hacking

Data Backup or Disaster Recovery — Which is the best choice for your business?

What is the different between data backup and disaster recovery?  We get this question a lot from clients looking to find the balance between their budget requirements and making sure they can access their data and technology whenever they need it. Data Backup  Data backup is a necessity. Non-optional. Every businesses must have it. Data backup…

Learn More

Need cyber security insurance? Do this first

Cyber crime is a major threat to businesses, costing the global economy over a half a trillion a year according to insurer Allianz. Because criminal hackers are so proficient and because computer systems are so central to business, some analysts predict insurers could soon face catastrophic losses.  Many businesses are looking to cyber security insurance to…

Learn More

“Dyre Wolf” Trojan has Dire Consequences for SMBs

Last week, IBM Security reported on an active phishing campaign, named Dyre Wolf, that has successfully stolen more than $1 million at a time from targeted enterprise organizations. The heist uses advanced social engineering tactics geared to circumvent two-factor authentication to quickly penetrate targeted organizations and spread Trojans using their victims’ email contacts lists. Most banking Trojans target individuals, but Dyre…

Learn More

Cyber security: IBM X-Force Threat Intelligence Report

IBM has released its X-Force Cyber Security Threat Intelligence Report  (Q1 2015) and it discloses some very interesting facts about the cyber threat landscape over the last year. Based on pure volume, the total number of records breached in 2014 was nearly 25 percent higher than in 2013 The tone of breaches has shifted, revealing disturbing…

Learn More

Successful phishing attempt leads to one of the largest bank hacks in history

According to the New York Times hackers have successfully made away with millions of dollars in one of the largest bank hacks in history. The majority of the targets were in Russia, but banks in Japan, the United States and Europe were also targeted. The bank’s internal computers, used by employees who process daily transfers…

Learn More

Proposed Law Gives Hacked Businesses 30 Days to Notify Customers

A proposed law would give businesses that have been hacked 30 days to fess up. The Personal Data Notification & Protection Act would give a company 30 days to notify customers that their personal information has been exposed. On average, the time from when a company is hacked to the time the hack is discovered…

Learn More

Cybersecurity Threat Preparedness: Incident Response Planning

Business leaders have much to learn from the recent cyber attack against Sony. One of the most important lessons: Have a plan for dealing with cyber attacks. The much publicized hack led Sony to shut down all computer systems, including those in overseas offices, leaving the company with no voice mail, no corporate email, no…

Learn More

Sony CEO’s Leadership is Questioned as Hack Fallout Continues

Sony’s CEO is facing widespread scrutiny about his judgment in the wake of the cyber attack that has paralyzed the entertainment company and exposed it to embarrassment and untold millions in damage. Much of the criticism focuses on the CEO not taking steps to properly secure the company’s computer network. In fact, cyber security experts…

Learn More

More Cyber Security Breaches: Beware of Phishing Attacks

Home Depot announced on Thursday that hackers who stole 56 million customer credit and debit card accounts also made off with 53 million customer email addresses. Home Depot stressed that the files containing the stolen email addresses did not contain passwords, payment card information or other sensitive personal information. However, that will not stop cyber thieves from…

Learn More

CNBC: Large Hedge Fund Suffers Cyber Attack

According to CNBC, cybercriminals acting in late 2013 installed a malicious computer program on the servers of a large hedge fund, crippling its high-speed trading strategy and sending information about its trades to unknown offsite computers. They attack was thwarted by a cyber intelligence firm BAE Systems Applied Intelligence, which declined to name the hedge fund…

Learn More

Get More Information

Use the form below to get more information about ACE IT Services and what we can do for you.

  • This field is for validation purposes and should be left unchanged.

Contact ACE IT Solutions for more details on our data storage, backup and disaster recovery solutions.

Call (646) 558-5575
Or Request More Information

  • This field is for validation purposes and should be left unchanged.