The Bedel Security Blog
Information security expertise exclusively for you.
Sign Up Today
2 min read
Think outside the Inbox: Combating Modern Social Engineering Threats
Social engineering attacks have long been a critical concern for institutions, with email-based phishing dominating headlines and incident reports....
2 min read
Ransomware Trends in 2025
Back in May 2024, I wrote that there were signs ransomware might finally be on the decline. I have continued to monitor various sources regarding...
1 min read
Bedel Security Announces CAT Replacement: CySPOT® CSF+ Built on NIST CSF 2.0
Introduction When the FFIEC held its webinar to announce the sunsetting of the CAT, they were adamant about the NIST-CSF being the "Rosetta Stone"...
1 min read
A Strong Defense Wins Championships—and Protects Your Data
In football, it’s often said that defense wins championships. The same principle applies to information security: the strength of your defensive...
2 min read
Cracking Codes and Crushing Rocks: What Geology Can Teach Us About Cryptography
At first glance, geology and cryptography may seem worlds apart—one is the study of rocks, layers, and the passage of deep time; the other, the...
3 min read
Cybersecurity is Everyone’s Responsibility in Your Bank
When most people think of cybersecurity, they think of firewalls, antivirus software, or maybe the IT department working behind the scenes. While...
2 min read
Evaluating Incident Risk Severity Levels in Your Incident Response Plan
When a security incident occurs in a financial institution, one of the first and most critical steps is categorization. The speed and accuracy of...
1 min read
Bedel Security announces launch of CySPOT® Customer Access Portal
Bedel Security® is excited to announce the launch of the CySPOT® Customer Access Portal, a secure online repository designed to give community...
2 min read
Why You Need Both an Information Security Risk Assessment and a Framework Self-Assessment
When it comes to managing cybersecurity risk in community financial institutions, there’s often confusion between two key activities: the Information...