Security

Why you need email encryption

Email is a perfect target for hackers — analysts estimate that more than 108 billion emails are sent and received each day. For businesses, email is still by far the most prolific form of communication and email by default is not secure. In fact, these days it’s about as secure as sending a postcard in…

Learn More

The Value of Secure Messaging: Lessons from the OPM Data Breach

This blog post from Cirius does an excellent job of explaining how a significant lack of encryption and other safeguards left the door open for a data breach in the US Office of Personnel Management (OPM), which cost the government millions of dollars and resulted in sensitive information from an estimated 21.5 million federal employees falling in the hands…

Learn More

Webinar: Maintaining security and trust amid increased email privacy risks

Please join us on Aug 12, 2015 at 1 PM EDT for a webinar that will address email security and privacy risks. Register: https://attendee.gotowebinar.com/register/5476336832665716482   As data breach liabilities continue to grow, financial firms must find better ways to protect themselves and their clients from risk. Ensuring client communications are encrypted and secure protects your business and builds trust. In an…

Learn More

Lessons learned from the NYSE technology “glitch”

A shutdown in trading at one the world’s most famous exchanges raised the tension in financial markets Wednesday and raised questions about the organization’s technology. Not only was the “glitch” an embarrassment for the NYSE — when trading halted at NYSE, buying and selling quickly moved onto rival exchanges. Government officials said it did not appear that…

Learn More

Beware of the latest CyptoWall Ransomware scam

Important Virus Alert!! There is a new strain of the Crypto ransomware virus, like previous infections it is delivered via email. In this case the subject line says “Resume” with an attachment labeled “my_resume.zip “. This email bypasses most email scanning engines as well as virus protection programs. Should a user open the attachment, their PC…

Learn More

You have already been hacked

What can you do about it? Fifty-five percent of all attacks are carried out by malicious insiders or inadvertent actors, also known as insider threats. In other words, they were instigated by people you’d be likely to trust. IBM Security has released the 2015 Cyber Security Intelligence Index to educate the public about these threats. In the…

Learn More

Approximately 14 million records exposed in the largest theft of government data ever seen

According to recent estimates from investigators, as many as 14 million federal employees’ records may have been compromised in the Federal office of Personnel Management OPM, which manages background checks, pension payments and job training across myriad federal agencies. FBI investigators suspect China-based hackers in the attack. In response, the White House is pushing to get various government agencies…

Learn More

Hedge Fund Publication Features ACE IT Solutions’ Cyber Security Expertise

ACE IT Solutions was featured in HFMWeek’s 2015 Cyber Risk and Security Report. They spoke with managing partner, Warren Finkel, about why cyber security must include a top-down approach to security awareness and why threat intelligence is essential. The article is below.  HFM: Can you explain ACE IT Solutions’ approach to cyber security and the main principles behind your offering? …

Learn More

ACE IT Solutions partners with Cirius to deliver secure, encrypted email

Email communication has become an important means of circulating financial information, yet it also remains vulnerable and exploitable. Email’s many vulnerabilities—malware, phishing attacks, unauthorized access–create the risk of unauthorized disclosure, corruption, or loss of financial information. For organizations subject to regulatory compliance, securing email communications has an added level complexity and obligation. Organizations are challenged…

Learn More

SEC issues additional guidance on cyber security risk management

The SEC’s Division of Investment Management — which regulates investment companies and investment advisers — has recently issued additional cybersecurity guidance in the form of a Guidance Update based on its 2014 security sweep examinations. Though the alert is fairly broad and high-level, it provides more detail on what reasonable security measures are and it expressly…

Learn More

Get More Information

Use the form below to get more information about ACE IT Services and what we can do for you.

  • This field is for validation purposes and should be left unchanged.

Contact ACE IT Solutions for more details on our data storage, backup and disaster recovery solutions.

Call (646) 558-5575
Or Request More Information

  • This field is for validation purposes and should be left unchanged.