Archive for third party

First-party vs. third-party risks

Your organization needs to take distinct cybersecurity measures for first-party and third-party risks. Learn the difference and manage both types of cybersecurity risks to ensure data protection, smooth operations, and improve customer satisfaction. What are first-party risks?

Cybersecurity & Compliance Regulation Best Practices in 2023

Upcoming regulations from U.S. agencies will impact investment firms’ cybersecurity risk management, governance, and incident disclosure policies.

What Is Enterprise Cybersecurity?

Enterprise cybersecurity takes traditional cybersecurity to a new level. It ensures that you protect data locally, between devices, and to or from cloud environments. Why Is Enterprise Cybersecurity Important?

Vendor Due Diligence Cybersecurity Checklist for New SEC Rules

No vendor relationship is without risk. Use this cybersecurity checklist to ensure your vendors meet both your firmā€™s and the SECā€™s latest security standards.

Why It Makes Sense to Consolidate Managed IT and Security Operations

When you have separate managed IT and extended detection & response providers, you’re in a potentially vulnerable position.

4 Tips for Preventing a Hedge Fund Cyberattack

When it comes to hedge fund cyberattacks, bad actors don’t discriminate between large and small funds. Hereā€™s what you should be doing to evaluate your cybersecurity posture today.

SEC Rule 38a-2 Means You Can’t Ignore Cyber Governance Anymore

Learn about three key requirements and how to meet regulator expectations.

Keep Your Data Safe During a Nation-State Threat

Letā€™sĀ take a lookĀ at what happened with SolarWinds and howĀ the skills and strategies Agio uses day-to-day are excellent ways to protect yourself when the unexpected comes calling.

2021 SEC Division of Examinations Security Policies Report

The 2021 Examination Security Priorities report noted that even with the shift to work-from-home environments, financialĀ services maintainedĀ continuity, resiliency, and dependability.

Your Network is Only as Secure as Your Vendorsā€™ Networks

With supply chain attacks dominating recent headlines, companies are re-evaluating how third-party vendor behavior affects their own data.

Are Your Users Happy with IT in a Work-From-Home Environment?

The pandemic has challenged everyone; CTOs in particular. Your users may be working from home, but their expectations havenā€™t changed.

How To Protect Private Equity Firms From Wire Transfer Fraud

Wire and payment transfer fraud are two of the top ways alternative investment firms lose significant money to attackers.