Say the phrase “risk assessment” to any IT professional and watch the cynical eye rolling commence. There are a lot of assumptions about risk assessments, but these assumptions are all false.
How does the EU’s GDPR apply to you? What challenges do you face to comply? Does the regulation really have teeth? We break it all down for you.
Learn about income tax identity theft and how to avoid becoming a victim of criminals who target computers used to electronically file taxes with the IRS.
Private equity firms need to go beyond reactive SEC-compliance and focus on proactive protection of their firm assets.
Experience and research shows us that while effective prevention strategies are essential, detection and response are even more important, for three reasons.
The SEC issued a warning to the public concerning fraudsters, who are impersonating the SEC in an attempt to trick potential victims to steal both personal information and money.
We see that email continues to emerge as the most frequently attacked vector. And with Microsoft Office 365 being the dominant email platform in the alternative investment space, we thought it worth discussing some of the top considerations when securing Office 365.
Best-in-breed cybersecurity—when it comes to governance, strategy, and tactical execution— rests on four pillars. At Agio, we’ve coined it ADEPT, reflective of Agio Diligence, Expertise, Process, and Technology.
We get approached from hedge funds and private equity firms about taking over their IT Support from another vendor. Almost always the reason for switching providers is the same – quality of service.
This test was part of the client’s Cybersecurity Risk Assessment within Agio’s larger SEC Cybersecurity Readiness Program.
A strong cybersecurity program depends on governance to ensure broad participation, establish clear authority, and enable fully informed decision-making.
Just as weather anomalies have been dominating conversation at the dinner table, another type of cloud has emerged in the mainstream news at a record-setting pace: cloud computing.
Although both types of financial service institutions handle highly sensitive data and massive monetary assets, Agio maintains private equity firms pose a bigger cybersecurity challenge than hedge…
Our student records are in danger. Hackers target organizations that have access to personal health information (PHI), meaning educational and health care institutions have a bullseye on their backs.
The third part of the CIA triad — availability — often surprises people. Contrary to popular belief, being “secure” does not mean locking down your information.