Cybersecurity and Risk Insights and Alerts
Cyber risks and threats continue to evolve, and firms are under pressure to meet SEC and FCA expectations for operational resilience as well as their own internal and client expectations for cybersecurity and privacy. Stay current on the latest cybersecurity, privacy, and risk threat and regulatory alerts, and build your cybersecurity and privacy knowledge with insights from our cybersecurity and technology risk experts.
ACA Aponix Cybersecurity Checklist
Cyber alerts and insights

Ransomware 101 Part 4: How to Engage with Law Enforcement After an Attack
How to empower organizations to contact law enforcement after an attack
- Cybersecurity
- Cybersecurity Resources

FinCEN Issues Amended Advisory on Ransomware and Use of Financial System to Facilitate Ransom Payments
New FinCEN update on ransomware
- Cybersecurity
- Cybersecurity Resources

Ransomware 101 Part 3: How to Respond to a Ransomware Attack
Our Ransomware 101 blog series addresses multiple aspects of the ransomware issue, including what you should know and what you should do to protect your firm, your clients, and your finances. In part one, we discussed the evolving and growing threat of ransomware. In this article (part three), we’ll provide steps for responding to a ransomware attack.
- Cybersecurity
- Cybersecurity Resources

Private Equity Firms Report Receiving Phishing Emails and Scam Capital Calls
Private Equity Firms, their investors and their portfolio companies have recently been targeted in phishing attacks.
- Cybersecurity
- Cybersecurity Resources
- Phishing

Personal Information Protection Law (PIPL) FAQs
The People’s Republic of China (PRC) has passed robust data privacy regulation that governs data security and personal information processing. This FAQ addresses questions firms may have about the nature of this legislation and its requirements.
- Cybersecurity
- Privacy

Being Smart About Your Smartphone
The more information you allow your smartphone apps to share, the easier it will be for hackers to steal this information and use it for malicious purposes. This post discusses best practices for securing your mobile device and the apps you install.
- Cybersecurity
- Cybersecurity Resources