Posts

What stronger data privacy regulations mean for your business and how to prepare

The state of California this summer passed the California Consumer Privacy Act (CCPA). This data privacy regulation is the first United States law that follows directly in the footsteps of GDPR. Businesses both inside and outside of California will be affected by its requirements. The CCPA regulation extends privacy protections and rights to all California residents,…

Learn More

Are Your Firm’s Credentials on the Dark Web?

ACE IT Solutions is proud to announce we have partnered with ID Agent to provide Dark Web scanning to identify, analyze and proactively monitor for your organization’s compromised or stolen employee and customer data. ACE IT Solutions is proud to offer new Dark Web monitoring services delivered through its partnership with ID Agent, provider of Dark Web…

Learn More

The Biggest Cybersecurity Breaches of 2018 and Lessons Learned

Hackers had a good year in 2018 with nearly 750 million records exposed in just 10 big data breaches. Most likely, these records were exposed to the Dark Web, where cybercriminals trade in stolen data. Lesson #1: Find out if your business’ data is on the dark web. Contact ACE IT Solutions, we have high-level…

Learn More

ACE IT Solutions Nominated for Multiple Hedge Fund Technology Awards

ACE IT Solutions has been nominated as a finalist for six HFMWeek 2019 US Hedge Fund Technology Awards, including: Best public cloud service Best cyber-security solution  Best infrastructure provider Best IT managed service Best IT consultancy  Best service for small and start-up firms  The 2019 US Hedge Fund Technology Awards recognize and reward IT and…

Learn More

Homeland Security Tips: Questions Every CEO Should Ask About Cyber Risks

According to the office of Homeland Security, Cyber threats affect businesses of all sizes and require the attention and involvement of chief executive officers (CEOs) and other senior leaders. The office of Homeland Security compiled a list of key cybersecurity risk management topics all C-level execs should discuss with their leadership. This list is based on…

Learn More

Massive Marriott Cybersecurity Breach Ranks Among Largest Breaches Ever

Marriott has disclosed a massive Starwood hotel data breach that may have impacted 500 million customers.  The breach and unauthorized access to Starwood’s reservation network apparently stretched from 2014 through November of 2018. For approximately 327 million customers, the stolen information includes some combination of name, mailing address, phone number, email address, passport number, Starwood Preferred…

Learn More

10 Cybersecurity Myths you Should Not Fall For

Small and mid-sized businesses (SMBs) are too small to be targeted by hackers Hackers use small businesses to get to the big businesses. If a hacker uses a cyber attack on your business as a  stepping-stone to a larger attack, your partners are going to come after you big time. Small businesses are easy to…

Learn More

Preparing for the GDPR in the USA needs to start now

ACE IT Solutions is proud to announce GDPR consulting and compliance services for American businesses concerned about the impact of GDPR on their organizations. GDPR regulations, implemented in the EU on May 25, 2018, have had a significant impact on enterprise cybersecurity and data governance policies and practices beyond the European Union, particularly impacting global…

Learn More

ACE IT Solutions Recognized on 2018 CRN Next-Gen 250 List

Annual List Recognizes Solution Providers Transforming Business with Emerging Technologies ACE IT Solutions is proud to announce we have been named to the 2018 Next-Gen 250 list.  The list is complied by CRN®, a brand of The Channel Company, and identifies IT solution providers who have embraced emerging technologies and are setting the pace for the rest of the…

Learn More

Who in your Business is to Blame for a Cybersecurity Breach?

The blame game starts as soon as the breach is detected. Do you blame the employee who clicked the phishing email link that launched the malware and implanted a rootkit? Do you blame the IT department at large or the CIO for not having the necessary security tools in place to prevent it?  Do you…

Learn More

Get More Information

Use the form below to get more information about ACE IT Services and what we can do for you.

  • This field is for validation purposes and should be left unchanged.

Contact ACE IT Solutions for more details on our data storage, backup and disaster recovery solutions.

Call (646) 558-5575
Or Request More Information

  • This field is for validation purposes and should be left unchanged.