Insights
The cyber landscape never stops shifting – and neither should your perspective. Our Insights bring you expert commentary, thought leadership and practical guidance on the issues shaping the alternative investments sector. Stay ahead of regulators, satisfy investors, and strengthen your resilience with analysis from the team that knows your world best.
-


Real-Time, Continuous Cyber Threat Monitoring Enhances Cybersecurity
Cyber threat monitoring is consistently important within financial industries. Cyber breaches can come from anywhere, at every level of the business. When potential avenues for cyber threats are under watch, however, firms can report greater success in repelling network breaches. Even with the right cybersecurity procedure in place, it may not be enough when faced…
-


The Importance of Software Updates for Fighting Cyber Risk
Software updates can often go ignored, with users prompted to update during the workday, or perhaps leaving their machines on overnight. Depending on the program, update frequency has even been a cause of annoyance for those who are unaware of software updates’ importance. Both software updates and security patches of any kind will often provide…
-

Phishing Tactics Targeting the Financial Sector
Phishing is a form of social engineering that seeks to accomplish malicious online attacks. This can be anything from the theft of private information to the installation of malware on a home or private network. The financial sector has been hit harder than ever by cyber crime. Phishing is a common tool in the attacker’s arsenal. Read…
-

Cybersecurity Keys to Securing Microsoft Office 365
The rise in remote work has turned the already popular Microsoft Office 365 suite into an even more widely used digital platform. Many firms rely on Microsoft Office 365 for the effective management of employees. Among other advanced online capabilities, such as version control, document sharing, and collaboration. As employees shift more interactions online, however,…
-

Cyber Risks and Solutions for Third-Party Vendors
Third-party vendors are an important aspect of modern business. They enable the use of complex tools and connectivity within one’s firm, freeing up the client to focus on their core business. However, the use of third-party vendors does expose clients to added cyber risks. Due diligence has become a necessary part of doing business with or through…
-

Six strategic cyber investments for the next six months – and beyond
The original article appears in Cybersecurity Insiders. We are in the midst of what may be a permanent shift to remote and hybrid working models. At the same time, the types of attacks businesses face continue to evolve—and the volume of attacks continues to grow. Drawbridge CEO Jason Elmer shares his take on six critical investments for…
-

How to Keep Devices Secure When Traveling
Travel is a common aspect of business, especially those businesses or firms with employees working in remote locations, or those serving a distributed client base. As personnel will be scattered, using multiple different networks and devices rather than a singular secure network, businesses everywhere have been adapting to these new environments in order to keep…
-

Real Estate Professionals and Their Cybersecurity Needs
Real estate professionals and their firms benefit greatly from robust cybersecurity measures. Cybercrime can be destructive within the real estate industry not only to firms and professions but for clients as well. Cybersecurity procedures can become a real estate professional’s best friend when it comes to keeping private information and assets safe. Real Estate Cybersecurity…
-

Why Network Firewall Security is Important
A firewall can take the form of computer hardware or software, and is used to protect a firm’s network. Network firewall security is the intermediary between your network and external parties. Through firewall’s ability to track and monitor breaches or potential breaches, as well as its ability to filter out unwanted external traffic, they are…
-

How to Spot Phishing Emails
As a part of any firm’s cybersecurity plan, defenses against phishing attacks are a necessity. Phishing is a common tactic used by cybercriminals in attempts to steal the private information of businesses or individuals. Over the years, phishing scams have not only increased in numbers but in complexity as well. The difference between upholding your…
-

Personal Cyber Advice | Social Media Cybersecurity Diligence
The social media landscape is constantly evolving. Every year it seems that there are new innovations or features offered by social media apps and websites that were previously unheard of – and even entirely new networks and platforms. While innovation continues on the public side of social media, malicious parties and cyber criminals of all…
-

Hedge Fund Cybersecurity Needs
Those within the finance industry are at constant risk of cyber criminals. There are numerous ways for cyber crime to find its way into hedge funds, including phishing and other data breaching methods. It takes the right protection plan for hedge fund cybersecurity to remain secure in the face of significant cyber risk. Hedge Fund…
