Stephanie Goetz

Recent Posts

Does your Change Management Process Need a Conversion?

by Stephanie Goetz | Dec 4, 2020

We are seeing findings related to change management cropping up in several audit reports this year. Appropriately scoping change management can be tricky in smaller financial institutions which do...

The Scare of Miscellaneous Errors

by Stephanie Goetz | Oct 30, 2020

We’ve all heard about the latest big vulnerabilities, end of life software or compromised passwords as the cause of breaches. However, another pattern is emerging for the financial and insurance...

CISA's Ransomware Guide Takeaways

by Stephanie Goetz | Oct 9, 2020

Ransomware has become more common in the past year with the hackers constantly changing tactics, such as moving from infecting backups to deleting them altogether and evolving ransomware variants....

The Most Underrated Control in Information Security

by Stephanie Goetz | Sep 11, 2020

The access review is the most underrated control in the Information Security Officer’s toolkit. We hear so much about threat intelligence, vulnerability management, and fancy tools that monitor this...

Lessons from the First American Financial Corporation Breach

by Stephanie Goetz | Jul 31, 2020

On July 21, 2020, the New York State Department of Financial Services (NYDFS) issued charges against First American Financial Corporation, a California based company, which provides title insurance...

Mobile Device Security

by Stephanie Goetz | Jun 19, 2020

Work and personal lives continue to blend as many employees are working from home and social distancing. Mobile devices, specifically phones, are already a key part of our personal lives because...

Managing Your Outsourced IT Provider

by Stephanie Goetz | May 22, 2020

Many banks have the need for IT expertise, which these days is difficult to attract and expensive to find in a full time employee. The answer to finding the talent needed at an affordable cost has...

Planning for Reopening in COVID-19

by Stephanie Goetz | May 1, 2020

Many states industries, and businesses are beginning to talk about reopening to mitigate some of the impacts of COVID-19. While many are feeling beyond ready for life to go back to ‘normal’,...

Top 5 Ways Cybercriminals are Exploiting COVID-19

by Stephanie Goetz | Apr 10, 2020

We knew this was coming; in my inbox today landed the threat intelligence we have been expecting, which is the most common ways cybercriminals are using fear and uncertainly to hack people and...

Remote Work Security

by Stephanie Goetz | Mar 20, 2020

In this age of quarantines and social distancing, many organizations are just beginning or expanding remote work capabilities. As always, along with whatever moves we make the hackers are not far...

Want these articles delivered weekly to your inbox? Subscribe to our Newsletter!

Recent Posts

Stay in the Loop!