Welcome to the Bedel Security Team Kassia Morgan!

by Laura Zeck | Feb 17, 2022

The Bedel Security Team is excited to welcome our new Relationship Manager, Kassia Morgan! Kassia is a young professional who has amassed 8 years of experience in Sales and Product Management. Her...

‘Tis the Season for Tax Scams

by Vance Monical | Feb 11, 2022

Every year, thousands of people fall victim to tax-related phishing scams. As with most intrusions, it only takes one click on a fraudulent link to give the bad guys everything they need to...

Is Your Risk Assessment Authentication & Access Ready?

by Brian Petzold | Jan 21, 2022

In August, the FFIEC released new guidance titled “Authentication and Access to Financial Institution Services and Systems”. Because the guidance replaces the previous “Authentication in an Internet...

Meaningful Governance

by Vance Monical | Jan 7, 2022

Most information security professionals understand the compliance and business requirements of keeping management informed of the Information Security Program, but that is easier said than done....

Update to FTC GLBA Safeguards Rule

by Chris Bedel | Dec 31, 2021

On October 27, 2021, the FTC published revisions to Part 314: The Standards for Safeguarding Customer Information. It outlines a set of requirements that “financial institutions” must adhere to in...

Log4Shell Response for Community Financial Institutions

by Chris Bedel | Dec 17, 2021

This post is intended to help community financial institutions appropriately prioritize their response efforts to the Log4Shell vulnerability. If you’ve been watching your threat intel feeds (or...

Extending Security Controls Beyond the Office

by Vance Monical | Dec 3, 2021

Over the past several years, organizations have allocated considerable resources to protect their Information Technology environment. Historically, this meant securing the perimeter of the office(s)...

Backups vs. Retention

by Brian Petzold | Nov 19, 2021

We often run into situations where different staff in an institution have different understandings of the goals and operations of their backup system. The IT department tends to think of backups as...

Cyber New Year’s Resolution: Start with a Gut Check

by Chris Bedel | Nov 12, 2021

Ever get that feeling that you don’t know what you don’t know about the effectiveness of your cybersecurity program? You’re not alone. Trust me though, you are better off than those with blind...

Keep an Eye on API Security

by Stephanie Goetz | Nov 5, 2021

Application programming interfaces, or APIs, enable applications to exchange data and functionality easily with other applications and users in or outside an organization. Examples of APIs you may...

Want these articles delivered weekly to your inbox? Subscribe to our Newsletter!

Recent Posts

Stay in the Loop!