Stephanie Goetz

3 min read

5 Reasons Information Security is a Team Sport

In our line of work, we see many institution’s environments, cultures, and positions on the journey of their information security programs. One of the most common pitfalls is the belief that a single person can check a magic box that makes...

Read More

2 min read

Hybrid Work Force Security

There’s yet another debate growing post-COVID. It’s not vaccinations, masks, or whether it’s safe to eat at a restaurant, it’s when and how much...

Read More

2 min read

Considerations for Securing Online Meeting Software

It’s safe to say that remote work is here stay. While we are on the verge of opening back up after COVID, people have loved the flexibility that...

Read More

2 min read

Qakbot Malware

Qakbot (also known as Quakbot or Qbot) is a malware strain that has been used to attack financial institutions since 2008. It’s primary target is...

Read More

2 min read

SolarWinds:  What do we know so far?

Unless you had a really secluded and long holiday vacation, you’ve probably heard about the SolarWinds breach and how it has affected many US...

Read More

3 min read

Does your Change Management Process Need a Conversion?

We are seeing findings related to change management cropping up in several audit reports this year. Appropriately scoping change management can be...

Read More

3 min read

CISA's Ransomware Guide Takeaways

Ransomware has become more common in the past year with the hackers constantly changing tactics, such as moving from infecting backups to deleting...

Read More

3 min read

The Most Underrated Control in Information Security

The access review is the most underrated control in the Information Security Officer’s toolkit.

Read More