The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

1 min read

Password Reuse

Today, I want to discuss a topic that often goes unnoticed but can have far-reaching consequences: password reuse. In this fast-paced digital age, convenience plays a significant role in our daily lives. At some point, we’ve all been guilty of using...

Read More

3 min read

5 Steps to Utilizing Key Controls

Recently we’ve received a number of requests for “Key Controls” from auditors or examiners for the financial institutions we work with. Fortunately,...

Read More

2 min read

Insider Cybersecurity Threats: What Financial Institutions Need to Know

Community financial institutions face a wide range of cybersecurity threats, but one of the most concerning is insider threats. Insider threats refer...

Read More

2 min read

Blocking Outbound Communications

All organizations have (or should have) a firewall that blocks unexpected communications from the Internet to internal network hosts. But what about...

Read More

2 min read

Closing the Cybersecurity Skills Gap

Small financial institutions, such as community banks and credit unions, face unique challenges when it comes to cybersecurity. One of the biggest...

Read More

2 min read

5 Things I Learned at a Bank IT Conference

I recently had the opportunity to attend, and speak at, the Southeast Community Bank I.T. Rightsourcing Conference in Georgia. It was a great 1-day...

Read More

2 min read

Corporate Account Takeovers

I want to talk about something that’s been on my mind a lot lately: corporate account takeover (CATO). As someone who has worked in the cybersecurity...

Read More

1 min read

Welcome to the Bedel Security Team Savannah Halstead!

The Bedel Security Team is excited to welcome our new Administrative Manager, Savannah Halstead!

Read More

1 min read

Three Options to Implement Phish Resistant Multi-Factor Authentication

Since the pandemic and the rise of work at home, we have become very familiar with Multi-Factor Authentication (MFA). Typically, this is implemented...

Read More