Security and Compliance

Category Archives: Security and Compliance

NY DFS Tightens Screws on 3rd Party Cyber-Risk for Financial Firms

ACE IT Solutions Managing Partner, Warren Finkel, recently spoke to FinOps about New York State’s Department of Financial Services new rules on managing cyber-risks and how banks are expected to protect critical non-public customer data.

“Out of sight doesn’t mean out of mind when it comes to following New York State’s new rigorous rules on how banks must manage cybersecurity risk.

Cybersecurity information security officers (CISOs), IT directors, compliance managers, legal counsel, and vendor procurement specialists will need to work together to perform due diligence on third-party vendors, negotiate new contracts, revise old contracts and continually monitor third-party relationships. The same principles associated with any outsourced service also apply to third-party cybersecurity risk management.” Read more . . .

ACE IT Solutions Recognized for Excellence in Managed Security Services

New York, NY,  February 15, 2017 – ACE IT Solutions announced today that CRN®, a brand of The Channel Company, has named ACE IT Solutions to its 2017 Managed Service Provider (MSP) 500 list in the Managed Security 100 category. This annual list recognizes North American solution providers with cutting-edge approaches to delivering managed IT… Continue Reading

Cybersecurity Breakfast Briefing: How to Beat Ransomware

Stop Hackers Before they Have a Chance to Throw the First Punch Join ACE IT Solutions and Sophos for breakfast while you learn how to beat today’s biggest security threat – Ransomware REGISTER HERE When: Wednesday, November 9, 2016 8:00 AM – 9:30 AM ** Breakfast will be served Where: 250 Pehle Road, Plaza One Conference… Continue Reading

CEO Email Fraud and How to Prevent it

An as yet unidentified company has fallen victim to nearly $100 million in CEO email fraud, where the bad guys did research on employees that hold the purse strings on deals with suppliers or regularly perform wire transfers. The heist started with a successful phishing attack — employees were social engineered by spoofed emails that claimed… Continue Reading