Tag

Zero Trust Security

Zero trust security content examines the principle of never trusting and always verifying every user, device, and connection. Articles explore micro-segmentation, least-privilege access, continuous monitoring, and how organizations transition from perimeter-based defenses to zero trust models.

posts

Remote Desktop Security Risks

Remote Desktop Security Risks That Lead to Breaches

A Single Exposed RDP Port Cost One Hospital Everything In 2023, a regional hospital in Illinois discovered that attackers had been inside their network for over three weeks. The entry point? A single Remote Desktop Protocol (RDP) port left open to the internet. The threat actors used brute-forced credentials to

Carl B. Johnson Nov 08, 2020 6 min read
Cybersecurity for Nonprofits

Cybersecurity for Nonprofits: A Practical Defense Guide

The Breach That Cost a Children's Charity Everything In 2023, Save the Children Federation confirmed it was hit by the BianLian ransomware group, which claimed to have stolen nearly 7 GB of data including financial records, personal information, and medical data. A global nonprofit with significant resources still

Carl B. Johnson Nov 04, 2020 7 min read
Shadow IT

What Is Shadow IT? The Hidden Risk Draining Your Budget

The Breach That Started With a Spreadsheet App In 2023, a midsize healthcare company discovered that an employee had been syncing patient records to an unauthorized cloud storage service for over eight months. The service had no encryption, no access controls, and no audit logging. By the time the security

Carl B. Johnson Oct 27, 2020 7 min read
Securing Employee Mobile Devices

Securing Employee Mobile Devices: A Practical Guide

In 2023, a single compromised employee phone gave threat actors a foothold inside MGM Resorts' network. The attackers used social engineering — a phone call to the help desk — and within hours, they had enough access to deploy ransomware that cost the company over $100 million. The device that started

Carl B. Johnson Oct 27, 2020 7 min read
USB Drive Security Risks

USB Drive Security Risks: Why They Still Bypass Defenses

In January 2022, the FBI issued a public warning that the cybercriminal group FIN7 had been mailing malicious USB drives — disguised as gift cards and COVID-19 guidelines — directly to U.S. companies. The drives contained ransomware. Employees plugged them in. Networks fell. That campaign wasn't some edge case

Carl B. Johnson Oct 10, 2020 6 min read
Cyber Hygiene

Cyber Hygiene Definition: What It Really Means in 2026

A Single Reused Password Cost One Company Everything In 2021, the Colonial Pipeline ransomware attack shut down fuel distribution across the U.S. East Coast. The entry point? A single compromised password on a legacy VPN account that lacked multi-factor authentication. That's not a sophisticated nation-state exploit. That&

Carl B. Johnson Sep 07, 2020 6 min read
Cyber Hygiene Checklist

Cyber Hygiene Checklist: 12 Steps That Actually Work

In 2023, MGM Resorts lost an estimated $100 million after a threat actor called Scattered Spider social-engineered an IT help desk with a ten-minute phone call. No zero-day exploit. No nation-state tooling. Just sloppy basics. That breach — and hundreds like it every year — could have been prevented with a disciplined

Carl B. Johnson Sep 07, 2020 7 min read
Cybersecurity Due Diligence

Cybersecurity Due Diligence: What Most Companies Miss

The $350 Million Wake-Up Call Nobody Expected When Verizon acquired Yahoo in 2017, a previously undisclosed breach affecting 3 billion accounts forced the deal price down by $350 million. That single failure of cybersecurity due diligence became the most expensive cautionary tale in M&A history — and it permanently

Carl B. Johnson Jun 25, 2020 7 min read