline — and a Wake-Up Call for Everyone In February 2020, the Cybersecurity and Infrastructure Security Agency (CISA) published an alert after a ransomware attack forced a natural gas compression facility to shut down for two full days. The threat actor got in through a

Carl B. Johnson Mar 31, 2021 6 min read
Ransomware Prevention

How to Prevent Ransomware: A Practical Defense Guide

The Attack That Cost a Pipeline — and a Country's Fuel Supply In May 2021, Colonial Pipeline shut down 5,500 miles of fuel infrastructure after a ransomware attack crippled its operations. Millions of Americans panic-bought gasoline. The company paid $4.4 million in Bitcoin to the DarkSide threat

Carl B. Johnson Mar 12, 2021 7 min read
Ransomware Protection Tips

Ransomware Protection Tips That Actually Work in 2021

A Hospital Paid $17 Million. Your Organization Could Be Next. In September 2020, Universal Health Services got hit with Ryuk ransomware across 400 facilities. The damage? An estimated $67 million in recovery costs and lost revenue. A few months earlier, Garmin paid a reported $10 million ransom to get its

Carl B. Johnson Feb 24, 2021 7 min read
Data Breach Prevention

Data Breach Prevention: 9 Steps That Actually Work

In December 2020, SolarWinds disclosed that threat actors had compromised its Orion software platform, ultimately breaching at least nine U.S. federal agencies and over 100 private companies. The attack went undetected for months. It wasn't a zero-day exploit that got them in — it was a compromised build

Carl B. Johnson Feb 24, 2021 7 min read
Insider Threats

Insider Threat Examples: Real Cases That Cost Millions

In July 2020, a 17-year-old in Florida convinced a Twitter employee to hand over internal credentials. Within hours, the attacker had hijacked accounts belonging to Barack Obama, Elon Musk, Joe Biden, and Apple — tweeting a Bitcoin scam that netted over $100,000. The most sophisticated firewall in the world wouldn&

Carl B. Johnson Dec 20, 2020 7 min read
Insider Threats

How to Prevent Insider Threats: A Practical Guide

In July 2020, a 17-year-old in Florida convinced a Twitter employee to hand over internal tool credentials. Within hours, threat actors had hijacked high-profile accounts — Barack Obama, Elon Musk, Apple — and ran a Bitcoin scam that netted over $100,000. The breach didn't start with a zero-day exploit

Carl B. Johnson Dec 20, 2020 7 min read
Insider Threats

Malicious Insider vs Negligent Insider: Real Threats

A Disgruntled Engineer, a Careless Accountant, and $11.45 Billion in Losses In 2018, a former Tesla employee reportedly sabotaged the company's manufacturing systems and exfiltrated sensitive data to third parties. That same year, countless organizations bled data because an employee clicked a phishing link or misconfigured a

Carl B. Johnson Dec 12, 2020 7 min read
Zero Trust Network Access

Zero Trust Network Access: A Practical Guide for 2021

The SolarWinds Breach Just Proved Your Perimeter Is Dead As I write this in December 2020, we're watching one of the most devastating supply chain attacks in history unfold. The SolarWinds breach — disclosed just days ago — compromised U.S. government agencies and major corporations by exploiting trusted software

Carl B. Johnson Dec 12, 2020 7 min read