The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Information Security Program

2 min read

Lessons Learned from 2025 And What Financial Institutions Should Prepare for in 2026

As 2025 comes to a close, one theme stands out for community financial institutions: cybersecurity is no longer about reacting to individual threats....

Read More

2 min read

How to Approach Third Party Reviews

One of the most important processes in cybersecurity for financial institutions today is third-party due diligence. However, it is also one of the...

Read More

1 min read

Vendor Data Sharing: Why “Need to Know” Is a Must for Financial Institutions

Vendors play a crucial role in helping financial institutions deliver modern, efficient, and client-focused services. But with every data exchange...

Read More

3 min read

Managing Bank-wide Change: Why Cybersecurity Should Lead the Conversation

Change is a constant in banking. Whether it’s rolling out a new digital banking platform, upgrading your core, or going through a merger, most banks...

Read More

2 min read

Measuring Cybersecurity That Matters: KRIs Every Financial Institution Should Track

For regulators, auditors, and your board, good cybersecurity isn’t just about having controls in place—it’s about proving they work. That’s where...

Read More

2 min read

5 Simple Steps to a Proactive Information Security Program

If your Information Security Program feels more like you’re constantly putting out fires than preventing them, you’re not alone. Many community banks...

Read More

1 min read

A Strong Defense Wins Championships—and Protects Your Data

In football, it’s often said that defense wins championships. The same principle applies to information security: the strength of your defensive...

Read More

2 min read

Cracking Codes and Crushing Rocks: What Geology Can Teach Us About Cryptography

At first glance, geology and cryptography may seem worlds apart—one is the study of rocks, layers, and the passage of deep time; the other, the...

Read More

2 min read

Building Resilience Against Nation-State Actors

Given the current international climate, it is critical to maintain vigilant and ongoing monitoring of both cyber and physical threats to the...

Read More

3 min read

Does Simulated Phishing Training Actually Work?

This has been a very interesting question since we’ve started phishing training, which for me was around 2016. So, for about ten years, I’ve heard...

Read More