Join us for part four of our live webcast series about creating a best-in-class compliance program.
Threat Intelligence, Phishing Testing, and Monitoring
Cyber threats are constantly evolving, so it’s important to stay on top of new threats and address them as quickly as possible. We provide cyber alerts and ongoing monitoring to help protect your company from cyber attacks. We also offer phishing testing and monitoring services to protect your business.
CONNECT WITH US
One of the simplest ways a hacker can penetrate your network is via email using a tactic called phishing, or, in a targeted effort, spear-phishing. Successful phishing, vishing (telephone-based phishing), and spearphishing can lead to ransomware, payment fraud, and other cyber crimes. The FBI has reported that people lost $57 million to phishing schemes in 2019.
We deploy targeted email campaigns that are designed to test your employee’s ability to identify phishing threats. We use the results of our phishing tests as part of our staff security training, which covers phishing identification and other essential skills and tools for identifying threats and preventing data breaches.
We periodically issue timely alerts on cyber events and technology concerns that may be relevant to your business. Our alerts provide strategic guidance to help you protect your company and understand how to best prevent or remediate issues.
Over 100,000 domains are registered every day, many for malicious purposes. We monitor newly registered domain names and alert you when a domain name that resembles your firm’s domain is registered so that your firm can take action to combat attempts to steal sensitive information or infringe on your firm’s intellectual property.
Hackers often post sensitive data about their victims or targets on anonymous paste sites to share with the broader hacker community. We monitor select anonymous paste sites for mentions of your firm’s domain or IP addresses, as these could be indicators of an upcoming or ongoing attack.
Aponix Protect™ comprehensive cybersecurity and technology risk solution
Aponix Protect helps firms address evolving cyber risks and threats to ensure that their cybersecurity needs are covered year-round. This solution is available in three tiers, each one designed to provide firms with a flexible, robust, responsive, and cost-effective cybersecurity program.
According to the SEC proposed Rule 206(4)-9, RIAs and private funds must now submit a confidential report to the SEC within 48 hours from when a “significant cyber incident” is discovered.
The SEC reopened the public comment periods for certain proposed rules due to a technological error earlier this year. We share which proposed rules were affected and should be checked for accurate comment submission.
Cybercriminals have become service providers offering Phishing as a Service (PaaS) on the dark web, with products such as one-time phishing kits or subscription offers to help others launch multiple attacks for a monthly fee.
- Cybersecurity Resources
A recent press release from Kaspersky warns of a malware that can steal users' personal information. We discuss how it works and our guidance for preventing an attack.
While the SEC’s draft Strategic Plan does not appear to indicate a directional shift, it does nod toward more aggressive enforcement. Learn how this affects your firm.
The SEC's new proposed cyber rules affect investment advisers, clients of investment advisers, private funds, and investors of private funds.
ACA is proud to celebrate Hispanic Heritage Month from September 15 - October 15 alongside our Hispanic/Latinx Organization for Leadership and Advancement (HOLA) Employee Resource Group (ERG)!
ACA Group Enhances Surveillance Capabilities for Off-Channel Communications to Navigate Rising Regulatory Scrutiny
New partnership with LeapXpert will help financial firms surveil multiple messaging channels to meet client expectations while ensuring regulatory compliance.
The 2023 Investment Management Compliance Testing Survey results reveal marketing is still the top compliance concern. Cybersecurity and electronic communications follow closely behind.