We are seeing findings related to change management cropping up in several audit reports this year. Appropriately scoping change management can be tricky in smaller financial institutions which do...
Stephanie Goetz
Recent Posts
The Scare of Miscellaneous Errors
by Stephanie Goetz | Oct 30, 2020
We’ve all heard about the latest big vulnerabilities, end of life software or compromised passwords as the cause of breaches. However, another pattern is emerging for the financial and insurance...
CISA's Ransomware Guide Takeaways
by Stephanie Goetz | Oct 9, 2020
Ransomware has become more common in the past year with the hackers constantly changing tactics, such as moving from infecting backups to deleting them altogether and evolving ransomware variants....
The Most Underrated Control in Information Security
by Stephanie Goetz | Sep 11, 2020
The access review is the most underrated control in the Information Security Officer’s toolkit. We hear so much about threat intelligence, vulnerability management, and fancy tools that monitor this...
Lessons from the First American Financial Corporation Breach
by Stephanie Goetz | Jul 31, 2020
On July 21, 2020, the New York State Department of Financial Services (NYDFS) issued charges against First American Financial Corporation, a California based company, which provides title insurance...
Mobile Device Security
by Stephanie Goetz | Jun 19, 2020
Work and personal lives continue to blend as many employees are working from home and social distancing. Mobile devices, specifically phones, are already a key part of our personal lives because...
Managing Your Outsourced IT Provider
by Stephanie Goetz | May 22, 2020
Many banks have the need for IT expertise, which these days is difficult to attract and expensive to find in a full time employee. The answer to finding the talent needed at an affordable cost has...
Planning for Reopening in COVID-19
by Stephanie Goetz | May 1, 2020
Many states industries, and businesses are beginning to talk about reopening to mitigate some of the impacts of COVID-19. While many are feeling beyond ready for life to go back to ‘normal’,...
Top 5 Ways Cybercriminals are Exploiting COVID-19
by Stephanie Goetz | Apr 10, 2020
We knew this was coming; in my inbox today landed the threat intelligence we have been expecting, which is the most common ways cybercriminals are using fear and uncertainly to hack people and...
Remote Work Security
by Stephanie Goetz | Mar 20, 2020
In this age of quarantines and social distancing, many organizations are just beginning or expanding remote work capabilities. As always, along with whatever moves we make the hackers are not far...