Brian Petzold

2 min read

Tricky Phish Testing

Phishing remains one of the top threats to organizations today. Every user regularly receives emails designed to trick them into clicking on a link, opening an attachment, or providing credentials to critical systems. If a single user falls for such...

Read More

2 min read

Training Your Board

Being on the board of a financial institution is not easy. Board members are expected to not only be knowledgeable about the operational and...

Read More

2 min read

Choosing a Cybersecurity Framework

It is a good practice to identify a cybersecurity framework as part of an institution’s Information Security Program. A framework helps to identify...

Read More

2 min read

Breaking the SMS Habit

Multifactor Authentication (MFA) is one of the most important controls to block account takeover fraud. There are many different forms of MFA...

Read More

2 min read

The Policy Labyrinth

You started with an Information Security Policy that covered the basics. Then one day an auditor walked in and asked to see your Data Destruction...

Read More

1 min read

Learning Not to Trust

Most of our IT infrastructures were built to trust. From the time users sign on in the morning until they log off at the end of the day, the network...

Read More

2 min read

What is "Best Practice"?

Over the years, I have become wary of the term “best practice” when it is applied to technology and cybersecurity. The term “best practice” is...

Read More

2 min read

Guidance on Obsolete Encryption Protocols

Networks rely on encryption to ensure that data is kept private and cannot be changed while at rest or in transit. In most cases this encryption...

Read More