Dena Rissman

Join ACE IT Solutions at the Commercial Observer Building Technology Forum

ACE IT Solutions is a proud sponsor of Commercial Observers’ Inaugural Building Technology Forum Join ACE IT Solutions and the Commercial Observer on October 23rd, for a half-day conference on latest technologies that are changing the face of the building and design industries. ACE IT Solutions will be on hand to discuss the critical technology…

Learn More

What Your Business Can Learn from the Door Dash Data Breach

Door Dash recently made headlines for a massive data breach that exposed the personal data of over over 4.9 million customers, delivery workers and merchants. That is close to 5 million people whose personal data is now in the hands of hackers. The breach was reported to have occurred on May 4, 2019 – however,…

Learn More

ACE IT Solutions Named to 2019 MSSP Alert Top 200 Managed Security Services Providers List

Third Annual List Honors Leading MSSPs, MDR Service Providers & Cybersecurity Companies MSSP Alert, published by After Nines Inc., has named ACE IT Solutions to the Top 200 MSSPs list for 2019 (http://www.msspalert.com/top200). The list and research identify and honor the top 200 managed security services providers (MSSPs) that specialize in comprehensive, outsourced cybersecurity services.…

Learn More

Cybersecurity is the Greatest Threat to the World Economy

According to global business leaders and investors who were surveyed for the 2019 EY CEO Imperative Study, cybersecurity is the number one threat to the global economy. Among all the myriad worries faced by global leaders, they placed cybersecurity threats above all other major concerns. We’ve been talking about cybersecurity threats for years, so why…

Learn More

Where are your data leaks?

Data security and privacy were named as top issues impacting businesses in 2019 — cybersecurity has also been named as the number one threat to the global economy. A key component of cybersecurity is being able to identify gaps in your security program – data leaks. These can be both technical and human-based gaps. Data…

Learn More

Seconds Count in Endpoint Security: Why Real Time Matters

If you are not detecting and containing automatically in real time, you are already too late ACE IT Solutions partners with EnSilo to deliver seamless, real-time endpoint protection to our clients. EnSilo stops advanced malware in real time and protects our clients endpoint. This post, from enSilo clearly explains the importance of real-time endpoint protection.…

Learn More

Cloud Maturity: Where does your business stand when it comes to implementing cloud technology?

How can you ensure your IT investments bring value to your business? Here are a few key aspects to consider when assessing your firm’s cloud maturity: Has your IT infrastructure reached end-of-life? Do your IT requirements exceed your budget forecast? Do you find yourself forced to make significant investments to maintain and renew your local…

Learn More

5 Ways to Avoid a GDPR Fine

GDPR fines have become very real with US $450 million in penalties recently issued in a single week. Even if GDPR doesn’t apply to your firm, your organization can still benefit greatly from following these five cybersecurity tips. If you think a GDPR fine is expensive, just wait until you get hacked, which can be…

Learn More

ACE IT Solutions Nominated for Multiple Hedge Fund Service Awards

ACE IT Solutions has been nominated as a finalist for multiple HFMWeek 2019 US Hedge Fund Service Awards, including: Best Cybersecurity Service Best Managed Service Provider Best Technology for Small and Start-up Firms  Best Use of Cloud Technology The HFM US Hedge Fund Services Awards honors providers of services and solutions to the hedge fund sector…

Learn More

Dos and Don’ts of Social Media Cybersecurity

Social networking and online profiles are the treasure trove of information gathering for attackers. Hackers are experts at using your social media profiles to connect the pieces of information they have gathered from these sources to conduct an effective phishing attack. As part of your firms’ cybersecurity strategy, all employees, including the C-suite, need to…

Learn More

Get More Information

Use the form below to get more information about ACE IT Services and what we can do for you.

  • This field is for validation purposes and should be left unchanged.

Contact ACE IT Solutions for more details on our data storage, backup and disaster recovery solutions.

Call (646) 558-5575
Or Request More Information

  • This field is for validation purposes and should be left unchanged.