Chat with us, powered by LiveChat

Agio's Position

Your go-to for thought leadership on cybersecurity events, trends in managed IT, the cloud, and other hot topics. Stay in the loop.

Read the latest

We’re Still the Weakest Link
We’re Still the Weakest Link
A recent ZDNet article cites statistics from Proofpoint that indicate a noticeable shift in the tactics of adversaries who use phishing to deliver malicious code. Eighty-five percent of all malicious…
IT and Cybersecurity Teams Need to Work Together
IT and Cybersecurity Teams Need to Work Together
Occasionally, we get clients who are worried about their outsourced IT provider ALSO being their outsourced cybersecurity provider. They ask the question, “Is this like the fox watching the henhouse?”…
Dejablue: The Return of BlueKeep
Dejablue: The Return of BlueKeep
Late in the spring of 2019 the National Vulnerability Database published CVE-2019-0708, later becoming known as BlueKeep. As many are aware this affected older versions of Windows, Windows 7 and…
$1.5M Cybersecurity Fine for Chicago Futures Brokerage
$1.5M Cybersecurity Fine for Chicago Futures Brokerage
On September 12, 2019 the Commodity Futures Trading Commission (CFTC) issued an order fining Phillip Capital Inc. (Phillip Capital) $1.5 million related to a cyber breach.1  The order cited…
Hedge Fund Crown Jewel Data
Hedge Fund Crown Jewel Data
Agio understands that every hedge fund client of ours is different, and all have unique operational needs when it comes to securing their most critical and sensitive systems and data.
Top 3 Hedge Fund Cybersecurity Misconceptions
Top 3 Hedge Fund Cybersecurity Misconceptions
Most of Agio’s new and prospective hedge fund clients understand they are firmly on the target map for cyber-criminals and they have the best intentions with respect to cybersecurity, but…
The Ideal Cybersecurity Client
The Ideal Cybersecurity Client
Most respectable service organizations periodically review their client population with the intent of understanding what makes a good client or what clients are the best fit.  They may conduct client…
Top 3 Hedge Fund Cybersecurity Threats
Top 3 Hedge Fund Cybersecurity Threats
Agio has been helping hedge fund clients improve their cybersecurity posture for nearly a decade. Whether the client’s motivation stems from regulatory or legal requirements, the response to a…
Here are the Top 3 Portfolio Company Cybersecurity Risks
Here are the Top 3 Portfolio Company Cybersecurity Risks
As breaches and compliance violations increase in the headlines, private equity firms have a growing need to assess the cybersecurity of their portfolio companies to identify the risks and gaps…
Everything You Need to Know About the NY Shield Act
Everything You Need to Know About the NY Shield Act
On July 25, 2019 Governor Cuomo signed the Stop Hacks and Improve Electronic Data Security Act (SHIELD Act), amending the state’s data breach notification law and expanding the requirements…
Your SQL Server 2008 and 2008 R2 are No Longer Receiving Security Updates
Your SQL Server 2008 and 2008 R2 are No Longer Receiving Security Updates
Back in January 2010 when SQL Server 2008 R2 was released, the world was a different place.  The very first iPad had yet to be sold, Alabama beat Texas to…
How to Start a Private Equity Firm
How to Start a Private Equity Firm
You’re looking to start a private equity firm and it’s a big task. There are dozens of things to wrap your mind around, from raising funds to purchasing companies –…
DDQs for Alternative Investment Firms
DDQs for Alternative Investment Firms
As the CTO, COO or CFO of a hedge fund, you’re all too familiar with your investors providing you time-consuming due diligence questionnaires (DDQs) to audit your operational safeguards and…
How the Most Secure Private Equity Firms Manage Deal Data
How the Most Secure Private Equity Firms Manage Deal Data
“We can’t do that,” was the response from IT. The request came last year from counsel after the private equity firm decided not to move forward with a new acquisition, which meant it needed to remove all related deal data from its systems.
The When & Why for MongoDB
The When & Why for MongoDB
MongoDB has been around since 2007, but only recently started getting more attention as a viable database solution. I’m often asked why I would choose MongoDB over SQL, and here are the reasons I usually give...