Mile2 Cybersecurity Certifications

Trae Johnson

Forum Replies Created

Viewing 15 posts - 1 through 15 (of 96 total)
  • Author
    Posts
  • in reply to: OCU C)SP D Week 02 Lesson 05 Discussion #109610
    Trae Johnson
    Participant

    The year 2020 was a huge wake-up call for cybersecurity. I remember how quickly remote work exposed poor passwords, unsafe Wi-Fi, and phishing attacks. It revealed how ill-prepared the majority of organizations were for an overnight transition. Since then, I have seen increased focus on VPNs, two-factor authentication, and employee training, which has been a giant improvement. That year demonstrated that cybersecurity is not an option but instead, it’s a must to safeguard individuals and businesses.

    in reply to: OCU C)SP D Week 02 Devotion #109454
    Trae Johnson
    Participant

    Reading Matthew 2 and the prophecies of Christ, I am impressed at how specific and detailed the Bible is about the coming of Jesus. The prophecy in Micah about the Messiah to be born in Bethlehem speaks deeply to me, not as history, but as a personal reminder of God’s plan and promise. Thinking about how this little, far off village was specifically chosen from all the places in the world makes me realize the consideration and forethought that God put into His actions. It blows my mind that these prophecies were written hundreds if not thousands of years prior to Jesus’ birth, but every fact was accounted for. This has made me reflect on the reliability of Scripture in a way that goes beyond just reading—it feels like God is speaking directly into history and into my life.

    Beyond His birthplace, I’ve also been struck by the many other messianic prophecies in the Old Testament, from His lineage to the manner of His death. To watch how each of them fit into the life of Jesus causes me to understand in wonder and reassurance that God’s Word is true. To experience them firsthand myself made my own faith stronger and reminds me that God’s Word is not random or by chance. It encourages me daily to hear, believe, and respond to His Word, knowing that His plan had been in process way before I was even conceived.

    in reply to: OCU C)SP D Week 02 Lesson 05 Discussion #109453
    Trae Johnson
    Participant

    In 2020, cyberattacks rose exponentially as organizations coped with the unprecedented remote work shift amid the COVID-19 pandemic. Organizations were struggling to secure home networks, remote endpoints, and cloud infrastructure, while phishing, data breaches, and ransomware attacks surged. Misconfigured clouds, inadequate identity management, and third-party risks also presented significant threats. At the same time, cybercriminals exploited fear and confusion through COVID-titled scams and social engineering, revealing the extent to which many organizations were not prepared for such a mass-scale digital transformation.

    Businesses spent more on cybersecurity technology, automation, and staff education training. Most adopted stronger identity and access management controls, such as multi-factor authentication and least privilege guidelines, to limit damage from a compromised account. Organizations improved patch management, cloud settings were locked down, and vendor control was strengthened to cut supply chain risk. Compliance practices accelerated as privacy law like GDPR gathered momentum, forcing companies to concentrate on information safeguarding and disclosure.

    These responses highlighted a few key lessons: security is as much about people and processes as it is about technology, and visibility across systems is required to mitigate risk. The actions taken in 2020 shifted organizations in the direction of the “zero trust” mindset, with ongoing verification, least privilege, and offense-in-depth to future-proof against threats.

    in reply to: OCU C)SP D Week 02 Lesson 04 Discussion #109452
    Trae Johnson
    Participant

    That is a good definition of the “Fail Securely” principle. I agree that the way an error is processed by a system can be the difference between staying secure and leaking sensitive data. Your example of a detailed error message is just correct—revealing technical details gives attackers exactly what they need to mount an attack. Designing systems to deny access and protect data in case of failure keeps even unwanted issues from generating security intrusions. It’s a simple but efficient principle that reiterates the importance of anticipating failure in all secure system design.

    in reply to: OCU C)SP D Week 02 Lesson 04 Discussion #109419
    Trae Johnson
    Participant

    Among the top 10 OWASP security principles that are significant controls is “**Least Privilege.**” This control avoids users, systems, and programs from having more than they need in order to perform their tasks. Limiting privileges reduces the likelihood of unauthorized access, accidental usage, and exploitation by attackers. For instance, if an attacker takes over a low-level user account, the impact will be low because the account is not an admin account. If there is no such principle governing, one vulnerability might expose a whole system. Least privilege usage also imposes responsibility and enhances overall security posture. Least privilege is a key control that not only safeguards against internal and external attacks but also helps comply with data protection law.

    in reply to: OCU C)SP D Week 01 Lesson 03 Discussion #109418
    Trae Johnson
    Participant

    I would agree that mobile phones have turned indispensable and perilous. With the evolution of AI-powered scams and round-the-clock data harvesting, digital vigilance is more important than ever. Apart from cybersecurity, the psychological and social impacts of excessive use underscore the necessity of boundaries. With responsible use, we can harness the utility of technology without compromising privacy or well-being.

    in reply to: OCU C)SP D Week 01 Lesson 03 Discussion #109417
    Trae Johnson
    Participant

    This is clearly outlined how various threats, from data leakage to phishing and malware, can impact users’ security and privacy. I agree that unsecured networks, outdated software, and excessive app permissions all increase vulnerability. As mobile devices become more connected to other systems, protecting them with updates, strong passwords, and encryption is essential to prevent serious harm.

