The Cloud’s Silent Killer: Misconfigured Defaults

shannon cloud security

When you think of a data breach, you might envision elite hackers executing sophisticated attacks. However, the reality is far more alarming and preventable. Most breaches are the result of basic, avoidable misconfigurations, such as open buckets and overly broad permissions. These are mistakes anyone can make, and attackers are counting on it.

It’s tempting to trust default settings, they feel safe, like the standard path everyone takes. But most cloud defaults are built for quick setup, not lasting security. If you let them go unchecked, you’re leaving the door wide open for disaster.

The Usual Suspects

Let’s talk specifics. Over and over again, these defaults show up in post-mortem reports:

  • Open storage buckets and blobs: Data storage left publicly accessible, sometimes with read and write permissions wide open. Attackers do not need to guess. They simply scan and find these vulnerabilities.
  • Overly permissive IAM roles: The infamous *:* permission set (which allows access to all resources), granting far more access than necessary. It only takes one compromised credential to turn this into a complete takeover of the environment.
  • Unrestricted security groups: Allowing traffic from “anywhere, any time” because it worked during testing… and then nobody locked it down.

These aren’t rare oversights. They’re everywhere, so common that attackers make a living scanning the internet for them. If you don’t fix them, it’s only a matter of time before someone else finds them first.

Why Defaults Are So Dangerous

  1. They lure you into a false sense of security, making you believe all is well until it’s far too late.
    Teams assume that “default” means “safe enough.” But in reality, cloud vendors prioritize usability over airtight security.
  2. They scale the wrong way.
    What seems harmless in one instance becomes catastrophic when duplicated across dozens of accounts, regions, and services.
  3. They’re hard to spot once deployed.
    Without deliberate reviews, defaults blend into the noise. They look “normal,” even when they’re wide open.

Breaking the Cycle

So how do you stop defaults from turning into disasters?

  • Audit your configurations against standards. Frameworks like CIS Benchmarks exist for a reason. They help ensure your usual settings are not leaving the door wide open.
  • Enforce least privilege from the start. Treat it as your default stance. Add access only when necessary, and remove it just as quickly.
  • Build guardrails into Infrastructure as Code. With tools like Terraform, CloudFormation, or ARM templates (methods for defining infrastructure settings in code), you can embed security policies that prevent dangerous defaults from being introduced unnoticed.
  • Automate reviews and alerts. Cloud-native tools (such as AWS Config, Azure Policy, or GCP Security Command Center services) and third-party scanners can flag risky defaults before attackers do.

The Martial Arts Parallel

In martial arts, the stance you start with can determine the fight. A weak stance means you begin off balance before your opponent moves.

Cloud defaults work the same way. If you start with insecure settings, attackers already have the upper hand before you realize there’s a problem.

Closing Thoughts

The cloud makes it easy to move quickly, but speed without careful planning can be risky. Default settings may save you time, but they also make things much easier for attackers. Cloud security is not about dramatic battles or brilliant hackers. It is about consistently following basic best practices. Never assume that default means secure. Take responsibility and set your own standards.

Fueling Your Cybersecurity: How To Eat Right for Cyber Success

Cybersecurity incidents don’t care how well you slept or ate. They happen anytime. If your body feels slow, your mind will too.

That’s why nutrition isn’t just about physique or gym numbers. It’s about resilience.

A strong body fuels a sharp mind, which makes you a stronger IT professional.

Before jumping in, you might ask: how do you build nutrition habits that fuel performance, even under pressure? Let’s break it down with these five rules:

Rule #1: Always Eat Protein First

If there’s one macro nutrient that changes everything, it’s protein. Most people under-eat it, even those who train.

  • Why it matters: Protein saves muscle, keeps you full longer, and helps your body burn more calories.
  • Aim for .75 to 1g per pound of lean or target body weight. Spread it across meals: eggs at breakfast, chicken or beef at lunch, fish at dinner, or a shake if needed.

Think of protein like a system update: without it, your body gradually weakens until you notice it, and by then it’s too late.

Carbs, like protein, provide 4 calories per gram.

Carbs get demonized needlessly. If you train hard, they’re your gas pedal—not optional.

