They Are, In Fact, Out To Get You

Teaching the Security Mindset to Your Organization We’ve all heard the old adage “the best defense is a good offense.” When it comes to cybersecurity that is certainly true. Defensive measures such as antivirus and antimalware, web content filtering, and spam blocking are all reactive strategies. They rely on previously identified definitions [...]

By |2018-01-17T15:16:39-05:00April 12th, 2016|Cyber Security|Comments Off on They Are, In Fact, Out To Get You

5 Questions for your IT Consultant

Death, Taxes, and Vendor Breach The CCO's Guide for Approaching the IT Consultant Almost every engagement we undertake has Vendor Management considerations. This makes sense as every day more and more Investment Adviser and Broker-Dealer processes are outsourced. While outsourcing can make life easier in many ways, the unavoidable responsibility of third-party due [...]

By |2018-01-17T15:25:49-05:00April 5th, 2016|Cyber Security|Comments Off on 5 Questions for your IT Consultant
Go to Top