2 min read
The Bedel Security Blog
Information security expertise exclusively for you.
Sign Up Today
Controls (3)

2 min read
Breaking the SMS Habit
Multifactor Authentication (MFA) is one of the most important controls to block account takeover fraud. There are many different forms of MFA...

2 min read
Considerations for Securing Online Meeting Software
It’s safe to say that remote work is here stay. While we are on the verge of opening back up after COVID, people have loved the flexibility that...

2 min read
What is "Best Practice"?
Over the years, I have become wary of the term “best practice” when it is applied to technology and cybersecurity. The term “best practice” is...

2 min read
Qakbot Malware
Qakbot (also known as Quakbot or Qbot) is a malware strain that has been used to attack financial institutions since 2008. It’s primary target is...

2 min read
Asset Management Lessons Learned from Morgan Stanley
Asset Management is one of the foundations of a sound Information Security Program, but it is also often neglected in the rush to replace or...

3 min read
Understanding Your Information Security Layers
Information security programs are like onions. They have layers. Understanding the control layers of an information security program helps management...