This chart from IBM reveals today’s threat landscape. Cyber threats are increasingly more damaging, more pervasive and more complex than ever. With over 240 new threats introduced each minute, the standard security perimeter solutions that businesses have been using for years aren’t cutting it anymore. That perimeter is disappearing. Businesses absolutely need dynamic insight and proactive…
Learn MoreACE IT Solutions was featured in HFMWeek’s 2015 Cyber Risk and Security Report. They spoke with managing partner, Warren Finkel, about why cyber security must include a top-down approach to security awareness and why threat intelligence is essential. The article is below. HFM: Can you explain ACE IT Solutions’ approach to cyber security and the main principles behind your offering? …
Learn MoreEmail communication has become an important means of circulating financial information, yet it also remains vulnerable and exploitable. Email’s many vulnerabilities—malware, phishing attacks, unauthorized access–create the risk of unauthorized disclosure, corruption, or loss of financial information. For organizations subject to regulatory compliance, securing email communications has an added level complexity and obligation. Organizations are challenged…
Learn MoreThe SEC’s Division of Investment Management — which regulates investment companies and investment advisers — has recently issued additional cybersecurity guidance in the form of a Guidance Update based on its 2014 security sweep examinations. Though the alert is fairly broad and high-level, it provides more detail on what reasonable security measures are and it expressly…
Learn MoreGet More Information
Contact ACE IT Solutions for more details on our data storage, backup and disaster recovery solutions.
Call (646) 558-5575
Or Request More Information