The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Threats (6)

2 min read

Asset Management Lessons Learned from Morgan Stanley

Asset Management is one of the foundations of a sound Information Security Program, but it is also often neglected in the rush to replace or...

Read More

3 min read

CISA's Ransomware Guide Takeaways

Ransomware has become more common in the past year with the hackers constantly changing tactics, such as moving from infecting backups to deleting...

Read More

2 min read

Typ0squatting

We recently have seen an increase in “typosquatting” activity targeting financial institutions. Typosquatting is when someone registers a domain with...

Read More

2 min read

Mobile Device Security

Work and personal lives continue to blend as many employees are working from home and social distancing. Mobile devices, specifically phones, are...

Read More

2 min read

Changing How Vulnerabilities are Audited

Regulators expect that a financial institution will have a vulnerability scan performed by an independent third party at least annually. This scan...

Read More

2 min read

Murphy’s Law and Business Continuity Plans

Any seasoned IT pro can recount stories where seemingly insignificant components or very rare events brought down critical systems. Perhaps it was...

Read More

5 min read

Surviving the Post-Pandemic Landscape Part 3

In case you missed the last 2 days, here’s a brief recap. If you did read yesterday, you can jump down to online account opening. Keep in mind, this...

Read More

5 min read

Surviving the Post-Pandemic Landscape Part 2: 12 Technologies That Every Community Financial Institution Should Be Thinking About

In case you missed yesterday’s post, here’s a brief recap. If you did read yesterday, you can jump down to cloud based telephony. Keep in mind, this...

Read More