The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

4 min read

Managing Your Outsourced IT Provider

Read More

2 min read

Murphy’s Law and Business Continuity Plans

Any seasoned IT pro can recount stories where seemingly insignificant components or very rare events brought down critical systems. Perhaps it was...

Read More

5 min read

Surviving the Post-Pandemic Landscape Part 3

In case you missed the last 2 days, here’s a brief recap. If you did read yesterday, you can jump down to online account opening. Keep in mind, this...

Read More

5 min read

Surviving the Post-Pandemic Landscape Part 2: 12 Technologies That Every Community Financial Institution Should Be Thinking About

In case you missed yesterday’s post, here’s a brief recap. If you did read yesterday, you can jump down to cloud based telephony. Keep in mind, this...

Read More

2 min read

Planning for Reopening in COVID-19

Many states industries, and businesses are beginning to talk about reopening to mitigate some of the impacts of COVID-19. While many are feeling...

Read More

2 min read

Controlling Sensitive Files Outside Your Institution

When your institution needs to send a sensitive file to an outside party, how do you control what happens to that file? If you are like many, you may...

Read More

1 min read

Meet the Newest Member of The Bedel Security Team

The Bedel Security Team is proud to welcome our newest vCISO Specialist, Trisha Durkin. Trisha contributes great insight from all the different areas...

Read More

4 min read

Do You Need a Separate Penetration Test for Remote Access?

The short answer is: It's definitely worthy of serious consideration.

Read More