Brian Petzold

2 min read

Choosing a Cybersecurity Framework

It is a good practice to identify a cybersecurity framework as part of an institution’s Information Security Program. A framework helps to identify gaps that might exist and leave the institution vulnerable. But there are numerous frameworks...

Read More

2 min read

Breaking the SMS Habit

Multifactor Authentication (MFA) is one of the most important controls to block account takeover fraud. There are many different forms of MFA...

Read More

2 min read

The Policy Labyrinth

You started with an Information Security Policy that covered the basics. Then one day an auditor walked in and asked to see your Data Destruction...

Read More

1 min read

Learning Not to Trust

Most of our IT infrastructures were built to trust. From the time users sign on in the morning until they log off at the end of the day, the network...

Read More

2 min read

What is "Best Practice"?

Over the years, I have become wary of the term “best practice” when it is applied to technology and cybersecurity. The term “best practice” is...

Read More

2 min read

Guidance on Obsolete Encryption Protocols

Networks rely on encryption to ensure that data is kept private and cannot be changed while at rest or in transit. In most cases this encryption...

Read More

2 min read

The Powerful GLBA Board Report

When the Gramm-Leach-Bliley Act was implemented, each regulatory agency adopted a set of interagency guidelines and regulations required for...

Read More