2 min read
Backups vs. Retention
We often run into situations where different staff in an institution have different understandings of the goals and operations of their backup...
2 min read
We often run into situations where different staff in an institution have different understandings of the goals and operations of their backup...
2 min read
Ever get that feeling that you don’t know what you don’t know about the effectiveness of your cybersecurity program?
2 min read
Application programming interfaces, or APIs, enable applications to exchange data and functionality easily with other applications and users in or...
1 min read
The Bedel Security Team is excited to welcome our newest vCISO Specialist, Kenyatta Smith!
2 min read
Phishing remains one of the top threats to organizations today. Every user regularly receives emails designed to trick them into clicking on a link,...
2 min read
The cybercriminals are still on top of their game, changing targets and tactics. The work-from-home revolution continues and the drive for automation...
2 min read
It is a good practice to identify a cybersecurity framework as part of an institution’s Information Security Program. A framework helps to identify...