Blogs
THE LATEST CYBERSECURITY NEWS
Categories

2024 Could See the SEC’s Cybersecurity Rules for RIAs and Funds Finalized. When Will the Government Actually Start Helping As Opposed to Just Fining?
When will the government and the regulators start adding some carrot to go along with the stick?

Criminals Are Now Hacking You AND Reporting Your Firm to the SEC
RIAs and private fund advisers alike need to be prepared when the SEC finalizes its impending cybersecurity rules for asset management industry

Recent SEC Cybersecurity Legal Action a Foreboding Sign for Asset Managers
If and when you have to report a ‘material cybersecurity incident’ to the SEC, or you simply want to know how to respond to a cybersecurity incident, you must have a plan

QR Codes Continue To Be a Source of Cybersecurity Risk
QR phishing, or “Quishing” as it’s now called, is the latest of a new type of phishing attack that is proving extremely successful (for criminals)

The Colors of a Penetration Test
We break down the Colors of a Penetration Test for non-IT business leaders in a new blog post. Learn about Blackbox vs. Whitebox, Red Team vs. Blue Team, and more.

QR Code Attacks Are Here and They Are Very Successful!
You may know what a QR code is, but are you aware that there is now a new wave of QR Code cyber-attacks that are extremely successful?

Are You Protecting Yourself and Your Firm Against SIM Swapping?
SIM swapping is the latest in a trend of attacks in which criminal are able to break into your online accounts despite Multi-Factor Authentication (MFA) protections

Hackers’ Use of “MFA Fatigue” Attacks is Growing
Cyber criminals are increasingly focusing – quite successfully – on ‘MFA Fatigue’ attacks, which send relentless MFA push requests to a mobile device while masquerading as the IT department or other trusted entities

ChatGPT Fraud on the Increase
It’s critical that asset and wealth management firms develop strict GenAI Acceptable Usage policies in their employee handbook