Category Archives: Uncategorized

5 Cybersecurity Principles for Business Leaders

cybersecurity regulationsToday’s business leaders have a lot on their plates. Cybersecurity can sometimes be just a side-dish when it comes to running a business. Which is why they leave it to the experts to handle the nuts and bolts of a robust cybersecurity program. Nonetheless, when a breach happens, it is the C-level executive that will be held responsible.

Rather than get bogged down in bits and pieces of cybersecurity (leave that to your cybersecurity consultant), it helps if business leaders take a broader view, starting with these five basic principles:

  1. Cybersecurity breaches WILL happen.
    Reliance on online technology and mobility has made it quite easy to access information from anywhere in the world – this includes hackers accessing your information and it is the business leader who will be held responsible when a breach occurs.
  2. Breaches will cost you
    The costs are more than monetary: time, money, reputation. Is your business prepared to minimize these losses? Work with your cybersecurity consultant to develop a plan of attack that will help minimize the costs of a breach.
  3. Small businesses are as vulnerable as large enterprises
    Hackers have had great success targeting small businesses with phishing campaigns. Over half of the phishing campaigns launched by hackers in the last year have been aimed at small businesses.
  4. Security must be holistic
    The threat landscape is always changing and hackers are always finding new ways to breach your network. The solutions you put in place five years ago are not going to be as effective as today’s solutions. Security must be incorporated into the company culture as well as the technology environment and it must be fluid. This is where managed security plays an important role.
  5. Mobility increases points of attack
    Devices that are not properly secured or maintained are in danger of exposing sensitive information. We work closely with our clients to make sure that mobile devices are a point of weakness.

ACE IT Solutions philosophy toward cybersecurity is two-fold:

  • Security must be considered in every aspect of network and mobile technology that the organization uses.
  • There is no one-size fits all approach to cybersecurity. Given the principles listed above, we can tailor a cybersecurity program matched to your specific risk profile.

By partnering with ACE IT Solutions, organizations can thwart hackers attempts and respond quickly to minimize the costs of a breach. Contact us at 646.558.6358 to learn more about protecting your business from hackers.



NY DFS Releases Cybersecurity Requirements for Financial Service Companies

New cybersecurity regulations are set to go into effect on March 1, and NY-based financial firms need to be prepared. Announced  in September 2016, the new cybersecurity regulation, known as 23 NYCRR 500, was developed to “guarantee the financial services industry upholds its obligation to protect consumers and ensure that its systems are sufficiently constructed to prevent… Continue Reading

Simplify Cybersecurity with a Proactive Approach to Security Threats

ACE IT Solutions’ cybersecurity partner, IBM Security, has launched a new team of global experts – IBM X-Force IRIS, to help clients prepare for and rapidly respond to security threats with best-of-breed security solutions. Our seasoned experts and consultants deliver threat intelligence services, incident preparedness planning and onsite response services to help organizations stay ahead… Continue Reading

Restore Systems After Ransomware without Paying

The San Francisco Municipal Transportation Authority (SFMTA) was hit with a ransomware attack the morning of Friday, Nov. 25. It is reported that the hacker demanded approximately $73,000 USD to restore operations. Fortunately, the SFMTA had an information technology team in place and backup systems that allowed the SFMTA to bounce back without paying a cent.… Continue Reading

Protecting Your Network From Ransomware: Tips from the FBI

Ransomware is the fastest growing malware threat, targeting users in all industries and businesses of all sizes. On average, more than 4,000 ransomware attacks have occurred daily since January 1, 2016. This is a 300-percent increase over the approximately 1,000 attacks per day seen in 2015. What is Ransomware? Ransomware is a form of malware that… Continue Reading

ACE IT Solutions Nominated for Multiple Hedge Fund Service Awards

New York, NY, 19 September, 2016 — ACE IT Solutions has been nominated as a finalist for several HFMWeek 2016 US Hedge Fund Services Awards, including: Best Outsourced Tech Infrastructure Provider Best Technology for Small and Start-Up Firms Best Technology Firm – Client Service Best IT Security Service The awards showcase the leading hedge fund… Continue Reading

ACE IT Solutions Featured in Special Report: Cybersecurity for Fund Managers

ACE IT Solutions is proud to announced they have been featured in Hedgeweek’s Special Report, “Cybersecurity for Fund Managers.” In the special report, ACE IT Solutions managing partner, Warren Finkel, and Datto VP of Marketing, Carrie Reber, discuss ransomware and how funds can fight back without paying hackers one cent. Companies across all sectors are… Continue Reading