Brian Petzold

Cyber Attacks

2 min read

How Cyber-Attacks Start (Part 2)

In Part 1 of this series we started to look at some of the tactics that attackers use to initially gain access to systems in your institution. The attack tactics are based on the MITRE ATT&CK Framework, which is used by many security professionals...

Read More
CyberAttacksP1

2 min read

How Cyber-Attacks Start (Part 1)

There are many types of cyber-attacks used by criminals today. Financial institutions should employ a layered approach to defending against these...

Read More
Insider Breach

1 min read

The Biggest Insider Breach

While we tend to think of breaches by insiders as an employee intentionally stealing data, the truth is that most insider breaches occur when...

Read More
WhenApplyingAPatch

2 min read

When Applying a Patch isn't Enough

One common situation that we see occurring in financial institutions is that IT departments apply patches diligently, but that vulnerability...

Read More
HowTo_DataClassification

2 min read

How to Create a Data Classification Policy

Every financial institution should have a data classification policy that defines classes of data based on risk. The policy should also define how...

Read More