The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

2 min read

Corporate Account Takeovers

I want to talk about something that’s been on my mind a lot lately: corporate account takeover (CATO). As someone who has worked in the cybersecurity space for most of my career, I know firsthand how devastating CATO attacks can be for financial...

Read More

1 min read

Welcome to the Bedel Security Team Savannah Halstead!

The Bedel Security Team is excited to welcome our new Administrative Manager, Savannah Halstead!

Read More

1 min read

Three Options to Implement Phish Resistant Multi-Factor Authentication

Since the pandemic and the rise of work at home, we have become very familiar with Multi-Factor Authentication (MFA). Typically, this is implemented...

Read More

1 min read

Where to start?

If you are new to managing cybersecurity for a financial institution, I’m sure you’ll have a lot of questions. More specifically, “Where do I start?”

Read More

2 min read

The Fiduciary Role of the CISO

A few months ago I was listening to a podcast. The business owner being interviewed wasn't in cybersecurity but had a consulting business. And he...

Read More

2 min read

Should Financial Institutions have a BISO Program?

A BISO (Business Information Security Officer) is an ombudsman for business lines across an institution. This person is responsible for representing...

Read More

2 min read

The FDIC InTREX Gets Audited

While the FFIEC has released three major guidance updates since July 2019, the FDIC has not updated its examination program to include the newer...

Read More

1 min read

The What, Why, and How of Complementary User Entity Controls

Reviewing Complementary User Entity Controls (CUECs) is an important part of any financial institution’s third-party management program. However, we...

Read More

3 min read

Discussions Triggered from the LastPass Breach

Over the past month, many have written about the latest LastPass breach. If you have not kept up with the breach, you can see the disclosure from...

Read More