Data Loss Prevention

Category Archives: Data Loss Prevention

8 Tips for Improving Your Business’ Security Posture

Cybersecurity doesn’t have to be expensive or complicated, but it must be given the proper attention. Security is no longer an optional service. It should be woven into every aspect of a business’ technology infrastructure and it requires attention on every level — from employees to c-level executives.

Implement these simple strategies to help protect your business from damaging security breaches.

  1. Promote a security aware culture 
    All employees, everyone with access to your technology, should be thinking about cybersecurity. Management should advocate for a cyber security culture that ranges across the entire organization.
  2. Keep technology up-to-date
    Hackers will exploit weaknesses wherever they can find them. It is crucial to stay on top of software and operating system updates.
  3. Backup, backup, backup
    Current (and regularly tested!) backups will save your business in the event of a ransomware attack. This is a business’ secret to recovering from a cyber attack.
  4. Limit admin access
    Employees should only have access to data and technology on an as-needed basis. Limit administrative access on employee devices and the applications your business uses.
  5. Use a modern firewall
    A firewall is usually your first line of defense from hackers. Next gen firewalls deeply inspect traffic for unusual behavior, malware, and can protect your users through content filtering.
  6. Use anti-virus, anti-malware solutions
    Modern anti-virus and anti-malware solutions help to protect your business against the latest viruses by using analytical and monitoring tools to identify suspicious network activity before it can harm your network. Use managed firewall solutions for the most reliable protection.
  7. Stay on top of emerging threats
    Knowing your enemy requires learning as much as you can about the new types of cybersecurity threats as they emerge. Threat intelligence is a key component to a holistic cybersecurity program.
  8. Passwords, passwords, password
    Password protect all mobile devices as well as Wi-Fi networks. Use strong passwords that can’t be easily guessed by hackers. Require password changes on a regular basis — every 90 days at the most.

Cybersecurity Risk Management Framework

Check out our Cybersecurity Risk Management Framework for more details on developing a robust cyber risk management program.

Contact ACE IT Solutions at 646.558.6358 to find cybersecurity gaps and vulnerabilities in your organization. We have all the tools you need to properly protect your business, and data, from hackers who want to steal your data.


What Businesses Can Learn from British Airways’ Technology Outage

British Airways’ massive technology outage that occurred over Memorial Day weekend is said to cost the airline $68 million and stranded over 75,000 people. The outage involved a power surge on Saturday morning that hit the airline’s flight, baggage and communication systems and left the airline scrambling to bring systems back online and appease frustrated customers. British Airways is… Continue Reading

How to Test your Disaster Recovery Plan

It should not take an outage to compel your business to evaluate its business continuity and response strategy.  One should be in place long before disaster strikes.     The beginning of the year is a good time to test your disaster recovery / business continuity plan. (And put one into place if you haven’t yet.)… Continue Reading

Closing the Security Skills Gap

The low availability of professionals with specialized cyber skills is one of the biggest issues facing organizations looking to defend their core business systems against cyber attacks. Cyberattacks continue to outpace the pool of talented defenders as cyberattacks are growing in frequency and sophistication. The sufficiently-skilled cyber professionals cannot keep up — there just aren’t… Continue Reading

Data Backup or Disaster Recovery — Which is the best choice for your business?

What is the different between data backup and disaster recovery?  We get this question a lot from clients looking to find the balance between their budget requirements and making sure they can access their data and technology whenever they need it. Data Backup  Data backup is a necessity. Non-optional. Every businesses must have it. Data backup… Continue Reading

The ABCs of Cybersecurity Strategy

Guidance from our cybersecurity business partner, IBM, on how to empower your business with the building blocks of a flexible, risk-based security posture.  Globally, business and technology advancements are opening up new avenues of opportunity—and unprecedented risk. As a result, government and industry-related compliance mandates are also on the rise. The right planning and security strategy… Continue Reading

SEC OCIE’s 2015 Cybersecurity Examination Initiative

On September 15, 2015, The SEC has issued another Risk Alert that addresses the SEC’s cyber security examination initiative. The key take away is that OCIE staff will continue its focus on cyber security by conducting examinations of registered broker-dealers and investment advisors. In sharing the key focus areas for the Cybersecurity Examination Initiative, the SEC… Continue Reading

ACE IT Solutions Nominated For Best IT Security Services for Hedge Funds by HFMWeek

ACE IT Solutions is proud to announce that they have been nominated for two prestigious HFMWeek awards: Best IT Security Service for Hedge Funds Best Outsourced Tech Infrastructure Provider for Hedge Funds The HFMWeek Awards event showcases the leading hedge fund service providers from across the US to reward outstanding performance, service and support provided to the… Continue Reading

5 Steps to Business Cyber Security Compliance

Just because your business is not subject to HIPAA or PCI regulations does not mean you do not have to worry about compliance and protecting your data from cyber attack. Any business that handles personal identifying information (PII) such as social security numbers, could face losses of up to $2,127 per record* if that data is stolen.… Continue Reading

Close the gap on cyber security

There is more to cyber security than just preventing attacks. In fact, traditional methods of prevention have proven ineffective. A Forrester study predicts that 60% of businesses will become victims of a security breach in the next year. Even worse, 80% of businesses will experience a security breach and will not be aware of it. This… Continue Reading