IT Solutions

Could a Cybersecurity Breach Get You Fired?

As cybersecurity becomes a priority for managing business risk, C-level executives are being held accountable for cybersecurity weaknesses in their organization. With the recent deluge of high-profile breaches, CEO tenure is now at risk based on the effective control and protection of corporate assets. A cybersecurity hack could ruin a company. Board members (and stockholders)…

Learn More

8 Tips for Improving Your Business’ Security Posture

Cybersecurity doesn’t have to be expensive or complicated, but it must be given the proper attention. Security is no longer an optional service. It should be woven into every aspect of a business’ technology infrastructure and it requires attention on every level — from employees to c-level executives. Implement these simple strategies to help protect…

Learn More

ACE IT Solutions Nominated for Five Hedge Fund Technology Awards

ACE IT Solutions has been nominated as a finalist for five HFMWeek 2017 US Hedge Fund Technology Awards, including: Best infrastructure provider (read more) Best IT consultancy service (read more) Best IT service for small and start-up firms (read more) Best security solution (read more) Best overall technology firm – client service​ (read more) The 2017 US…

Learn More

SEC Announces Examination Priorities for 2016

On January 11, 2016, the staff of the Office of Compliance Inspections and Examinations (OCIE) of the Securities and Exchange Commission (SEC) released its annual announcement on examination priorities for the coming calendar year. While the announcement contains broad and general descriptions of areas in which the staff intends to focus, there are several key points to…

Learn More

Is it Time for an Active Directory Audit?

Today’s organizations need to govern and enforce user access across multiple channels, including mobile, social and cloud. At the same time, they must address business needs such as role management, compliance and audit reporting and integration of various user populations. Identity and access management solutions (IMAC) help strengthen compliance and reduce risk by protecting and…

Learn More

Why you need email encryption

Email is a perfect target for hackers — analysts estimate that more than 108 billion emails are sent and received each day. For businesses, email is still by far the most prolific form of communication and email by default is not secure. In fact, these days it’s about as secure as sending a postcard in…

Learn More

Beware of the latest CyptoWall Ransomware scam

Important Virus Alert!! There is a new strain of the Crypto ransomware virus, like previous infections it is delivered via email. In this case the subject line says “Resume” with an attachment labeled “my_resume.zip “. This email bypasses most email scanning engines as well as virus protection programs. Should a user open the attachment, their PC…

Learn More

Approximately 14 million records exposed in the largest theft of government data ever seen

According to recent estimates from investigators, as many as 14 million federal employees’ records may have been compromised in the Federal office of Personnel Management OPM, which manages background checks, pension payments and job training across myriad federal agencies. FBI investigators suspect China-based hackers in the attack. In response, the White House is pushing to get various government agencies…

Learn More

Last Call for Microsoft Server 2003

Microsoft Windows Server support is ending on July 14, 2015.  After July 14, Microsoft will no longer issue security updates for any version of Windows Server 2003. If you are still running Windows Server 2003 in your datacenter, you need to take steps now to plan and execute a migration strategy to protect your infrastructure. Businesses…

Learn More

SEC issues additional guidance on cyber security risk management

The SEC’s Division of Investment Management — which regulates investment companies and investment advisers — has recently issued additional cybersecurity guidance in the form of a Guidance Update based on its 2014 security sweep examinations. Though the alert is fairly broad and high-level, it provides more detail on what reasonable security measures are and it expressly…

Learn More

Get More Information

Use the form below to get more information about ACE IT Services and what we can do for you.

  • This field is for validation purposes and should be left unchanged.

Contact ACE IT Solutions for more details on our data storage, backup and disaster recovery solutions.

Call (646) 558-5575
Or Request More Information

  • This field is for validation purposes and should be left unchanged.