Stephanie Goetz

2 min read

Five Findings from the 2023 IBM Security Cost of a Data Breach Report

I was reviewing the 2023 IBM Security Cost of a Data Breach Report this week and wanted to share some findings I found interesting. This report is published annually and that follows organizations of all industries and sizes to find threats and...

Read More

2 min read

NIST Cybersecurity Framework 2.0 Draft Updates

The NIST Cybersecurity Framework (CSF) was initially developed in 2014 and was intended to be a living document, dependent on feedback from...

Read More

2 min read

Business Email Compromise: Attacks Immune to Multi-Factor Authentication

They’ve come back around…those business email compromises, which were all too common in the late 2010s.

Read More

1 min read

Three Options to Implement Phish Resistant Multi-Factor Authentication

Since the pandemic and the rise of work at home, we have become very familiar with Multi-Factor Authentication (MFA). Typically, this is implemented...

Read More

2 min read

Should Financial Institutions have a BISO Program?

A BISO (Business Information Security Officer) is an ombudsman for business lines across an institution. This person is responsible for representing...

Read More

2 min read

Tools to Check Out in the Cybersecurity Resource Guide

Last week, we saw the Federal Financial Institutions Council (FFIEC) announce an update to its Cybersecurity Resource Guide. It was originally...

Read More

2 min read

Charging Dr. Ransomware

Moises Luis Zagala Gonzalez, a 55-year-old Venezuelan cardiologist, has been charged with developing the Jigsaw v.2 and Thanos ransomware strains,...

Read More

3 min read

Change, Conflict and Culture

We have many institutions either going through or coming out of a large amount of change. It seems like there’s always some new guidance, product, or...

Read More

2 min read

What Does it Mean to be a Good Partner?

While the definition of a partner is fairly broad, its principles apply to a very broad spectrum of relationships. In the cybersecurity realm, this...

Read More

2 min read

What You Can do About the Okta Compromise

News this week brought us word of something very disappointing, a breach in a large player in the identity services company, Okta. If I’m being 100%...

Read More