hedge fund technology security
DESCRIPTION
This presentation outlines various types of security threats and malware, as well as tips and best practices for protecting your hege fund's technology.TRANSCRIPT
Hedge Fund Technology SecurityBest Practices, Potential Threats, & Helpful Tips
A Few Statistics…
46% of SMBs have been victims of cybercrime.
31% are operating without anti-spam protection.
23% have no anti-spyware in place.
15% have no firewalls in place.
13% are operating without any security systems in place at all.
Source: http://press.pandasecurity.com/wp-content/uploads/2010/08/2nd-International-Security-Barometer.pdf
Six Basic but Overlooked
Security Practices
1. Passwords are essential but simply having one isn’t enough.• Avoid leaving passwords on sticky notes or under
keyboards.• Use new passwords immediately and often.
2. Create strong passwords.• Consider substituting letters for numbers and vice
versa.• Change passwords every 30-90 days.
3. Remember to lock the doors.• Be sure to keep doors locked at the end of the day or
when the front desk is unattended.
4. Laptops are easy prey while traveling.• 97% of stolen computers are never recovered.• Do not leave laptops unattended in public areas.
5. Add local security measures.• Use portable locking mechanisms, active
directory, biometrics, and encryption.
6. PDAs need protection too.• Blackberrys, iPhones, and other
PDAs provide access into a company’s network and shouldbe secured to avoid intrusion.
Malware Definitions and
Security Tips
Types of Malware
Virus– A program that can infect a computer and replicate
itself, spreading from one PC to another over a network– Can also be spread via removable media, such as USB
drives, DVDs, and CDs
Worm– Another form of self-replicating
malware–Does not require any action on the
part of the user to be spread
Trojan Horse– A malicious program that disguises itself as a
legitimate application– When the user initiates the program, the hacker gains
access to the user’s PC and information stored there
Spyware– Malware that collects bits of information about a user
over time– Typically installed discreetly and hidden, making it
very difficult to detect
Types of Malware continued
Tips for Protecting Your Data from
Malware
Ensure that all anti-virus programs are up to date.
Ensure that all Microsoft patches are deployed in a timely manner.
Deploy a program that constantly scans the network for malware and removes threats.
How Secure are Your iPhone
and iPad?
Although they offer many advantages to busy investment professionals on the go, there are a few considerations to be mindful of before purchasing an iPhone or iPad for corporate use:
They contain only consumer-grade security encryption, so they create vulnerable points of entry into the network.
Even iPhones that require a PIN for access can be easily hacked by connecting the device to a computer or laptop.
Once a hacker has gained physical access to your device, he or she can upload the data stored on it onto a PC or laptop and introduce malware into the network, leaving no noticeable evidence of the intrusion.
iPhones and iPads do not currently have the ability to archive email and IM communications, which could lead to compliance issues for your firm.
15
Eze Castle Integration OverviewFounded 1995
Mission To be the leading provider of IT services and technology solutions to the investment community worldwide
Headquarters
Additional Offices
1 Federal StreetBoston, Massachusetts, 02110617-217-3000
New York City, Chicago, Dallas, Minneapolis, Los Angeles, San Francisco, Stamford and London.
Website & Blog www.eci.comwww.eci.com/blog
Core Services • Strategic IT Consulting
• Outsourced IT Solutions
• Professional Services
• Managed Services
• Startup & Relocation
• Communications Solutions
• Network Design & Management
• Business Continuity Planning
• Disaster Recovery
• Compliance Solutions
• Storage Solutions
• Colocation Services
• Internet Service
• E-Mail & IM Archiving
One Federal Street, 9th Floor Boston, MA 02110 Tel: 617.217.3000 www.eci.com