Modern Compliance: Capturing Mobile and Social Media Communications
Join ACA and SnippetSentry as we explore global communication capture strategies to reduce compliance risks and enhance your compliance program.
We offer a variety of risk assessment services to help companies identify gaps in their cybersecurity and regulatory posture and identify technology-related risks. We can also conduct penetration testing and identify network vulnerabilities.
Our Ransomware 101 blog series addresses multiple aspects of the ransomware issue, including what you should know and what you should do to protect your firm, your clients, and your finances. In part one, we discussed the evolving and growing threat of ransomware. In this article (part two), we’ll provide a framework for what your organization can do to prevent and detect ransomware attacks.
A vulnerability has been discovered in Apple products that enables the installation of unauthorized software without the user's permission. The vulnerability is actively used to install Pegasus spyware on devices, allowing user activities to be surveilled by an external party.
Microsoft reports a previously unseen “zero-day” attack that uses Office files tainted with specially crafted Active X controls. Once opened, these controls create a vulnerability that enables perpetrators to perform remote code execution.
The Personal Information Protection Law of the People's Republic of China is scheduled to go into effect on November 1, 2021. This new law affects all companies and other entities, both inside and outside of China, engaged with personal information about individuals residing in China.
ACA’s Spring 2021 Virtual Conference was an opportunity for the regulatory compliance, performance, and cybersecurity community to come together and discuss the many changes of the past year and what the future of GRC looks like moving forward.
The SEC announced that it sanctioned eight firms for failure to establish and implement cybersecurity policies and procedures. These failures resulted in multiple instances of criminal email account takeovers causing personally identifiable information from thousands of customers and clients to be exposed.
Aponix Protect helps firms address evolving cyber risks and threats to ensure that their cybersecurity needs are covered year-round. This solution is available in three tiers, each one designed to provide firms with a flexible, robust, responsive, and cost-effective cybersecurity program.
Acquisition strengthens ACA’s outsourced financial operations offering for broker-dealers.
We are thrilled to announce that ACA Group has earned a spot on the prestigious 2024 ESGFinTech100 list, joining the ranks of the world's most innovative ESG technology providers.
The 2024 AI Benchmarking Survey by ACA Aponix and NSCP reveals that, despite enthusiasm for AI, financial firms lack formal AI governance frameworks, testing protocols, and third-party oversight.
Join ACA and SnippetSentry as we explore global communication capture strategies to reduce compliance risks and enhance your compliance program.
Join our experienced ACA Wealth experts who will discuss an investment adviser’s obligations for the annual compliance review required under Rule 206(4)-7.