Stephanie Goetz

2 min read
Considerations for Securing Online Meeting Software
It’s safe to say that remote work is here stay. While we are on the verge of opening back up after COVID, people have loved the flexibility that...

2 min read
Qakbot Malware
Qakbot (also known as Quakbot or Qbot) is a malware strain that has been used to attack financial institutions since 2008. It’s primary target is...

2 min read
SolarWinds: What do we know so far?
Unless you had a really secluded and long holiday vacation, you’ve probably heard about the SolarWinds breach and how it has affected many US...

3 min read
Does your Change Management Process Need a Conversion?
We are seeing findings related to change management cropping up in several audit reports this year. Appropriately scoping change management can be...

3 min read
CISA's Ransomware Guide Takeaways
Ransomware has become more common in the past year with the hackers constantly changing tactics, such as moving from infecting backups to deleting...

3 min read
The Most Underrated Control in Information Security
The access review is the most underrated control in the Information Security Officer’s toolkit.

3 min read
Lessons from the First American Financial Corporation Breach
On July 21, 2020, the New York State Department of Financial Services (NYDFS) issued charges against First American Financial Corporation, a...

2 min read
Mobile Device Security
Work and personal lives continue to blend as many employees are working from home and social distancing. Mobile devices, specifically phones, are...