Agio's Position

Your go-to for thought leadership on cybersecurity events,
trends in managed IT, the cloud, and other hot topics.
Stay in the loop.

Read the latest

What Does Your MDR Solution  <em>Really </em>Do?
What Does Your MDR Solution Really Do?
There are a ton of Managed Detection & Response (MDR) services out there, but breaking them down in plain English so you know what you’re really getting is a bit tougher. 
You&#8217;re in the Public Cloud, Now What?
You’re in the Public Cloud, Now What?
Many firms are in the midst of developing a Public Cloud strategy in an effort to reduce costs, gain productivity, and improve the security of their infrastructure.  But don’t be fooled, the ease of adoption and the initial setup doesn’t mean you’re secure by default…
Private Equity &#038; Venture Capital, “Ugggh” is Not a Response
Private Equity & Venture Capital, “Ugggh” is Not a Response
Over the past year, we’ve identified a growing trend in private equity and venture capital firms with respect to cybersecurity events.
Spear Phishing — A Threat to Hedge Funds &#038; Private Equity Firms
Spear Phishing — A Threat to Hedge Funds & Private Equity Firms
The U.S. government recently confirmed Russian agents continue to use simple, yet effective spear phishing tactics against political targets, and it remains a looming threat to us all.
3 Risk Assessment Myths, Busted
3 Risk Assessment Myths, Busted
Say the phrase “risk assessment” to any IT professional and watch the cynical eye rolling commence. There are a lot of assumptions about risk assessments, but these assumptions are all false.
GDPR &#038; What Financial Services Needs to Know
GDPR & What Financial Services Needs to Know
How does the EU’s GDPR apply to you? What challenges do you face to comply? Does the regulation really have teeth? We break it all down for you.
Don’t be a Victim of Income Tax Identity Theft
Don’t be a Victim of Income Tax Identity Theft
Learn about income tax identity theft and how to avoid becoming a victim of criminals who target computers used to electronically file taxes with the IRS.
Top 5 Cybersecurity Risks for Private Equity
Top 5 Cybersecurity Risks for Private Equity
Private equity firms need to go beyond reactive SEC-compliance and focus on proactive protection of their firm assets.
Detection &#038; Response First. Prevention Second.
Detection & Response First. Prevention Second.
Experience and research shows us that while effective prevention strategies are essential, detection and response are even more important, for three reasons.
SEC Warns of Fraudsters
SEC Warns of Fraudsters
The SEC issued a warning to the public concerning fraudsters, who are impersonating the SEC in an attempt to trick potential victims to steal both personal information and money.
Office 365 for Hedge Funds and Private Equity
Office 365 for Hedge Funds and Private Equity
We see that email continues to emerge as the most frequently attacked vector. And with Microsoft Office 365 being the dominant email platform in the alternative investment space, we thought it worth discussing some of the top considerations when securing Office 365.
The Four Dimensions to Cybersecurity That Really Matter
The Four Dimensions to Cybersecurity That Really Matter
Best-in-breed cybersecurity—when it comes to governance, strategy, and tactical execution— rests on four pillars. At Agio, we’ve coined it ADEPT, reflective of Agio Diligence, Expertise, Process, and Technology.
Importance of Client Feedback on Improving Service
Importance of Client Feedback on Improving Service
We get approached from hedge funds and private equity firms about taking over their IT Support from another vendor. Almost always the reason for switching providers is the same – quality of service.
The Time We Hacked a Private Equity Firm…from Their Lobby
The Time We Hacked a Private Equity Firm…from Their Lobby
This test was part of the client’s Cybersecurity Risk Assessment within Agio’s larger SEC Cybersecurity Readiness Program.
In Cybersecurity, Governance Trumps Technology
In Cybersecurity, Governance Trumps Technology
A strong cybersecurity program depends on governance to ensure broad participation, establish clear authority, and enable fully informed decision-making.