Insights
The cyber landscape never stops shifting – and neither should your perspective. Our Insights bring you expert commentary, thought leadership and practical guidance on the issues shaping the alternative investments sector. Stay ahead of regulators, satisfy investors, and strengthen your resilience with analysis from the team that knows your world best.
-

Top Cyber Risks for Family Offices
Any given organization or firm takes on cyber risk when dealing with assets and private information in a digital space. Cyber risks for family offices, in particular, have been heightened as they have become targets by the rising threat of ransomware. Among a multitude of other potential breaches and malicious parties seeking to take advantage of…
-

How Hedge Funds can Detect Vulnerabilities with Drawbridge
Hedge funds are one of the most susceptible industries when it comes to targeted cyber attacks. These attacks can take many forms, but one of the most common cyber breaches that affects hedge funds is that of ransomware. Ransomware is a type of malware that can block access to, or even publish, the private data…
-

Cyber Criminals Continue to Target Cryptocurrencies
As digital currencies grow into a more conventional asset class, financial institutions worldwide have begun to use cryptocurrencies and blockchain technology as part of day-to-day business. While cryptocurrencies have grown in value, various new up-and-coming coins have also been introduced to the market, with seemingly hundreds pouring into the crypto currency market within the span…
-

How to Have Quality Cybersecurity at Home
Cybersecurity breaches within one’s home have been a part of life since the inception of the internet. Between a variety of online scammers, as well as those who are able to infiltrate your home network, quality, at-home cybersecurity has never been more important. Those on the internet who seek to take advantage of the relative…
-

Service Spotlight: The Necessity of Cyber Risk Assessment
In order to defend your firm from growing threats and elevate your risk posture, there need to be continuous efforts to analyze and defend from said threats. Pre-existing cybersecurity programs need to not only be made to fit within regulations, but should be poised to mitigate any potential threats lurking in an online space. With…
-

How Real Estate Investors can Benefit From Cybersecurity
Real estate investors and operators are quickly coming to learn the need of cybersecurity. With digital transformation only accelerating in the era of Covid, more and more assets and private information are being safeguarded online. At the same time, cyber threats have been increasing at a monumental rate, necessitating adjustments and investments across all industries…
-

Cybersecurity News: The Impacts of Cryptocurrency on Cybersecurity Within Your Firm
A cryptocurrency is a digital asset that operates as a medium of exchange. It can be used to make electronic payments, and utilizes a form of cryptography in order to secure payments, as well as a distributed, immutable ledger for tracking ownership and transactions. As the popularity of cryptocurrencies continues to expand, questions linger as…
-

Service Spotlight: Cybersecurity Readiness
Cybersecurity readiness allows your firm to properly respond to cyber threats and online malicious parties. Typically, by following regulatory procedures and shoring-up your cybersecurity policies, online threats can be mitigated throughout your firm. Firms may struggle to achieve cybersecurity readiness for a variety of reasons, but with the right team behind your cybersecurity programs, cybersecurity…
-

Service Spotlight: Cybersecurity’s Role in Business Continuity
A Business Continuity Plan or BCP brings a great deal of security to your firm. Both personnel and assets can be better protected with a continuity plan in place. BCP’s allow for your firm to function throughout emergency situations. Drawbridge considers a BCP to be more important than ever in a growing threat landscape. A…
-

Cybersecurity News: How to Avoid Phishing Attacks
Phishing attacks are a popular method of cyber-attack typically used by malicious parties who seek to gain personal information. Usually, a malicious party will employ phishing for the sake of gaining account credentials of any kind, be it an email address or passwords for company websites. Successful phishing attempts have led to complete network access…
-


Service Spotlight: How Cybersecurity Training for Employees Reduces Phishing
For those firms with secure and effective cybersecurity procedures, a whole other necessity can sometimes be overlooked. Employee training is a key feature of a successful security program, and for firms protecting private data and assets, it is especially important that employees are aware of how to notice and handle potential breaches. It is the…
-

Market Spotlight: Enhancing Cybersecurity for Hedge Funds
There has been increased focus on cybersecurity for hedge funds within the last several years. This has only been exacerbated by the Coronavirus Pandemic, which has seen the need for industries worldwide to focus on cybersecurity procedures during an unprecedented transfer to online business. This need has caused regulators to take further interest in cybersecurity…
