Insights
The cyber landscape never stops shifting – and neither should your perspective. Our Insights bring you expert commentary, thought leadership and practical guidance on the issues shaping the alternative investments sector. Stay ahead of regulators, satisfy investors, and strengthen your resilience with analysis from the team that knows your world best.
-

Six strategic cyber investments for the next six months – and beyond
The original article appears in Cybersecurity Insiders. We are in the midst of what may be a permanent shift to remote and hybrid working models. At the same time, the types of attacks businesses face continue to evolve—and the volume of attacks continues to grow. Drawbridge CEO Jason Elmer shares his take on six critical investments for…
-

How to Keep Devices Secure When Traveling
Travel is a common aspect of business, especially those businesses or firms with employees working in remote locations, or those serving a distributed client base. As personnel will be scattered, using multiple different networks and devices rather than a singular secure network, businesses everywhere have been adapting to these new environments in order to keep…
-

Real Estate Professionals and Their Cybersecurity Needs
Real estate professionals and their firms benefit greatly from robust cybersecurity measures. Cybercrime can be destructive within the real estate industry not only to firms and professions but for clients as well. Cybersecurity procedures can become a real estate professional’s best friend when it comes to keeping private information and assets safe. Real Estate Cybersecurity…
-

Why Network Firewall Security is Important
A firewall can take the form of computer hardware or software, and is used to protect a firm’s network. Network firewall security is the intermediary between your network and external parties. Through firewall’s ability to track and monitor breaches or potential breaches, as well as its ability to filter out unwanted external traffic, they are…
-

How to Spot Phishing Emails
As a part of any firm’s cybersecurity plan, defenses against phishing attacks are a necessity. Phishing is a common tactic used by cybercriminals in attempts to steal the private information of businesses or individuals. Over the years, phishing scams have not only increased in numbers but in complexity as well. The difference between upholding your…
-

Personal Cyber Advice | Social Media Cybersecurity Diligence
The social media landscape is constantly evolving. Every year it seems that there are new innovations or features offered by social media apps and websites that were previously unheard of – and even entirely new networks and platforms. While innovation continues on the public side of social media, malicious parties and cyber criminals of all…
-

Hedge Fund Cybersecurity Needs
Those within the finance industry are at constant risk of cyber criminals. There are numerous ways for cyber crime to find its way into hedge funds, including phishing and other data breaching methods. It takes the right protection plan for hedge fund cybersecurity to remain secure in the face of significant cyber risk. Hedge Fund…
-

Top Cyber Risks for Family Offices
Any given organization or firm takes on cyber risk when dealing with assets and private information in a digital space. Cyber risks for family offices, in particular, have been heightened as they have become targets by the rising threat of ransomware. Among a multitude of other potential breaches and malicious parties seeking to take advantage of…
-

How Hedge Funds can Detect Vulnerabilities with Drawbridge
Hedge funds are one of the most susceptible industries when it comes to targeted cyber attacks. These attacks can take many forms, but one of the most common cyber breaches that affects hedge funds is that of ransomware. Ransomware is a type of malware that can block access to, or even publish, the private data…
-

Cyber Criminals Continue to Target Cryptocurrencies
As digital currencies grow into a more conventional asset class, financial institutions worldwide have begun to use cryptocurrencies and blockchain technology as part of day-to-day business. While cryptocurrencies have grown in value, various new up-and-coming coins have also been introduced to the market, with seemingly hundreds pouring into the crypto currency market within the span…
-

How to Have Quality Cybersecurity at Home
Cybersecurity breaches within one’s home have been a part of life since the inception of the internet. Between a variety of online scammers, as well as those who are able to infiltrate your home network, quality, at-home cybersecurity has never been more important. Those on the internet who seek to take advantage of the relative…
-

Service Spotlight: The Necessity of Cyber Risk Assessment
In order to defend your firm from growing threats and elevate your risk posture, there need to be continuous efforts to analyze and defend from said threats. Pre-existing cybersecurity programs need to not only be made to fit within regulations, but should be poised to mitigate any potential threats lurking in an online space. With…
