Cybersecurity and Risk Insights and Alerts
Cyber risks and threats continue to evolve, and firms are under pressure to meet SEC and FCA expectations for operational resilience as well as their own internal and client expectations for cybersecurity and privacy. Stay current on the latest cybersecurity, privacy, and risk threat and regulatory alerts, and build your cybersecurity and privacy knowledge with insights from our cybersecurity and technology risk experts.
ACA Aponix Cybersecurity Checklist
Cyber alerts and insights
Protecting Your Online Identity
As cyber security attacks continue to increase in frequency and complexity alongside evolving technologies, the COVID-19 pandemic, and remote work and school, it is essential to prioritize protecting your identity online. Here are some ways you can control the amount of personal information that is available online.
- Cybersecurity
- Cybersecurity Resources
Talking to Your Family and Friends About Cybersecurity
The recent increase in high-profile cyber incidents have put millions of people around the world at risk for identity theft and other cyber-crimes. This blog post contains tips and information you can share with your family and friends about staying safe online.
- Cybersecurity
- Cybersecurity Resources
Now Open: 2021 ACA Group and NSCP Cybersecurity Programs Survey
We're pleased to announce that we've again partnered with the National Society of Compliance Professionals (NSCP) to provide financial services firms with an opportunity to gain insight into cybersecurity compliance programs across the industry.
- Cybersecurity
Ransomware 101 Part 2: How to Prevent and Detect a Ransomware Attack
Our Ransomware 101 blog series addresses multiple aspects of the ransomware issue, including what you should know and what you should do to protect your firm, your clients, and your finances. In part one, we discussed the evolving and growing threat of ransomware. In this article (part two), we’ll provide a framework for what your organization can do to prevent and detect ransomware attacks.
- Cybersecurity
- Cybersecurity Resources
Apple® Issues Patch to Fix Spyware Vulnerability
A vulnerability has been discovered in Apple products that enables the installation of unauthorized software without the user's permission. The vulnerability is actively used to install Pegasus spyware on devices, allowing user activities to be surveilled by an external party.
- Cybersecurity
Microsoft® Reports “Zero-Day” Attacks Using Tainted Office® Files
Microsoft reports a previously unseen “zero-day” attack that uses Office files tainted with specially crafted Active X controls. Once opened, these controls create a vulnerability that enables perpetrators to perform remote code execution.
- Cybersecurity