Posts

How to keep your employees from unintentionally causing a security breach

With employees using so many different network access points, from cell phones to laptops to personal computers, how can you organization hope to keep your network safe from hackers, viruses and other unintentional security breaches? There isn’t one magic bullet. Instead, business must take a multi-faceted approach. People, process, technology: People Never assume your employees…

Learn More

What happens to your stolen data after you’ve been hacked

Once a hacker breaches your system and steals your data, whether it is PII or intellectual property, there are a few different pathways that stolen data can take — the main goal is for hackers to get that information into the hands of other criminals. The most common place for that data to land is…

Learn More

ACE IT Solutions nominated for multiple prestigious hedge fund service awards by HFMWeek

ACE IT Solutions has been nominated as a finalist for multiple HFMWeek 2018 US Hedge Fund Service Awards, including: Best Tech Infrastructure Provider Best Managed Service Provider Best Technology for Small and Start-up Firms  The HFM US Hedge Fund Services Awards return for 2018 to honor providers of services and solutions to the hedge fund sector that…

Learn More

DNC, Russia and Spearphishing: Educate Employees about Phishing Emails and Strengthen Your Defenses

With a trick as simple as spearphishing, hackers were able to create massive chaos around the 2016 election. It all started with a standard-looking security request from Google for John Podesta, Hillary Clinton’s campaign chairman, to change his password. Two days later, Russian hackers stole — and later leaked — more than 50,000 of Podesta’s private…

Learn More

Addressing Unacceptable Consequences as part of your Risk Management Strategy

When developing a risk management plan, organizations spend a lot of time assessing their threats and vulnerabilities — and that is how it should be. However, there is no one-size fits all solution to risk management and we find that firms sometimes need help prioritizing where to budget. That is where consequences comes into play.…

Learn More

ACE IT Solutions Ranked Among Top 501 Global Managed Service Providers by Channel Futures

11th Annual MSP 501 Identifies World’s Most Forward-Thinking MSPs & Leading Trends in Managed Services ACE IT Solutions ranks among the world’s 501 most strategic and innovative managed service providers (MSPs), according to Channel Futures 11th-annual MSP 501 Worldwide Company Rankings. The MSP 501 is the first, largest and most comprehensive ranking of managed service providers…

Learn More

Warren Finkel accepted into Forbes Technology Council

Warren Finkel, managing partner of ACE IT Solutions, has been accepted into the Forbes Technology Council, an invitation-only community for world-class CIOs, CTOs and technology executives. Finkel joins other Forbes Tech Council members, who are hand-selected, to become part of a curated network of successful peers and get access to a variety of exclusive benefits and…

Learn More

Warren Finkel to Speak at ALTS Capital LP Sourcing Summit

Warren Finkel, managing partner of ACE IT Solutions, will be a featured speaker at the ALTS Capital LP Sourcing Summit, on June 18, 2018, at the Cornell Club in New York City. Warren will be speaking on two topics, “How to Mitigate Cybersecurity Risk” and ” Finding the Right Service Providers”. Warren brings decades of…

Learn More

ACE IT Solutions Sponsors Annual AITEC Charity Golf Classic

ACE IT Solution is proud to sponsor AITEC’s Annual Charity Golf Classic. The AITEC Gives Back Foundation is hosting its Sixth Annual Charity Golf Tournament on June 14, 2018 at the Upper Montclair County Country Club in Clifton, NJ. The charity golf event started in 2013 and has raised over $1.6 million since inception. In recent…

Learn More

Email Encryption Service for Privacy Compliance

ACE IT Solutions is proud to announce we are working in partnership with RPost to bring our clients an all-in-one email security, encryption, compliance and productivity solution. RMail encryption is award winning for its user simplicity, security, and proof of data privacy compliance Easily encrypt, track opening, prove delivery Send for recipient e-signoff on emails…

Learn More

Get More Information

Use the form below to get more information about ACE IT Services and what we can do for you.

  • This field is for validation purposes and should be left unchanged.

Contact ACE IT Solutions for more details on our data storage, backup and disaster recovery solutions.

Call (646) 558-5575
Or Request More Information

  • This field is for validation purposes and should be left unchanged.