Cybersecurity Best Practices
Cybersecurity resources, best practices, and tips to help our clients protect their firms from increasing and evolving cyber threats, including ransomware attacks.
Best practices and tips
FTC 'Safeguards Rule' Strengthens Data Security Requirements and Broadens the Scope of Financial Institutions Who Must Comply
FTC Amends Gramm-Leach-Bliley Act ‘Safeguards Rule’ to Strengthen the Data Security of Financial Institutions
- Cybersecurity
- Cybersecurity Resources
Log4Shell Vulnerability: What We Know and Action Steps to Take
Following our Cyber Alert last week, “Java Log4Shell Zero-Day Vulnerability Discovered; Immediate Patching Advised for Millions of Users", on December 10th a critical vulnerability was publicly disclosed in the Apache Log4j Java-based logging package, which is commonly used by organizations across the world.
- Cybersecurity
- Cybersecurity Resources
Flaws Discovered in Original Update to Fix Log4j Vulnerability; Users Must Update to Newest Version of Apache Log4j 2.16.0
On December 10th a critical vulnerability was publicly disclosed in the Apache Log4j Java-based logging package, which is commonly used by organizations across the world. When first disclosed late last week, Apache had already released an updated version of Log4j version 2.15.0 to remedy the security flaw.
- Cybersecurity
- Cybersecurity Resources
Java Log4Shell Zero-Day Vulnerability Discovered; Immediate Patching Advised for Millions of Users
On December 10th a critical vulnerability was disclosed in the open-source Apache software used to run websites and other web services across industries. The vulnerability affects a Java logging package known as log4j, which is commonly used by organizations across the world.
- Cybersecurity
- Cybersecurity Resources
ACA Group Named Accounting/Due Diligence Firm of the Year by M&A Advisor
ACA Group announced today that ACA Aponix® is the recipient of the Accounting/Due Diligence Firm of the Year in the 20th Annual M&A Advisor Awards. The M&A Advisor Awards are the benchmark for dealmaking excellence, recognizing the leading M&A Transactions, Restructurings, Deal Financings, Product/ Services, Firms, and Professionals.
- Cybersecurity
- Cybersecurity Resources
- ACA News
Ransomware 101 Part 4: How to Engage with Law Enforcement After an Attack
How to empower organizations to contact law enforcement after an attack
- Cybersecurity
- Cybersecurity Resources