Tag

Zero Trust Security

Zero trust security content examines the principle of never trusting and always verifying every user, device, and connection. Articles explore micro-segmentation, least-privilege access, continuous monitoring, and how organizations transition from perimeter-based defenses to zero trust models.

posts

Shadow IT

What Is Shadow IT? The Hidden Risk You Can't Ignore

Your Employees Already Built a Second IT Department In 2023, a Gartner survey found that 41% of employees acquired, modified, or created technology outside of IT's visibility. By now, that number has only grown. If you're asking what is shadow IT, the short answer is this:

Carl B. Johnson Sep 08, 2019 7 min read
Cyber Hygiene

Cyber Hygiene Definition: What It Really Means in 2026

A Preventable Breach That Started With One Reused Password In 2024, the breach at Change Healthcare disrupted pharmacy operations across the United States for weeks. The root cause? A compromised credential on a system that lacked multi-factor authentication. That single gap — a basic cyber hygiene failure — led to one of

Carl B. Johnson Aug 20, 2019 6 min read
Cyber Hygiene Checklist

Cyber Hygiene Checklist: 12 Steps That Actually Work

In 2023, MGM Resorts lost an estimated $100 million after a social engineering attack that started with a single phone call to a help desk. The attackers didn't exploit a zero-day vulnerability. They didn't write exotic malware. They called IT support, impersonated an employee, and got

Carl B. Johnson Aug 20, 2019 7 min read
Supply Chain Attack Examples

Supply Chain Attack Examples That Changed Cybersecurity

In December 2020, security firm FireEye disclosed that threat actors had compromised SolarWinds' Orion software platform — and with it, roughly 18,000 organizations that installed a poisoned update. Government agencies, Fortune 500 companies, and critical infrastructure operators all got hit through a single trusted vendor. That's the

Carl B. Johnson Aug 14, 2019 6 min read
Cybersecurity

Cybersecurity in 2026: What Actually Works Now

The Breach That Changed How I Think About Cybersecurity In February 2024, Change Healthcare suffered a ransomware attack that disrupted insurance claims processing for hospitals and pharmacies across the United States. UnitedHealth Group confirmed the breach affected approximately 100 million individuals — making it one of the largest healthcare data breaches

Carl B. Johnson Feb 25, 2019 6 min read
Security of Cyberspace

Security of Cyberspace: What Actually Works in 2026

In February 2024, Change Healthcare — one of the largest health payment processors in the United States — suffered a ransomware attack that disrupted pharmacy operations, delayed insurance claims, and exposed the protected health information of roughly 100 million people. One set of stolen credentials. No multi-factor authentication on a critical system.

Carl B. Johnson Feb 25, 2019 6 min read
Cybersecurity Tips

Cybersecurity Tips That Actually Stop Breaches in 2026

In 2024, the average cost of a data breach hit $4.88 million globally, according to IBM's Cost of a Data Breach Report. That number didn't come from sophisticated nation-state attacks or exotic zero-days. Most of those breaches started with stolen credentials, a phishing email, or

Carl B. Johnson Feb 25, 2019 6 min read