hedge fund technology security

16
Hedge Fund Technology Security Best Practices, Potential Threats, & Helpful Tips

Upload: eze-castle-integration

Post on 04-Dec-2014

1.597 views

Category:

Technology


3 download

DESCRIPTION

This presentation outlines various types of security threats and malware, as well as tips and best practices for protecting your hege fund's technology.

TRANSCRIPT

Page 1: Hedge Fund Technology Security

Hedge Fund Technology SecurityBest Practices, Potential Threats, & Helpful Tips

Page 2: Hedge Fund Technology Security

A Few Statistics…

46% of SMBs have been victims of cybercrime.

31% are operating without anti-spam protection.

23% have no anti-spyware in place.

15% have no firewalls in place.

13% are operating without any security systems in place at all.

Source: http://press.pandasecurity.com/wp-content/uploads/2010/08/2nd-International-Security-Barometer.pdf

Page 3: Hedge Fund Technology Security

Six Basic but Overlooked

Security Practices

Page 4: Hedge Fund Technology Security

1. Passwords are essential but simply having one isn’t enough.• Avoid leaving passwords on sticky notes or under

keyboards.• Use new passwords immediately and often.

2. Create strong passwords.• Consider substituting letters for numbers and vice

versa.• Change passwords every 30-90 days.

Page 5: Hedge Fund Technology Security

3. Remember to lock the doors.• Be sure to keep doors locked at the end of the day or

when the front desk is unattended.

4. Laptops are easy prey while traveling.• 97% of stolen computers are never recovered.• Do not leave laptops unattended in public areas.

Page 6: Hedge Fund Technology Security

5. Add local security measures.• Use portable locking mechanisms, active

directory, biometrics, and encryption.

6. PDAs need protection too.• Blackberrys, iPhones, and other

PDAs provide access into a company’s network and shouldbe secured to avoid intrusion.

Page 7: Hedge Fund Technology Security

Malware Definitions and

Security Tips

Page 8: Hedge Fund Technology Security

Types of Malware

Virus– A program that can infect a computer and replicate

itself, spreading from one PC to another over a network– Can also be spread via removable media, such as USB

drives, DVDs, and CDs

Worm– Another form of self-replicating

malware–Does not require any action on the

part of the user to be spread

Page 9: Hedge Fund Technology Security

Trojan Horse– A malicious program that disguises itself as a

legitimate application– When the user initiates the program, the hacker gains

access to the user’s PC and information stored there

Spyware– Malware that collects bits of information about a user

over time– Typically installed discreetly and hidden, making it

very difficult to detect

Types of Malware continued

Page 10: Hedge Fund Technology Security

Tips for Protecting Your Data from

Malware

Page 11: Hedge Fund Technology Security

Ensure that all anti-virus programs are up to date.

Ensure that all Microsoft patches are deployed in a timely manner.

Deploy a program that constantly scans the network for malware and removes threats.

Page 12: Hedge Fund Technology Security

How Secure are Your iPhone

and iPad?

Page 13: Hedge Fund Technology Security

Although they offer many advantages to busy investment professionals on the go, there are a few considerations to be mindful of before purchasing an iPhone or iPad for corporate use:

They contain only consumer-grade security encryption, so they create vulnerable points of entry into the network.

Even iPhones that require a PIN for access can be easily hacked by connecting the device to a computer or laptop.

Page 14: Hedge Fund Technology Security

Once a hacker has gained physical access to your device, he or she can upload the data stored on it onto a PC or laptop and introduce malware into the network, leaving no noticeable evidence of the intrusion.

iPhones and iPads do not currently have the ability to archive email and IM communications, which could lead to compliance issues for your firm.

Page 15: Hedge Fund Technology Security

15

Eze Castle Integration OverviewFounded 1995

Mission To be the leading provider of IT services and technology solutions to the investment community worldwide

Headquarters

Additional Offices

1 Federal StreetBoston, Massachusetts, 02110617-217-3000

New York City, Chicago, Dallas, Minneapolis, Los Angeles, San Francisco, Stamford and London.

Website & Blog www.eci.comwww.eci.com/blog

Core Services • Strategic IT Consulting

• Outsourced IT Solutions

• Professional Services

• Managed Services

• Startup & Relocation

• Communications Solutions

• Network Design & Management

• Business Continuity Planning

• Disaster Recovery

• Compliance Solutions

• Storage Solutions

• Colocation Services

• Internet Service

• E-Mail & IM Archiving

Page 16: Hedge Fund Technology Security

One Federal Street, 9th Floor Boston, MA 02110 Tel: 617.217.3000 www.eci.com