Security

Category Archives: Security

What SMBs Need to Know About Cybersecurity

cybersecurity regulationsSMBs mistakenly believe they are too small to be targeted by hackers and ransomware. In fact, SMBs fall into hackers’ cybersecurity sweet spot — they have valuable digital assets, but tend to have less cybersecurity in place than a larger enterprise. Cybercriminals know that SMBs are an easy target with a potentially large and damaging payout. Here are steps SMBs must take to stop hackers:

  1. Have a cyberattack policy and response plan. A quick response will minimize damage and inform all employees how to respond in the event of an attack. No business is too small to have a plan. ACE IT Solutions can tailor a cyber policy and response plan to meet your specific needs.
  2. Get cyber insurance and understand what it covers and does not cover. Don’t wait until you have an incident to discover gaps in your coverage.
  3. Expect recovery to take awhile. Businesses with a response plan in place will recover faster than those with no plan. According to a survey by Nationwide Insurance, 60% of SMBs surveyed said it took them longer than 30 days to recover from a cyberattack.
  4. Know your cybersecurity gaps. A cybersecurity assessment and phishing tests are essential to understanding cybersecurity weaknesses. Don’t wait until an attack has occurred to button up your infrastructure.
  5. The best way to build trust is to keep your client’s information secure. Data protection requires a holistic approach to cybersecurity that includes more than just anti-virus protection. ACE IT Solutions customizes cybersecurity solutions for your specific needs.
  6. Train your employees in cybersecurity awareness. Employees are your first line of defense against hackers. 97% of all breaches start with a phishing email. Train your users to recognize phishing emails and how to respond and report suspect emails. ACE IT Solutions offers security awareness training and phishing testing.
  7. Work with a trusted partner. SMBs typically don’t have the in-house expertise to deal with today’s emerging cybersecurity threats and cybercriminals know it. You can’t go it alone. It is essential to work with a trusted technology partner, like ACE IT Solutions, who understands the developing threat landscape and knows which reliable security solutions to put to work for your business.

Contact ACE IT Solutions to discuss securing your SMB.

NY DFS Tightens Screws on 3rd Party Cyber-Risk for Financial Firms

ACE IT Solutions Managing Partner, Warren Finkel, recently spoke to FinOps about New York State’s Department of Financial Services new rules on managing cyber-risks and how banks are expected to protect critical non-public customer data. “Out of sight doesn’t mean out of mind when it comes to following New York State’s new rigorous rules on… Continue Reading

ACE IT Solutions Recognized for Excellence in Managed Security Services

New York, NY,  February 15, 2017 – ACE IT Solutions announced today that CRN®, a brand of The Channel Company, has named ACE IT Solutions to its 2017 Managed Service Provider (MSP) 500 list in the Managed Security 100 category. This annual list recognizes North American solution providers with cutting-edge approaches to delivering managed IT… Continue Reading

CEO Email Fraud and How to Prevent it

An as yet unidentified company has fallen victim to nearly $100 million in CEO email fraud, where the bad guys did research on employees that hold the purse strings on deals with suppliers or regularly perform wire transfers. The heist started with a successful phishing attack — employees were social engineered by spoofed emails that claimed… Continue Reading

Closing the Security Skills Gap

The low availability of professionals with specialized cyber skills is one of the biggest issues facing organizations looking to defend their core business systems against cyber attacks. Cyberattacks continue to outpace the pool of talented defenders as cyberattacks are growing in frequency and sophistication. The sufficiently-skilled cyber professionals cannot keep up — there just aren’t… Continue Reading

SEC Announces Examination Priorities for 2016

On January 11, 2016, the staff of the Office of Compliance Inspections and Examinations (OCIE) of the Securities and Exchange Commission (SEC) released its annual announcement on examination priorities for the coming calendar year. While the announcement contains broad and general descriptions of areas in which the staff intends to focus, there are several key points to… Continue Reading

Big Banks Spending Big Bucks to Fight Cyber Crime

The biggest banks in the U.S. are responding to the cyber crime epidemic by beefing up their cybersecurity programs to defend the financial industry. It is no secret that cyber criminals are winning. It is estimated that cyber attacks cost businesses as much as $400 billion a year, which includes direct damage plus post-attack disruption to the… Continue Reading

Is it Time for an Active Directory Audit?

Today’s organizations need to govern and enforce user access across multiple channels, including mobile, social and cloud. At the same time, they must address business needs such as role management, compliance and audit reporting and integration of various user populations. Identity and access management solutions (IMAC) help strengthen compliance and reduce risk by protecting and… Continue Reading

The Top Four Cybercrime Trends of 2015

Security incidents have been on the rise for the past few years, and most experts in cyber security believe the trend will only continue to intensify. This list does not focus on the high-profile, headline-grabbing attacks we all know about but the everyday struggle of organizations everywhere, in every industry, to protect their data in a… Continue Reading

The ABCs of Cybersecurity Strategy

Guidance from our cybersecurity business partner, IBM, on how to empower your business with the building blocks of a flexible, risk-based security posture.  Globally, business and technology advancements are opening up new avenues of opportunity—and unprecedented risk. As a result, government and industry-related compliance mandates are also on the rise. The right planning and security strategy… Continue Reading