Hedge Fund Technology Security
Upcoming SlideShare
Loading in...5
×
 

Hedge Fund Technology Security

on

  • 1,522 views

This presentation outlines various types of security threats and malware, as well as tips and best practices for protecting your hege fund's technology.

This presentation outlines various types of security threats and malware, as well as tips and best practices for protecting your hege fund's technology.

Statistics

Views

Total Views
1,522
Views on SlideShare
1,361
Embed Views
161

Actions

Likes
0
Downloads
17
Comments
0

5 Embeds 161

http://www.eci.com 151
http://eci.edit.neptuneweb.com 4
http://eci.com 4
http://eci.dev.neptuneweb.com 1
http://embedresponsively.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Hedge Fund Technology Security Hedge Fund Technology Security Presentation Transcript

  • Hedge Fund Technology Security
    Best Practices, Potential Threats, & Helpful Tips
  • A Few Statistics…
    46% of SMBs have been victims of cybercrime.
    31% are operating without anti-spam protection.
    23% have no anti-spyware in place.
    15% have no firewalls in place.
    13% are operating without any security systems in place at all.
    Source: http://press.pandasecurity.com/wp-content/uploads/2010/08/2nd-International-Security-Barometer.pdf
  • Six Basic but Overlooked Security Practices
  • Passwords are essential but simply having one isn’t enough.
    • Avoid leaving passwords on sticky notes or under keyboards.
    • Use new passwords immediately and often.
    Create strong passwords.
    • Consider substituting letters for numbers and vice versa.
    • Change passwords every 30-90 days.
  • Remember to lock the doors.
    • Be sure to keep doors locked at the end of the day or when the front desk is unattended.
    Laptops are easy prey while traveling.
    • 97% of stolen computers are never recovered.
    • Do not leave laptops unattended in public areas.
  • Add local security measures.
    • Use portable locking mechanisms, active directory, biometrics, and encryption.
    PDAs need protection too.
    • Blackberrys, iPhones, and other
    PDAs provide access into a
    company’s network and should
    be secured to avoid intrusion.
  • Malware Definitions and Security Tips
  • Types of Malware
    Virus
    A program that can infect a computer and replicate itself, spreading from one PC to another over a network
    Can also be spread via removable media, such as USB drives, DVDs, and CDs
    Worm
    Another form of self-replicating malware
    Does not require any action on the part of the user to be spread
  • Types of Malware continued
    Trojan Horse
    A malicious program that disguises itself as a legitimate application
    When the user initiates the program, the hacker gains access to the user’s PC and information stored there
    Spyware
    Malware that collects bits of information about a user over time
    Typically installed discreetly and hidden, making it very difficult to detect
  • Tips for Protecting Your Data from Malware
  • Ensure that all anti-virus programs are up to date.
    Ensure that all Microsoft patches are deployed in a timely manner.
    Deploy a program that constantly scans the network for malware and removes threats.
  • How Secure are Your iPhone and iPad?
  • Although they offer many advantages to busy investment professionals on the go, there are a few considerations to be mindful of before purchasing an iPhone or iPad for corporate use:
    • They contain only consumer-grade security encryption, so they create vulnerable points of entry into the network.
    • Even iPhones that require a PIN for access can be easily hacked by connecting the device to a computer or laptop.
    • Once a hacker has gained physical access to your device, he or she can upload the data stored on it onto a PC or laptop and introduce malware into the network, leaving no noticeable evidence of the intrusion.
    • iPhones and iPads do not currently have the ability to archive email and IM communications, which could lead to compliance issues for your firm.
  • Eze Castle Integration Overview
    15
  • One Federal Street, 9th Floor Boston, MA 02110 Tel: 617.217.3000 www.eci.com