As a result of the incident, John's company implemented new security policies, including mandatory code reviews, stricter access controls, and regular security audits. John, on the other hand, became a passionate advocate for secure coding practices and made sure to double-check his repositories for any sensitive information before pushing them to GitHub.