They’ve come back around…those business email compromises, which were all too common in the late 2010s. Unfortunately, we have seen many of these in recent weeks, even with multi-factor...
Stephanie Goetz
Recent Posts
Business Email Compromise: Attacks Immune to Multi-Factor Authentication
by Stephanie Goetz | Jul 21, 2023
Three Options to Implement Phish Resistant Multi-Factor Authentication
by Stephanie Goetz | Mar 17, 2023
Since the pandemic and the rise of work at home, we have become very familiar with Multi-Factor Authentication (MFA). Typically, this is implemented as a One-Time Password (OTP) delivered via an...
Should Financial Institutions have a BISO Program?
by Stephanie Goetz | Feb 17, 2023
A BISO (Business Information Security Officer) is an ombudsman for business lines across an institution. This person is responsible for representing the business requirements, controls, and...
Tools to Check Out in the Cybersecurity Resource Guide
by Stephanie Goetz | Oct 14, 2022
Last week, we saw the Federal Financial Institutions Council (FFIEC) announce an update to its Cybersecurity Resource Guide. It was originally released in 2018 and intended to be a resource to...
Charging Dr. Ransomware
by Stephanie Goetz | Aug 12, 2022
Moises Luis Zagala Gonzalez, a 55-year-old Venezuelan cardiologist, has been charged with developing the Jigsaw v.2 and Thanos ransomware strains, which would make him one of the most productive...
Change, Conflict and Culture
by Stephanie Goetz | Jul 15, 2022
We have many institutions either going through or coming out of a large amount of change. It seems like there’s always some new guidance, product, or environmental change we find ourselves up...
What Does it Mean to be a Good Partner?
by Stephanie Goetz | Apr 29, 2022
While the definition of a partner is fairly broad, its principles apply to a very broad spectrum of relationships. In the cybersecurity realm, this can apply to any third-party relationship such as...
What You Can do About the Okta Compromise
by Stephanie Goetz | Mar 25, 2022
News this week brought us word of something very disappointing, a breach in a large player in the identity services company, Okta. If I’m being 100% honest here, it was an unfortunate eventuality...
Russian Cyberthreats
by Stephanie Goetz | Feb 25, 2022
This week the threat from Russia to the Ukraine has turned to reality. The attack was preceded by cyber threats probably long before the physical threat was known. It most likely began with the same...
Keep an Eye on API Security
by Stephanie Goetz | Nov 5, 2021
Application programming interfaces, or APIs, enable applications to exchange data and functionality easily with other applications and users in or outside an organization. Examples of APIs you may...