Threat Intelligence, Phishing Testing, and Monitoring

Protect your company from cyber attacks with our phishing threat intelligence.

Cyber threats are constantly evolving, so it’s important to stay on top of new threats and address them as quickly as possible. We provide cyber alerts and ongoing monitoring to help protect your company from cyber attacks. We also offer phishing testing and monitoring services to protect your business.

CONNECT WITH US


CONNECT WITH US


Our solutions

Phishing Testing and Training

One of the simplest ways a hacker can penetrate your network is via email using a tactic called phishing, or, in a targeted effort, spear-phishing.  Successful phishing, vishing (telephone-based phishing), and spearphishing can lead to ransomware, payment fraud, and other cyber crimes. The FBI has reported that people lost $57 million to phishing schemes in 2019.

We deploy targeted email campaigns that are designed to test your employee’s ability to identify phishing threats. We use the results of our phishing assessments as part of our staff security training, which covers phishing identification and other essential skills and tools for identifying threats and preventing data breaches.

We periodically issue timely alerts on cyber events and technology concerns that may be relevant to your business. Our alerts provide strategic guidance to help you protect your company and understand how to best prevent or remediate issues.

Subscribe to receive our cyber alerts

Domain Registration Monitoring & Paste Site Monitoring

Over 100,000 domains are registered every day, many for malicious purposes. We monitor newly registered domain names and alert you when a domain name that resembles your firm’s domain is registered so that your firm can take action to combat attempts to steal sensitive information or infringe on your firm’s intellectual property.

Hackers often post sensitive data about their victims or targets on anonymous paste sites to share with the broader hacker community. We monitor select anonymous paste sites for mentions of your firm’s domain or IP addresses, as these could be indicators of an upcoming or ongoing attack.

1 of
Solution Spotlight

Aponix Protect™ comprehensive cybersecurity and technology risk solution

Aponix Protect helps firms address evolving cyber risks and threats to ensure that their cybersecurity needs are covered year-round. This phishing threat intelligence testing service and monitoring solution is available in three tiers, each one designed to provide firms with a flexible, robust, responsive, and cost-effective cybersecurity program. 

Latest insights

abstract image with a lock and shield

Cyber Alert: Critical Vulnerability Discovered in Internet Explorer

On April 10, researchers published information on a critical vulnerability in Microsoft’s Internet Explorer® (IE) browser.

Cyber Alert
  • Cybersecurity
abstract image with a lock and shield

Cyber Alert: Vulnerabilities Discovered in VPN Applications

On April 11, researchers from the Carnegie Mellon Software Institute announced security vulnerabilities in multiple virtual private network (VPN) applications.

Cyber Alert
  • Cybersecurity
abstract image with a lock and shield

Cyber Alert: Vulnerabilities Discovered in Verizon Fios Routers Affecting Millions

On April 9, researchers discovered three serious vulnerabilities in the Verizon Fios Quantum™ Gateway (G1100) router.

Cyber Alert
  • Cybersecurity
abstract image with a lock and shield

SEC Updates Document Request List for Cybersecurity Examinations

The SEC's OCIE recently updated their document request list for cybersecurity examinations. Find out what's new in the document request list and how your firm should prepare for a cyber examination.

Cyber Alert
  • Cybersecurity
abstract image with a lock and shield

SEC OCIE To Launch Cybersecurity Initiative Focused on M&A

Missed the 2019 Mutual Fund and Investment Management Conference? ACA's Jim Pappas shares his observations from the keynote session which featured a speaker from the SEC.

Cyber Alert
  • Cybersecurity
highway at night from overhead

Why Financial Services Firms Must Prepare for the California Consumer Privacy Act

ACA's Alex Scheinman discusses why financial services firms should prepare for CCPA compliance and develop a compliance roadmap.

Article
  • Cybersecurity

News

Former SEC Leader Robert Baker Joins ACA Group's Tech-Enabled Mock Examination Team

We are pleased to announce that Robert Baker, JD, CFA has joined ACA Group, bringing nearly two decades of experience from the Examination and Enforcement Division at the SEC.

ACA Group Broadens Global Footprint Through Acquisition of the Effecta Compliance Group

Acquisition strengthens ACA’s ability to support clients expanding into the UAE and broadens offering to UK firms .

No Conversation Left Behind: ACA's Advanced Communication Channel Capture for Total Oversight

ACA Expands Communication Channel Capture to Strengthen Compliance Oversight

Upcoming events

Lessons Learned from 2024's Scariest Cyber Breaches

Join ACA Aponix’s cybersecurity experts Greg Slayton and Aaron Pinnick for our annual discussion of some of the most interesting and impactful cybersecurity breaches and incidents that occurred in 2024.

Webcast

Beyond the CCO: Firmwide Benefits of Outsourcing GRC

We'll explain how the decision to outsource GRC services is no longer just a win for the Chief Compliance Officer – it offers a solution that can deliver substantial value across the entire C-suite and enterprise.

Webcast