Security

Category Archives: Security

Could a Cybersecurity Breach Get You Fired?

As cybersecurity becomes a priority for managing business risk, C-level executives are being held accountable for cybersecurity weaknesses in their organization. With the recent deluge of high-profile breaches, CEO tenure is now at risk based cybersecurity regulationson the effective control and protection of corporate assets.

A cybersecurity hack could ruin a company. Board members (and stockholders) are putting the onus on the CEO to hire the right technology advisor and deploy the proper  cybersecurity protection. Recently, the CEO of FACC, an Austrian company, was fired after 20 years of service because of a cybersecurity breach that cost the company over $50 million. It is clear that when a cybersecurity breach results in a large financial loss, someone will be held accountable, and it is becoming clear that stockholders and board members will not have much tolerance for an executive that allows a breach to happen.

Executives must protect the business to protect their careers, which requires demonstrating good judgement, practicing due diligence, and making a “reasonable effort” to prevent damage to the company via cybersecurity breaches or other malfeasance.

ACE IT Solutions helps CEO, CIOs and other C-level executives manage cybersecurity risks. We’ve structured our cybersecurity program to stay ahead of — and effectively respond to — cyber threats and their diverse, multi-faceted attacks. ACE IT Solutions highly-effective security services and tools that can be mixed and matched according to each business’ specific needs.

We recommend the following resources for C-level executives looking for cybersecurity guidance:

Cybersecurity Risk Management Framework

When it comes to IT security, one size does not fit all. ACE IT Solutions and our cybersecurity business partners are experts at assessing and managing risk. View our Risk Management Framework for details about the cybersecurity solutions we offer to help executive manage cybersecurity risk.

Cybersecurity Playbook

Download our cybersecurity playbook to learn which solutions should be included by every organization as part of a holistic approach to cybersecurity.

Best Practices for Cybersecurity Preparedness

This whitepaper identifies standards and best practices relative to cybersecurity, which businesses can use for guidance as a framework to implement a thoughtful approach to security throughout their entire organization.

Additional Resources

Read more cybersecurity thought leadership here.

Contact ACE IT Solutions at 646.558.6358 or to schedule a cybersecurity assessment. We can help you understand your risks and how best to control them.

 

 

8 Tips for Improving Your Business’ Security Posture

Cybersecurity doesn’t have to be expensive or complicated, but it must be given the proper attention. Security is no longer an optional service. It should be woven into every aspect of a business’ technology infrastructure and it requires attention on every level — from employees to c-level executives. Implement these simple strategies to help protect… Continue Reading

What SMBs Need to Know About Cybersecurity

SMBs mistakenly believe they are too small to be targeted by hackers and ransomware. In fact, SMBs fall into hackers’ cybersecurity sweet spot — they have valuable digital assets, but tend to have less cybersecurity in place than a larger enterprise. Cybercriminals know that SMBs are an easy target with a potentially large and damaging… Continue Reading

NY DFS Tightens Screws on 3rd Party Cyber-Risk for Financial Firms

ACE IT Solutions Managing Partner, Warren Finkel, recently spoke to FinOps about New York State’s Department of Financial Services new rules on managing cyber-risks and how banks are expected to protect critical non-public customer data. “Out of sight doesn’t mean out of mind when it comes to following New York State’s new rigorous rules on… Continue Reading

ACE IT Solutions Recognized for Excellence in Managed Security Services

New York, NY,  February 15, 2017 – ACE IT Solutions announced today that CRN®, a brand of The Channel Company, has named ACE IT Solutions to its 2017 Managed Service Provider (MSP) 500 list in the Managed Security 100 category. This annual list recognizes North American solution providers with cutting-edge approaches to delivering managed IT… Continue Reading

CEO Email Fraud and How to Prevent it

An as yet unidentified company has fallen victim to nearly $100 million in CEO email fraud, where the bad guys did research on employees that hold the purse strings on deals with suppliers or regularly perform wire transfers. The heist started with a successful phishing attack — employees were social engineered by spoofed emails that claimed… Continue Reading

Closing the Security Skills Gap

The low availability of professionals with specialized cyber skills is one of the biggest issues facing organizations looking to defend their core business systems against cyber attacks. Cyberattacks continue to outpace the pool of talented defenders as cyberattacks are growing in frequency and sophistication. The sufficiently-skilled cyber professionals cannot keep up — there just aren’t… Continue Reading

SEC Announces Examination Priorities for 2016

On January 11, 2016, the staff of the Office of Compliance Inspections and Examinations (OCIE) of the Securities and Exchange Commission (SEC) released its annual announcement on examination priorities for the coming calendar year. While the announcement contains broad and general descriptions of areas in which the staff intends to focus, there are several key points to… Continue Reading

Big Banks Spending Big Bucks to Fight Cyber Crime

The biggest banks in the U.S. are responding to the cyber crime epidemic by beefing up their cybersecurity programs to defend the financial industry. It is no secret that cyber criminals are winning. It is estimated that cyber attacks cost businesses as much as $400 billion a year, which includes direct damage plus post-attack disruption to the… Continue Reading

Is it Time for an Active Directory Audit?

Today’s organizations need to govern and enforce user access across multiple channels, including mobile, social and cloud. At the same time, they must address business needs such as role management, compliance and audit reporting and integration of various user populations. Identity and access management solutions (IMAC) help strengthen compliance and reduce risk by protecting and… Continue Reading