  • Performance: Carbs fuel high-intensity efforts (CrossFit, sprints, heavy lifts). They refill glycogen so your “engine” doesn’t sputter.
  • Focus: Complex carbs—including all fruits, vegetables, and grains like rice—keep blood sugar steady. That means steady energy and fewer crashes.

The key isn’t cutting carbs. What matters is eating quality carbs at the right times.

  • Hard training days? Eat more.
  • Recovery days? Dial it back a bit.

Rule #3: Fats – The Slow-Burn Energy Source

Fats do not give quick energy like carbs, but they help you last longer. Fats are essential for hormone production, brain function, and recovery.

  • Prioritize avocados, nuts, olive oil, walnut oil, and sesame oil, as well as grass-fed, wild-caught and free-range meats.

Most people do well with 20–30% of their calories from fat. That’s enough for health but not too much.

Rule #4: Hydration = Cognitive Uptime

Mild dehydration tanks focus faster than hunger. For IT pros, that’s dangerous.

  • Target: ½ gallon per day minimum.
  • Use electrolytes during long training or extended incident calls.

Think of hydration as uptime. Skip it, and your system crashes.

Rule #5: Structure Beats Willpower, Every Time

No one does well by guessing. Like securing a system, lasting results come from discipline and routine.

  • Meal prep → Simple, repeatable meals built ahead of time.
  • Macro targets: track for a few weeks until you get the feel.
  • Boundaries: Sleep, fuel, and downtime are mandatory security controls.

The goal is not perfection; it’s persistence. Remember, chasing perfection can actually slow your progress. Aim for 80 to 90 percent consistency for the best results.

Closing Thoughts

Nutrition is about training, discipline, and resilience, and it all starts with each meal.

Forget fad diets, quick fixes, and guilt. Focus on what helps you daily: sufficient protein, good carbs, healthy fats, water, and sticking to a plan that eliminates guesswork.

Anyone with a strong body and sharp mind doesn’t just survive the grind; they thrive in it.

Soon, I’ll show you how to build simple, sustainable meal prep systems. You can protect your body and mind just like you protect your network: with structure and planning.

Do You Even Eat Bro? Why Meal Prep Is Security for Your Health

matt shannon_nutrition crossfit
  • Plan ahead, or get hacked by junk food. If you don’t have meals ready, DoorDash or the vending machine will win.
  • Build guardrails, or chaos takes over. Structure (shopping lists, prepped meals, set eating windows) keeps you from drifting.
  • Stay consistent, and resilience follows. Just like training or cybersecurity, it’s the boring reps that make you strong when it counts.
nutrition for busy professionals
discipline_paleo fitness_crossfit

That’s why I still fall back on three rules that anyone can run with:

  1. Prep protein in bulk → Grill or roast a few pounds of chicken, beef, or fish. Protein is the foundation; everything else is garnish.
  2. Keep easy fruits & veggies on hand → Frozen, bagged, or pre-chopped. Don’t overcomplicate it. Rotate what you like.
  3. Don’t skip fats → Avocado, olive oil, nuts. They keep your hormones happy and your brain sharp when the day gets heavy.

Training the Body, Training the Mind: Why Security Pros Need Both

training the body trains the mind

The Martial Artist’s Guide to Cloud Security

matt shannon security pro
the supreme art of war

Top 5 Cybersecurity Mistakes I See Every Week (and How to Fix Them)

1. Weak or Reused Passwords

mike epps, top flight security, friday after next

The problem: People still lean on “123456” or reuse the same password across 10 accounts. Attackers love this.
The fix: Use a password manager and enable multi-factor authentication (MFA) everywhere it’s offered.

2. Ignoring Updates and Patches

The problem: That little “remind me later” button gets clicked… and suddenly, a known vulnerability is wide open for weeks.

The fix: Automate updates where possible. For servers and enterprise systems, schedule a patch management routine — monthly at minimum.

3. Cloud Misconfigurations

the breakdowns can be voluminous

The problem: Buckets, blobs, and databases left wide open to the internet. It’s not just bad practice — it’s a breach waiting to happen.
The fix: Review permissions regularly. Use least privilege access. Run configuration scans against frameworks like CIS Benchmarks.

