A guide for every employee. No technical background required When most people imagine a data breach, they picture a shadowy hacker in a dark room breaking through layers of high-tech defenses, not an insider. The reality is far less dramatic and far closer to home. According to cyber security researchers, most data incidents don’t begin […]
Identity Abuse The New Face of Fraud
Identity abuse is the deliberate misuse of someone’s personal or organizational identity to gain access, steal money, or manipulate systems. In cybersecurity terms, it’s what happens when an attacker successfully impersonates a real person (an employee, a vendor, a customer, even a board member) and uses that stolen or spoofed identity to bypass defenses built […]
Part Three “A Cyber Security Parable: The Turn Toward Safety”
Who thought a cyber security breach could affect your perception of time? The days and weeks after the loss felt longer than the years before it. Lindon County kept running because it had to. The jail still opened its doors every morning. The court still processed filings. Roads still need repair. Budgets still had to […]
Part Two “A Cyber Security Parable: The Call That Changed Everything”
The first sign wasn’t a cyber security red alert. It was a normal phone call. It came in on a Wednesday afternoon, the kind of afternoon where everything felt slightly behind schedule, and no one could remember the last time they ate lunch at a normal time. Janelle in Accounts Payable picked up the call […]
A Cyber Security Parable: A Click That Triggered a Disaster
Cyber Security Part One: The Criminals (How They Pick Lindon County) They didn’t start with Lindon County because they hated it or thought its cyber security was weak. They started with Lindon County because it was there. A county of 38,000 doesn’t look like a jackpot at first glance. It looks like a place with […]
Insider Threats: Trusted to Dangerous and How to Stop Them
Insider threats are the cyber risks that live behind your login screen. They are not always malicious or obvious. An insider threat is any security incident caused by someone with legitimate access to your organization’s systems, data, or facilities. That can mean an employee, contractor, intern, vendor, or even a well-meaning volunteer. If they can […]






