The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Incident Response

Bedel Security Friday5 graphic asking what’s in your bank's cybersecurity policy.

2 min read

What’s In Your Policy?

A bank’s information security policy is one of the few documents that directly connects technical risk to executive accountability. Most policies...

Read More
Bedel Security Friday5 graphic on managing cybersecurity with limited resources.

3 min read

Managing Cybersecurity with Limited Resources

If you’re a community bank or credit union, “limited resources” isn’t a temporary condition; it’s your operating model.

Read More
Business handshake illustrating trust and verification in managed security services.

2 min read

Trust but Verify: Managing your Managed Security Service Provider

Perhaps you outsourced your security monitoring and incident response to a reputable firm years ago, or are considering a change to outsource for the...

Read More

4 min read

MFA Prompt Bombing: When Multi-Factor Authentication Becomes a Nuisance — and a Risk

Multi-factor authentication (MFA) is widely considered one of the best affordable controls for preventing account takeover. But like every security...

Read More

2 min read

Measuring Cybersecurity That Matters: KRIs Every Financial Institution Should Track

For regulators, auditors, and your board, good cybersecurity isn’t just about having controls in place—it’s about proving they work. That’s where...

Read More

2 min read

Ransomware Trends in 2025

Back in May 2024, I wrote that there were signs ransomware might finally be on the decline. I have continued to monitor various sources regarding...

Read More

1 min read

A Strong Defense Wins Championships—and Protects Your Data

In football, it’s often said that defense wins championships. The same principle applies to information security: the strength of your defensive...

Read More

2 min read

Evaluating Incident Risk Severity Levels in Your Incident Response Plan

When a security incident occurs in a financial institution, one of the first and most critical steps is categorization. The speed and accuracy of...

Read More

1 min read

The Rising Threat of Deepfake Technology in Cybersecurity

In recent years, cybercriminals have expanded their toolkit beyond phishing emails and malware to include a newer, more sinister threat—deepfake...

Read More

2 min read

Incident Response Theater: Are We Just Playing the Role of Preparedness?

The curtain rises. The scene: a quiet sunny day on the teller line.

Read More