4. Phishing Clicks

who's got your six? matt shannon security pro

The problem: A single click on a fake invoice or “urgent” email can compromise a network. It still works because people are busy and distracted.
The fix: Train employees continuously, not just once a year. Teach them to hover over links, verify senders, and report suspicious emails.

5. Lack of Logging and Monitoring

The problem: Breaches often go undetected for weeks because no one’s watching the logs.
The fix: Centralize your logging (think SIEM, EDR, or even cloud-native tools) and set alerts for suspicious activity. Logs don’t stop attacks — but they stop you from being blind.

Closing Thoughts

New Deadlift PR: 234kg/515lbs for a Double

162 Hours on Udemy, Building the Foundation for a Career in Pentesting

When I first clicked “Enroll,” I didn’t know it would add up to 162 hours of training.
That’s almost a full month of time — stolen from late nights, weekends, and early mornings before work.

Udemy became my training ground. Not glamorous, not perfect, but consistent.
Over time, those 162 hours weren’t just “video time.” They became hours of repetition, frustration, and slow understanding.

There’s a phase in every learner’s path where you stop studying for a test and start thinking like the work.

That’s what those hours taught me, how to reason through a network like a puzzle, how to see the seams where systems and people meet, how to build patience in a field where curiosity is the only constant.

Looking back, those 162 hours weren’t just prep for certification. They were the price of entry, not into a career, but into a mindset.

Every scan that failed, every lab that wouldn’t load, every problem that took three days instead of three hours, they were all small rehearsals for the real work ahead.

Enhance Your Olympic Weightlifting with Traditional Strength Training & Post Activation Potentiation (PAP)

This 8-week program is designed to improve overall strength, explosive power via Type IIx muscle fiber development, and speed in the clean using traditional strength training methods and post activation potentiation (PAP). PAP involves performing heavy strength exercises followed by explosive movements to enhance neuromuscular performance.

Program Structure & Purpose of This Method of Training

  • Weeks 1-4: Strength and Hypertrophy Focus

Builds a solid foundation of strength in the specific movements and build overall muscle mass.

Emphasis is on moderate to heavy weights with traditional strength training methods.

  • Weeks 5-8: Explosive Strength and Speed

Increase the focus on explosive movements and speed.

Utilize PAP techniques to develop explosiveness in the lifts and maximize power output.

Weekly Training Schedule

Monday: Strength and Clean Technique

  1. Clean: 5 x 3 reps dropping each rep from the top, focusing on as close to perfect reps every set

Focus on technical perfection/bar control in all positions.
Intensity: 70-80% of 1RM; rest 2-3mins between sets

B. Front Squat: Sets: 4

Reps: 6-8 (Weeks 1-4)

Reps: 4-6 (Weeks 5-8)

Intensity: 75-85% of 1RM

C. Romanian Deadlift – sets: 3 x 8-10; rest 2

D. Pull-Ups Sets: 4 x reps: 8-10 (weighted if possible); rest :90secs

E. Trunk Work – Russian Twists & leg raises – sets: 3 x 15-20; rest 1min b/t sets

Tuesday: Traditional Strength and PAP

  1. Back Squat 5 x 5; rest 2-3 mins b/t sets — Intensity: 80-85% of 1RM
  2. Clean Pull (Heavy) Sets: 4 x 3 — Intensity: 90-110% of clean 1RM
    PAP Complex: 3 sets
    C1. Heavy Back Squat: 3 reps at 85-90% of 1RM
    C2. MAX Vertical Jump: 3-5 reps immediately after each squat set; Rest: 2-3 minutes between complexes
    D. Shoulder Press: Sets: 4 x 6-8

Wednesday: EASY MAP 10/Active Recovery/Mobility

MAP 10 for 30-45 minutes or mobility work and stretching focusing on hips, shoulders, and ankles

Thursday: Strength and Clean Technique

  1. Clean: Sets: 5 x 3

Intensity: 75-85% of 1RM

Focus on bar control in the first pull and FINISHing the second pull with maximal bar speed.

