Chat with us, powered by LiveChat

Agio's Position

Your go-to for thought leadership on cybersecurity events, trends in managed IT, the cloud, and other hot topics. Stay in the loop.

Read the latest

Agio’s 10-Year Anniversary: Letter from CEO, Bart McDonough
Agio’s 10-Year Anniversary: Letter from CEO, Bart McDonough
Ten years ago today, I was fortunate enough to have an opportunity to turn an idea into a strategy, coupled with a culture, which resulted in Agio. With an established culture, more than 275 employees and…
Cloud Hopper
Cloud Hopper
What is it? Cloud Hopper is an ongoing cyber espionage campaign originally discovered back in 2016 with activities reaching as far back as 2014.  Executed by a Chinese-based threat actor…
Why Top CTOs Care About IT Governance
Why Top CTOs Care About IT Governance
IT Governance is a broad term encompassing the entire IT framework system implemented in a firm. But when most of us hear the word “governance” we roll our eyes and…
How to Move to the Cloud
How to Move to the Cloud
Cloud computing has evolved from an advanced technology that allowed organizations to grow, into a necessary tool that is central to the sustainability of a modern organization. According to Cisco,…
Make Sure Your Users Aren’t The Problem
Make Sure Your Users Aren’t The Problem
As organizations continue to battle the onslaught of cybersecurity threats posed by criminally motivated hackers around the world, there has been a growing emphasis on strengthening internal security measures. While…
The Changing Threat of Email Attacks on Private Equity Firms and Portfolio Companies
The Changing Threat of Email Attacks on Private Equity Firms and Portfolio Companies
Email attacks continue to be the most used and most effective method bad actors select in attempts to compromise accounts and steal money from private equity firms and their portfolio…
Microsoft Azure Increases Your Productivity
Microsoft Azure Increases Your Productivity
As the business world continues to move towards an entirely digitalized workspace, technologies such as cloud computing have emerged as key transformation drivers – allowing a greater degree of innovation,…
We’re Still the Weakest Link
We’re Still the Weakest Link
A recent ZDNet article cites statistics from Proofpoint that indicate a noticeable shift in the tactics of adversaries who use phishing to deliver malicious code. Eighty-five percent of all malicious…
IT and Cybersecurity Teams Need to Work Together
IT and Cybersecurity Teams Need to Work Together
Occasionally, we get clients who are worried about their outsourced IT provider ALSO being their outsourced cybersecurity provider. They ask the question, “Is this like the fox watching the henhouse?”…
Dejablue: The Return of BlueKeep
Dejablue: The Return of BlueKeep
Late in the spring of 2019 the National Vulnerability Database published CVE-2019-0708, later becoming known as BlueKeep. As many are aware this affected older versions of Windows, Windows 7 and…
$1.5M Cybersecurity Fine for Chicago Futures Brokerage
$1.5M Cybersecurity Fine for Chicago Futures Brokerage
On September 12, 2019 the Commodity Futures Trading Commission (CFTC) issued an order fining Phillip Capital Inc. (Phillip Capital) $1.5 million related to a cyber breach.1  The order cited…
Hedge Fund Crown Jewel Data
Hedge Fund Crown Jewel Data
Agio understands that every hedge fund client of ours is different, and all have unique operational needs when it comes to securing their most critical and sensitive systems and data.
Top 3 Hedge Fund Cybersecurity Misconceptions
Top 3 Hedge Fund Cybersecurity Misconceptions
Most of Agio’s new and prospective hedge fund clients understand they are firmly on the target map for cyber-criminals and they have the best intentions with respect to cybersecurity, but…
The Ideal Cybersecurity Client
The Ideal Cybersecurity Client
Most respectable service organizations periodically review their client population with the intent of understanding what makes a good client or what clients are the best fit.  They may conduct client…
Top 3 Hedge Fund Cybersecurity Threats
Top 3 Hedge Fund Cybersecurity Threats
Agio has been helping hedge fund clients improve their cybersecurity posture for nearly a decade. Whether the client’s motivation stems from regulatory or legal requirements, the response to a…