The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Risk (6)

2 min read

Hybrid Work Force Security

There’s yet another debate growing post-COVID. It’s not vaccinations, masks, or whether it’s safe to eat at a restaurant, it’s when and how much...

Read More

4 min read

Independent Collaboration Part 1: A Concept for Outsourcing IT in Financial Institutions

It sounds like a total oxymoron: Independent Collaboration. On the Predictive Index, those two words are on opposing ends of the spectrum when it...

Read More

1 min read

Learning Not to Trust

Most of our IT infrastructures were built to trust. From the time users sign on in the morning until they log off at the end of the day, the network...

Read More

2 min read

Considerations for Securing Online Meeting Software

It’s safe to say that remote work is here stay. While we are on the verge of opening back up after COVID, people have loved the flexibility that...

Read More

2 min read

What is "Best Practice"?

Over the years, I have become wary of the term “best practice” when it is applied to technology and cybersecurity. The term “best practice” is...

Read More

2 min read

Qakbot Malware

Qakbot (also known as Quakbot or Qbot) is a malware strain that has been used to attack financial institutions since 2008. It’s primary target is...

Read More

3 min read

SolarWinds: 5 Points to Communicate to Your Board

As most SolarWinds investigations have stabilized, it’s a good time to give the full report to your Board of Directors. They’ve hopefully been...

Read More