The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Threats (4)

2 min read

Log4Shell Response for Community Financial Institutions

This post is intended to help community financial institutions appropriately prioritize their response efforts to the Log4Shell vulnerability. If...

Read More

2 min read

Extending Security Controls Beyond the Office

Over the past several years, organizations have allocated considerable resources to protect their Information Technology environment. Historically,...

Read More

2 min read

Backups vs. Retention

We often run into situations where different staff in an institution have different understandings of the goals and operations of their backup...

Read More

2 min read

Keep an Eye on API Security

Application programming interfaces, or APIs, enable applications to exchange data and functionality easily with other applications and users in or...

Read More

2 min read

Tricky Phish Testing

Phishing remains one of the top threats to organizations today. Every user regularly receives emails designed to trick them into clicking on a link,...

Read More

3 min read

Guidance from the FBI- Their Efforts and Your Role

After spending some time this week helping our customers with ransomware preparation, I found a statement on the FBI’s website that would be a great...

Read More

2 min read

Breaking the SMS Habit

Multifactor Authentication (MFA) is one of the most important controls to block account takeover fraud. There are many different forms of MFA...

Read More

3 min read

5 Reasons Information Security is a Team Sport

In our line of work, we see many institution’s environments, cultures, and positions on the journey of their information security programs. One of...

Read More

1 min read

Learning Not to Trust

Most of our IT infrastructures were built to trust. From the time users sign on in the morning until they log off at the end of the day, the network...

Read More