The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Uncategorized

2 min read

If Everything is Important...

"If everything is important, then nothing is." ― Patrick Lencioni

Read More

Announcing the Release of our Latest Version of the CAT

We've been getting a lot of emails asking when our newest CAT excel spreadsheet would be released.

Read More

2 min read

Implement Practical Policies and Processes to Improve Your Cyber Security

Lately, we've been running into cyber security programs and information security programs (ISP) that are elaborate, lengthy, complex, and written...

Read More

1 min read

When a Returned Wire isn’t Just a Returned Wire

[caption id="attachment_715" align="alignnone" width="672"] Recently, the Wire Department at a client of ours noted an unusual event where $5,000 had...

Read More

1 min read

Why was it so Quiet in the Fourth Quarter?

It’s good to be back on the blog. My last post was on September 28, 2016, which means I didn’t post one thing in Q4 of 2016. Some of you may have...

Read More

1 min read

Hired Guns: The Rise of the Virtual CISO

I love this article by Michelle Drolet on Network World: The enterprise is facing a dangerous combination of mounting cybersecurity threats of...

Read More

1 min read

Coming to Your State?: New York Releases First-of-its-Kind Cybersecurity Regulation for Banks

Last week, New York Governor, Andrew Cuomo announced new proposed state regulation for banks, insurance companies, and other financial institutions....

Read More

1 min read

Is it Time to Take the Organization of Your Information Security Program to the Next Level?

The Information Security Program at Banks and Credit Unions is getting to be a pretty complex thing. Policies, audits, reviews, board reports,...

Read More

1 min read

Key to Successful Vendor Management Program: Walk Before You Run

I have some colleagues who disagree with this approach, but I’ve seen far too many of my clients attempting to implement some complicated, fully...

Read More

1 min read

How do you measure success when it comes to stopping Phishing attacks?

An article on CSO Online this week caught my attention and raises an excellent question. That being, "what is a good success rate in your phishing...

Read More