Hedge Fund Blogs From HedgeCo.Net


Cybersecurity Awareness Month: ‘Best of Cyber’ Articles to Keep Your Firm Secure

October is Cybersecurity Awareness Month, and since we’ve written A LOT about security over the last few years, we thought it would be helpful to share some of our favorite articles. Here are some of Eze’s latest and greatest cybersecurity articles – happy reading!

20 Cybersecurity Dos and Don’ts Your Employees Should Follow

Do:

  • Be smart when browsing/surfing the Internet or clicking links
  • ​Lock your computer and mobile phone(s) when you leave your desk and/or office
  • Use care when entering passwords in front of others

Do Not:

  • Allow others to use your login ID or password
  • Use the same password for every
  • Store passwords on a piece of paper or other easily accessible document
  • Open email or attachments if the sender is unknown or suspicious

Looking for more cybersecurity best practices to share with your users? Read more dos and don’ts here.

What’s the Difference Between Next-Generation Firewalls and Traditional Firewalls?

Due to changes in the cyber security landscape, traditional firewalls on the port level are no longer effective at managing traffic. Malicious traffic has the capacity to enter any open port, which invites significant risk into a firm. Next-generation firewalls work further than port-based firewalls by adding application inspection and intrusion prevention. Next generation firewalls have the ability to scan traffic as it enters and leaves the network, therefore stopping potential threats.

Read more about implementing next-gen firewalls to take your firm’s security preparedness to the next level.

Six Myths about Hedge Fund Cybersecurity

The cybersecurity threat landscape continues to evolve, leaving behind significant operational and reputational harm for financial services firms. Cyber-attacks such as those impacting Equifax, LinkedIn, Yahoo and Sony have forced cybersecurity into the limelight via news-making headlines, enough to fill any business with trepidation.

We hear and see a lot of information floating around – some of which, unfortunately, can be misleading or, at times, inaccurate. It is imperative that firms understand how to separate the facts from fiction and develop and deploy sophisticated and appropriate approaches to information security. Click here to uncover six common myths about cybersecurity.

Is “Smart” Technology Invading Your Privacy?

We educate our clients all the time about how to keep their organizations secure and mitigate against insider and outsider threats. But one area of security often overlooked is that of the home office – and the home itself on a larger scale. With new technologies constantly being released – and many of today’s devices linked via the Internet of Things (IoT) – the likelihood of being hacked or having private information stolen also increases.

But what if these technologies are jeopardizing the inherent privacy of your own home? Let’s take a look into the future.

Top 10 IT Security Audit Gaps and How to Avoid Them

When it comes to cybersecurity protections, many firms often fall short. In this article, we highlight the top security gaps commonly identified during an IT risk assessment, including patch management, data classification, and more. Click here to discover all 10 – and read up on best practices to avoid them.

An Achievable Calendar for Cyber Security Plan Implementation

When was the last time you changed your passwords? What about conducting a simulated phishing exercise? With so many cyber program elements to remember, it’s easy to get overwhelmed. To help, we’ve outlined a basic calendar of security reminders to keep you on track. Get your 12-month calendar here.

Will Outsourcing Shield You from Cyber Threats?

We live in a dynamic world. Technology is evolving quickly, and IT outsourcing increasingly makes more sense for firms that aren’t able to keep pace with changing requirements and would rather focus on core competencies. But will outsourcing your technology management open you up to more risk or less? Click here to read more.

Here Are Investment Managers’ Biggest Cyber Security Fears

There’s a lot to fear in the cyber world: rogue nation states, professional cyber criminals and would-be hacktivists, just to name a few. We took a poll to find out what invesment firms consider their biggest cybersecurity fears. Click here to find out why the cyber threats below are eliciting the most fear.
Top Cyber Fears

Can’t get enough content this Cybersecurity Awareness Month? Read out latest whitepaper:

Cybersecurity for Private Equity

About Eze Castle Integration

Eze Castle Integration is the leading provider of private cloud solutions, technology and IT services for the global alternative asset management industry. Visit www.eci.com to learn more about our complete offerings.
This entry was posted in Not Categorized. Bookmark the permalink.

Comments are closed.