Archive for Cybersecurity

Patch Management in the New COVID-19 Normal

Sending employees home to work remotely isn’t business as usual. Companies have had to act fast, and some things are inevitably getting lost in the shuffle.

The C-Suite’s Top IT Security COVID-19 Ripple Effects

Here are some of the larger and longer-term trends our Managed Detection & Response teams are seeing across our client base that should be on your radar.

What COVID-19 Means for the Cyber-Operations of Hedge Funds

As if managing potential exposure and health risks of COVID-19 aren’t enough, we’re also dealing with market volatility, economic uncertainty, and transitioning our workforces to remote work.

All Things Cybersecurity from the SEC OCIE for 2020

After reading between the lines against a backdrop of trends we see among our clients, here’s what you need to know.

Your Portfolio Companies are Under Siege

We recommend prioritizing these seven areas to prevent access and protect systems and data.

Cloud Hopper

Our MDR team is actively hunting for APT10 activity both in our own environment as well as our MDR-client environments.

We’re Still the Weakest Link

Almost every major organization’s use of links when sharing documents or asking for updates accounts for increased susceptibility.

Dejablue: The Return of BlueKeep

Last month there was a return of RDP vulnerabilities. What does this mean for your organization?

$1.5M Cybersecurity Fine for Chicago Futures Brokerage

Does your fund have gaps in its cybersecurity governance and testing regimen?

Top 3 Hedge Fund Cybersecurity Threats

Most of Agio’s hedge fund clients understand they are on the target map for cyber-criminals, but we’ve also noticed that many funds suffer from the same cybersecurity misconceptions

Everything You Need to Know About the NY Shield Act

We explore how this may affect your investors and employees and what action you should take now.

Business Email Compromise (BEC)

The FBI has identified business email compromise, or BEC, as one of the most ubiquitous forms of cybercrime in use today.