The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Controls (3)

2 min read

Considerations for Securing Online Meeting Software

It’s safe to say that remote work is here stay. While we are on the verge of opening back up after COVID, people have loved the flexibility that...

Read More

2 min read

What is "Best Practice"?

Over the years, I have become wary of the term “best practice” when it is applied to technology and cybersecurity. The term “best practice” is...

Read More

2 min read

Qakbot Malware

Qakbot (also known as Quakbot or Qbot) is a malware strain that has been used to attack financial institutions since 2008. It’s primary target is...

Read More

2 min read

Asset Management Lessons Learned from Morgan Stanley

Asset Management is one of the foundations of a sound Information Security Program, but it is also often neglected in the rush to replace or...

Read More

3 min read

Understanding Your Information Security Layers

Information security programs are like onions. They have layers. Understanding the control layers of an information security program helps management...

Read More

2 min read

Mobile Device Security

Work and personal lives continue to blend as many employees are working from home and social distancing. Mobile devices, specifically phones, are...

Read More

2 min read

Murphy’s Law and Business Continuity Plans

Any seasoned IT pro can recount stories where seemingly insignificant components or very rare events brought down critical systems. Perhaps it was...

Read More