B. Deadlift – Sets: 4

x 5-6 (Weeks 1-4)

x 3-4 (Weeks 5-8)

Intensity: 80-90% of your CLEAN DL 1RM

C. Push Press – Sets: 4 x 6-8

D. Barbell Rows – Sets: 4 x 8-10

E. Trunk Work (Hanging Leg Raises, Side bends with empty bar on your back) – Sets: 3 x 15-20

Friday: Explosive Strength and PAP

PAP Complex: 3 sets

A1. Heavy Front Squat – 3 reps at 85-90% of 1RM; rest :10secs

       A2. Clean from Blocks: 3 reps (at 60-75%) immediately after each squat set; rest: 2-3 minutes between complexes

B. EXPLOSIVE Box Jumps 3 x 5; focus on one rep at a time being as explosive as possible; rest 1 min

C. Push Jerk 4 x 4-6; rest 2

D. Glute Ham Raise 3 x 15

Saturday: Accessory Work and Recovery

  1. Snatch Technique work (Light) 5 x 3 – Intensity: 60-70% of 1RM
  2. Overhead Squat 4 x 6-8
  3. Seated Dumbbell Shoulder Press 3 x 12-15

    D1. Banded Face Pulls 3 x 15; rest 0
    D2. Banded upright rows 3 x 15; rest 1

Sunday: Rest and Recovery
Full rest day to allow for recovery and muscle repair.

Detailed Program Highlights and Emphasis

Weeks 1-4: Strength and Hypertrophy Focus

Volume and Intensity:

Higher volume with moderate to heavy weights.

Focus on building a strong foundation with hypertrophy and strength work.

Snatch & Clean Technique:

Emphasize proper form and technique in the snatch & clean.

Use moderate weights to allow for technique improvements.

Traditional Strength Training:

We’ve incorporated compound lifts like squats, deadlifts, and presses to build overall strength. We also routinely rotate accessory exercises that target specific muscle groups to build positional strength.

Weeks 5-8: Explosive Strength and Speed

Volume and Intensity:

Increase intensity with heavier weights and lower reps.

Focus on explosive movements and speed strength.

Snatch + Clean & Jerk Technique:

Continue emphasizing technique but increase intensity to prepare for maximal lifts.

Post Activation Potentiation (PAP):

Use PAP complexes to enhance explosive power.

Perform heavy strength exercises followed by explosive movements to maximize power output.

Plyometric Training:

Incorporate plyometrics once a week to improve explosiveness and speed.

Exercises like box jumps and cleans from blocks complement the strength work.

Recovery and Nutrition — all around the world it’s the same song, it’s the same old song!

Sleep – Aim for 7-9 hours of quality sleep per night to support muscle recovery and growth.

Nutrition – Protein: Consume 1.6-2.2 grams of protein per kilogram of body weight daily to support muscle repair.

Carbohydrates: Ensure adequate carbohydrate intake to fuel workouts and replenish glycogen stores. Include complex carbs like whole grains, fruits, and vegetables.

Healthy Fats: Incorporate healthy fats from sources like avocados, nuts, seeds, and olive oil to support overall health and hormone production.

Hydration – Stay well-hydrated to maintain performance and facilitate recovery. Don’t forget your electrolytes!

Active Recovery – Incorporate light activities such as MAP 10, kayaking, swimming, walking, yoga, or stretching on rest days to promote blood flow and reduce muscle soreness.

Monitoring Progress

Tracking your progress is essential for adjusting your program and ensuring continuous improvement.

Use a training log to record your workouts, including weights used, sets, reps, and any relevant notes on how you felt during each session.

Regular Testing: of your 1RMs to gauge strength improvements and adjust training intensities accordingly.

Adjustments – be sure to make them based on your progress and recovery. Then you can modify variables such as intensity, volume, and exercise selection to avoid plateaus and continue to make training fun and make sure youre maximizing your gains.

Final Thoughts

This 8-week Olympic weightlifting program combines traditional strength training with post activation potentiation (PAP) to enhance strength, explosive power, and speed in the and clean. By following this structured and periodized approach, you can achieve significant improvements in your lifting performance. Stay consistent, prioritize proper form, and adjust the program as needed to continue progressing toward your Olympic lifting goals. I hope you’ve enjoyed this article and that you find it beneficial in your training. Ive been writing individual and team/group training plans for almost two decades and am very passionate about helping folks achieve their goals. If you need helping to achieve your goals let me know and Id be happy to help you, too. Until next time, all the best!

