The Bedel Security Blog
Information security expertise exclusively for you.
Sign Up Today
6 min read
Independent Collaboration Part 2: A Framework for Outsourcing IT in Financial Institutions
This article is the second of a 2-part series on building an effective outsourcing strategy for the various components of IT for financial...
2 min read
Hybrid Work Force Security
There’s yet another debate growing post-COVID. It’s not vaccinations, masks, or whether it’s safe to eat at a restaurant, it’s when and how much...
1 min read
Meet the Newest Member of the Bedel Security Team
The Bedel Security Team is excited to welcome our newest vCISO Senior Advisor, Vance Monical, CISM, CISA!
2 min read
The Policy Labyrinth
You started with an Information Security Policy that covered the basics. Then one day an auditor walked in and asked to see your Data Destruction...
4 min read
Independent Collaboration Part 1: A Concept for Outsourcing IT in Financial Institutions
It sounds like a total oxymoron: Independent Collaboration. On the Predictive Index, those two words are on opposing ends of the spectrum when it...
1 min read
Learning Not to Trust
Most of our IT infrastructures were built to trust. From the time users sign on in the morning until they log off at the end of the day, the network...
3 min read
Managing Cybersecurity: Get Away From “No”
I was having a conversation with a colleague this past week (a bank auditor to give you some context). As we were talking about cybersecurity and the...
2 min read
Considerations for Securing Online Meeting Software
It’s safe to say that remote work is here stay. While we are on the verge of opening back up after COVID, people have loved the flexibility that...