    in reply to: OCU C)SP D Week 01 Lesson 03 Discussion #109329
    Trae Johnson
    Participant

    Some of the dangers that mobile phones presented in 2022 were malware, phishing, data breaches, and unsecured app permissions. Mobile malware was still increasing, typically hidden in seemingly harmless apps purchased from unauthorized app stores. Installed, the harmful codes had the ability to snatch away user details, track location data, or even take over the device. Phishing was also on the rise, with perpetrators using text messages and fake login pages to trick users into entering sensitive information such as passwords or bank details. Public Wi-Fi networks also posed security threats by allowing data interception by attackers, thus potential identity theft or unauthorized access. Poor app permission management was the second concern. Many apps requested access to microphones, images, or contacts unnecessarily, boosting privacy risks. Finally, outdated operating systems or refusal to update to plug holes for security vulnerabilities exposed other devices to exploits and ransomware. Users must minimize these threats by downloading apps from their original providers, updating devices, using strong passwords and two-factor authentication, and avoiding sharing sensitive data over non-secure networks.

    in reply to: OCU C)SP D Week 01 Lesson 02 Discussion #109328
    Trae Johnson
    Participant

    I wholeheartedly agree that well-delineated, clear-cut policies ensure rapid and coordinated reactions to incidents. Each policy, from detection all the way up to recovery and audit, ensures stability as well as accountability. Via these policies, an organization can respond successfully, contain damage, and improve its security position continuously.

    in reply to: OCU C)SP D Week 01 Lesson 02 Discussion #109327
    Trae Johnson
    Participant

    I would agree that it is concise policies which are the foundation of an effective incident response program. Establishing roles, communication protocols, handling of data practices, and training ensures coordinated and confident action. These actions not only reduce confusion during emergencies but also increase the overall security and resilience of an organization.

    in reply to: OCU C)SP D Week 01 Lesson 01 Discussion #109326
    Trae Johnson
    Participant

    I agree that third-party audits and industry compliance enhance transparency, credibility, and security of a business via an unbiased evaluation. In the same way, industry compliance guarantees consistency, legal safeguarding, and reputation improvement. Together, they create a culture of accountability and continuous improvement that supports long-term success.

    in reply to: OCU C)SP D Week 01 Lesson 01 Discussion #109325
    Trae Johnson
    Participant

    I agree third-party audit ensures positive objectivity, compliance, and trust among stakeholders. Though time- and resource-consuming, the ultimate dividends of long-term credibility, security, and efficiency make it worth the investment.

    in reply to: OCU C)SP D Week 01 Lesson 02 Discussion #109245
    Trae Johnson
    Participant

    A successful incident response is dependent on well-documented policies that provide guidance and specificity at the time of crisis. A well-crafted incident response plan (IRP) should delineate roles, responsibilities, and escalation practices so that each individual—executives to IT staff—knows their part. Incident classification guidelines to identify priorities for response, and logging and monitoring requirements to enable suspicious behavior to be easily identified and investigated, should be encompassed within policies. A data retention and handling of evidence policy is also imperative in a bid to preserve digital evidence for legal or forensic purposes.

    Organizations need good communication and training policies. A communications policy has to determine when and how occurrences are reported within the company, when the customers or regulators are notified, and how sensitive data is handled to prevent panic or liability. Regular training and simulation exercises prepare employees to react effectively to real threats like ransomware or phishing. Finally, a post-incident review policy takes responsibility in making workers accountable for learning from the incident, plugging gaps, and making defenses stronger in the future. Together, these policies make response efforts less chaotic and more an effective defense against cyber threats.

    in reply to: OCU C)SP D Week 01 Lesson 01 Discussion #109244
    Trae Johnson
    Participant

    Third-party audits are incredibly valuable because they provides a purely objective, external view of an organization’s security stance. Internal personnel might too easily ignore blind spots or become accustomed to lacking processes, but a third-party audit forces us to look at systems, policies, and controls with a fresh perspective. Such audits can identify vulnerability, misconfigurations, or incident response weaknesses that may otherwise go undetected until acted upon by an actual attacker. Besides detection, they also verify whether the security processes in the organization comply with industry standards and current threats.

    Another critical benefit of third-party audits is that they verify and maintain industry compliance. Whatever the framework is – ISO 27001, NIST, HIPAA, PCI DSS, or SOC 2 – most of the compliance activities require third-party verification. Proper execution of an audit not only confirms regulatory adherence but also creates trust with partners, customers, and stakeholders. It signals that the organization is dedicated to responsibility and is committed to ensuring sensitive data is safe. This kind of trust frequently becomes a significant competitive advantage, especially in sectors where data protection is a key deciding factor for clients. Finally, third-party audits not only plug security loopholes but also establish the reputation and strength of the organization.

    in reply to: OCU C)SP D Week 01 Devotion #109243
    Trae Johnson
    Participant

    To me, He is not some historical figure or “good man”—He is my Savior. It is a hope to me to learn that He was born sinless and offered Himself as the perfect sacrifice, that my sins are truly forgiven. I know that I cannot be the same after receiving Him; I have to live in a way that would show His holiness, serving through the gifts that He has given me and growing day by day in His Word. Jesus is not One to be just known—He is the One who has changed my life and is still calling me close.

Viewing 15 posts - 1 through 15 (of 96 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.