The Top Nine Ways to Avoid Being Hacked: Essential Tips for Staying Safe Online

Cyber threats are everywhere. Learn nine expert-approved cybersecurity practices, from password hygiene to phishing prevention, that help protect your data, privacy, and peace of mind.

In today’s hyperconnected world, being hacked isn’t just a risk — it’s a near inevitability if you’re not prepared. Whether you’re an individual, a small business owner, or part of a larger organization, protecting your data should be a daily habit, not an afterthought.

Hackers exploit the smallest cracks: weak passwords, outdated software, and misplaced trust. The good news? A few consistent habits can make you a far harder target.

Here are nine proven ways to reduce your risk of being hacked, simple, practical, and backed by modern cybersecurity best practices.

  1. Use Strong, Unique Passwords

Weak or reused passwords remain one of the top causes of account compromise.
A strong password should be:

  • At least 12 characters long
  • Include a mix of upper and lowercase letters, numbers, and symbols
  • Avoid personal details like your pet’s name or birthday

Pro Tip: Use a password manager to create and store unique credentials safely — it’s far more secure than your memory (or sticky notes).

2. Enable Multi-Factor Authentication (MFA)

If passwords are your front door, MFA is your deadbolt.
This simple tool requires an additional verification step — like a text message code or an authentication app prompt — before granting access.

Even if a hacker steals your password, MFA can stop them cold.
Enable it everywhere you can: email, banking, social media, and especially your work accounts.

  1. Keep Software and Systems Updated

Cyber attackers love outdated software — it’s like an open window.
Enable automatic updates on your devices, browsers, and security tools to patch vulnerabilities before attackers can exploit them.

Updates aren’t annoyances; they’re armor.

4. Spot and Stop Phishing Scams

Phishing remains the #1 way users get hacked.
Attackers use fake emails or messages that mimic trusted sources to trick you into clicking malicious links or revealing credentials.

Stay sharp:

  • Check sender addresses carefully
  • Hover over links before clicking
  • Be skeptical of urgent or emotional language (“Your account will be suspended!”)
  • When in doubt, contact the organization directly

Education here pays off, once you’ve spotted a good phish, you’ll never unsee the patterns.

  1. Secure Your Home Network
  • Your Wi-Fi router is the gateway to everything on your home network.
  • Change the default password immediately after setup.
  • Use WPA3 encryption (the most secure standard).
  • Disable WPS and consider hiding your SSID.
  • Set up a guest network to isolate visitors and IoT devices.

A few minutes of setup can close the door on thousands of automated attacks.

  1. Use a Virtual Private Network (VPN)

When connecting to public Wi-Fi (airports, cafes, hotels) use a VPN to encrypt your internet traffic. This prevents hackers from intercepting data like login credentials and personal info.

Choose a reputable, paid VPN provider. (Free ones often collect your data instead of protecting it.)

7. Be Mindful of What You Share Online

Every social post is a breadcrumb. Hackers use personal details to guess passwords, craft phishing messages, or reset your accounts.

Limit what you share publicly, especially location check-ins and birthdates.
Remember: oversharing fuels social engineering — the human side of hacking.

  1. Regularly Back Up Your Data

Ransomware doesn’t work if your data is safely backed up.
Use the 3-2-1 rule:

  • 3 total copies of your data
  • 2 different storage types (cloud + external drive)
  • 1 kept offline

Automate backups and test them occasionally — a broken backup is no backup at all.

9. Educate Yourself and Your Circle

Technology changes fast — human habits change slowly. Stay updated on emerging threats, and share what you learn with coworkers, friends, or family.

Security awareness training and cybersecurity newsletters are excellent ongoing resources.

Cybersecurity is everyone’s job. The more we all understand, the safer we all become.

Final Thoughts

Avoiding being hacked isn’t about paranoia — it’s about preparation.
Each of these habits strengthens your security posture one layer at a time.

Think of cybersecurity as compound interest: small daily actions, multiplied over time, create unbreakable resilience.

Stay curious. Stay cautious. Stay secure.

*Updated October 2025: refreshed to reflect updated security practices for the modern threat landscapes.