The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

2 min read

Murphy’s Law and Business Continuity Plans

Any seasoned IT pro can recount stories where seemingly insignificant components or very rare events brought down critical systems. Perhaps it was the failure of a core switch and its redundant twin at the same time, an unimaginable scenario which...

Read More

5 min read

Surviving the Post-Pandemic Landscape Part 3

In case you missed the last 2 days, here’s a brief recap. If you did read yesterday, you can jump down to online account opening. Keep in mind, this...

Read More

5 min read

Surviving the Post-Pandemic Landscape Part 2: 12 Technologies That Every Community Financial Institution Should Be Thinking About

In case you missed yesterday’s post, here’s a brief recap. If you did read yesterday, you can jump down to cloud based telephony. Keep in mind, this...

Read More

2 min read

Planning for Reopening in COVID-19

Many states industries, and businesses are beginning to talk about reopening to mitigate some of the impacts of COVID-19. While many are feeling...

Read More

2 min read

Controlling Sensitive Files Outside Your Institution

When your institution needs to send a sensitive file to an outside party, how do you control what happens to that file? If you are like many, you may...

Read More

1 min read

Meet the Newest Member of The Bedel Security Team

The Bedel Security Team is proud to welcome our newest vCISO Specialist, Trisha Durkin. Trisha contributes great insight from all the different areas...

Read More

4 min read

Do You Need a Separate Penetration Test for Remote Access?

The short answer is: It's definitely worthy of serious consideration.

Read More

3 min read

Top 5 Ways Cybercriminals are Exploiting COVID-19

We knew this was coming; in my inbox today landed the threat intelligence we have been expecting, which is the most common ways cybercriminals are...

Read More