2 min read
The Bedel Security Blog
Information security expertise exclusively for you.
Sign Up Today
Risk (7)
![](https://www.bedelsecurity.com/hubfs/Blog%20Photos/AssetManagementLessonsLearned.jpg)
2 min read
Asset Management Lessons Learned from Morgan Stanley
Asset Management is one of the foundations of a sound Information Security Program, but it is also often neglected in the rush to replace or...
![](https://www.bedelsecurity.com/hubfs/Blog%20Photos/CISAsRansomwareGuide.jpg)
3 min read
CISA's Ransomware Guide Takeaways
Ransomware has become more common in the past year with the hackers constantly changing tactics, such as moving from infecting backups to deleting...
![](https://www.bedelsecurity.com/hubfs/Blog%20Photos/Typosquatting.jpg)
2 min read
Typ0squatting
We recently have seen an increase in “typosquatting” activity targeting financial institutions. Typosquatting is when someone registers a domain with...
![](https://www.bedelsecurity.com/hubfs/LessonsLearnedFromTheAmerican.jpg)
3 min read
Lessons from the First American Financial Corporation Breach
On July 21, 2020, the New York State Department of Financial Services (NYDFS) issued charges against First American Financial Corporation, a...
![](https://www.bedelsecurity.com/hubfs/Blog%20Photos/MobileDeviceSecurity.jpg)
2 min read
Mobile Device Security
Work and personal lives continue to blend as many employees are working from home and social distancing. Mobile devices, specifically phones, are...
![](https://www.bedelsecurity.com/hubfs/Blog%20Photos/MurpheysLawBCP.jpg)
2 min read
Murphy’s Law and Business Continuity Plans
Any seasoned IT pro can recount stories where seemingly insignificant components or very rare events brought down critical systems. Perhaps it was...
![](https://www.bedelsecurity.com/hubfs/Blog%20Photos/PlanningForReOpen.jpg)
2 min read
Planning for Reopening in COVID-19
Many states industries, and businesses are beginning to talk about reopening to mitigate some of the impacts of COVID-19. While many are feeling...
![](https://www.bedelsecurity.com/hubfs/Blog%20Photos/SepratePenTest_RemoteAccess.jpg)
4 min read
Do You Need a Separate Penetration Test for Remote Access?
The short answer is: It's definitely worthy of serious consideration.