Tech Update: Cybersecurity, Ransomeware and Disaster Recovery Aug11

Posted by & filed under Technology, Video.

Skull

Having the proper disaster recovery systems in place help firms remain resilient in the wake of technology disruptions such as a security breaches, natural disasters or other system outages. At risk is not only the firm’s reputation and productivity, but also incalculable amounts of money that could be lost if a firm is not able to access their market data. In this video, cybersecurity leaders from ACE IT Solutions and Datto explain how to achieve real business continuity

... Read more »

I Have Your Password Jun2

Posted by & filed under White Papers/ Thought Pieces.

Screen Shot 2015-06-01 at 9.55.19 AM

As much as we like to imagine hackers as psychics, evil geniuses, or Ethan Hunt breaking into Langley, most actual hacking is far different. In reality, perhaps the best analogy of the three is as a psychic. Not a supernatural psychic, but more like a mall psychic: using a combination of basic logic.

Read more

... Read more »

The Daily Intelligence Briefing: Ukraine Sep29

Posted by & filed under Daily Intelligence Briefing.

dreamstime_xs_24815175-e1399992776263-150x150

This report is provided free each week by McAlinden Research Partners to members of Hedge Connection. Below is a snapshot. Click here for the full and extensive report (login required).  Not a member yet? Join Now.   MRP   McAlinden Research Partners  | DIBS   SITE  MAIL faq Data Mkts Econ Pol Money Real Svcs Mfg Tech Energy Labor Hlth

... Read more »

Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks May30

Posted by & filed under White Papers/ Thought Pieces.

cybersecurity-590x393

The following white paper covers everything you NEED to know… Hacks, breaches, stolen data, trade secrets hijacked, privacy violated, ransom demands made; how can you protect your data or your investors’ data in the modern age? Since 1995, the digital age has created a host for you and your clients. Do you have sensitive client

... Read more »