Vulnerability management
-

Drawbridge On-Demand Webinar: Protecting Networks and Devices in a Hybrid Work Paradigm
The accelerated shift to remote and hybrid workforces over the past two years, coupled with decades-long digital transformation and increasing reliance on digital channels, have introduced new risks to anyone conducting business online—especially fiduciaries. One lesson is clear: New working models are here to stay. Jacob Cane, Drawbridge’s Global Head of Customer Success and Strategy,…
-

How to Keep Devices Secure When Traveling
Travel is a common aspect of business, especially those businesses or firms with employees working in remote locations, or those serving a distributed client base. As personnel will be scattered, using multiple different networks and devices rather than a singular secure network, businesses everywhere have been adapting to these new environments in order to keep…
-

The Cybersecurity Dangers of Thumb Drives
Thumb drives are often considered unassuming devices that make the transfer of digital data easy through quick access to ports from one device to another. However, recent findings from the FBI have shown malicious parties using thumb drives in order to infect recipients’ computers with malware. Cybersecurity Dangers of Thumb Drives Cyber attacks have been…
-

Cybersecurity Best Practices for Venture Capital Firms
Technology-focused investment firms are at elevated risk for cyber breaches of any kind, even relative to more traditional or diversified funds. As cybercriminals continue to advance their methods for stealing from and defrauding businesses, it is important to consider one’s cybersecurity measures and how to fight back against advancing crime–particularly for the partners and employees…
-

Data Breaches on the Rise Through 2022
The past two years saw unprecedented levels of cybercrime, trends that seem poised to continue into 2022. Data breaches have been perpetrated by cybercriminals across numerous industries and at a frequency never-before seen. With distributed workforces and online commerce continuing to grow, it is important for all businesses to consider what goes into a robust…
-

Why Network Firewall Security is Important
A firewall can take the form of computer hardware or software, and is used to protect a firm’s network. Network firewall security is the intermediary between your network and external parties. Through firewall’s ability to track and monitor breaches or potential breaches, as well as its ability to filter out unwanted external traffic, they are…
-

Hedge Fund Cybersecurity Needs
Those within the finance industry are at constant risk of cyber criminals. There are numerous ways for cyber crime to find its way into hedge funds, including phishing and other data breaching methods. It takes the right protection plan for hedge fund cybersecurity to remain secure in the face of significant cyber risk. Hedge Fund…
-

The New Federal Cybersecurity Push
Numerous high-profile cybersecurity attacks in the last few years have caused alarm for world leaders. Rising cyber threats have forced the hand of numerous federal governments, including the White House. Recently, federal cybersecurity plans were put into motion by the White House in order to combat the growing risk of malicious cyber parties. White House…
-

How Hedge Funds can Detect Vulnerabilities with Drawbridge
Hedge funds are one of the most susceptible industries when it comes to targeted cyber attacks. These attacks can take many forms, but one of the most common cyber breaches that affects hedge funds is that of ransomware. Ransomware is a type of malware that can block access to, or even publish, the private data…
-

Cyber Criminals Continue to Target Cryptocurrencies
As digital currencies grow into a more conventional asset class, financial institutions worldwide have begun to use cryptocurrencies and blockchain technology as part of day-to-day business. While cryptocurrencies have grown in value, various new up-and-coming coins have also been introduced to the market, with seemingly hundreds pouring into the crypto currency market within the span…
-

The U.S. Partners with Other Governments to Combat Ransomware
On November 14, the U.S. Treasury Department announced a partnership with Israel in an effort to strengthen cybersecurity protocols in the fight against ransomware. This joint effort will see the creation of a task force meant to defend from cybercriminals and attacks from foreign nations. Ransomware attacks have been increasing as technologies and malware that…
-

Cybersecurity News: The Impacts of Cryptocurrency on Cybersecurity Within Your Firm
A cryptocurrency is a digital asset that operates as a medium of exchange. It can be used to make electronic payments, and utilizes a form of cryptography in order to secure payments, as well as a distributed, immutable ledger for tracking ownership and transactions. As the popularity of cryptocurrencies continues to expand, questions linger as…
