Eze Castle Integration Eze Castle Integration

Eze Castle Blog

> Subscribe to Blog Entries about Disaster Recovery RSS

The Importance of Cybersecurity

By Eze Castle Integration,
Tuesday, March 5th, 2019

Did you know that the global average cost of a data breach is $3.86 million? Or, that the average cost incurred for each record of lost or stolen sensitive and confidential information has increased by almost five (5) percent since 2017? A recent study found that breaches are only getting bigger; and I think we have the evolving sophisticated cyber threats that continue to surface. 

Categorized under: Security  Disaster Recovery  Hedge Fund Operations  Hedge Fund Regulation  Infrastructure  Business Continuity Planning  Software  Trends We're Seeing 



How Strong is Your Human Firewall? Best Practices for Phishing Readiness + Webinar Replay

By Amanda Daly,
Tuesday, February 26th, 2019

A report by leading global researcher, Gartner, found that 91% of all cyber attacks start with phishing. This reinforces the argument that human error is perhaps the weakest link in the security chain of any organization. In our most recent webinar, we illustrate the value of investing time and money to make employees your strongest security asset.  

phishing

Social Engineering: The art of manipulating people so they give up confidential information

Phishing: Typically through email, but can also be via telephone or other communications where a user is tricked into browsing a malicious URL designed to appear like a site they trust, or provided with other fabricated content such as an attachment containing malware

Continue reading for a recap of the webinar.

Categorized under: Security  Operational Due Diligence  Disaster Recovery 



Business Continuity Tips to Prepare for Winter Weather

By Amanda Daly,
Tuesday, January 22nd, 2019

If you live in an area that often receives snow, you know and expect what the winter season will bring: disruption, delays, cancellations, and closures of roads, busses, trains, boats and subways that transport people to and from work. With this in mind, you should also be prepared for something more such as power outages, force evacuations, impact deliveries, and state travel ban.

In today’s article, we will take a look at some tips to help mitigate, prepare, respond, and recover during the winter weather.

Eze BCP

Categorized under: Business Continuity Planning  Operational Due Diligence  Disaster Recovery 



2019 New Year's IT Resolutions for Investment Management Firms

By Olivia Munro,
Thursday, January 3rd, 2019


With the new year now upon us, what better time to create your 2019 resolutions for your firm's IT strategy! As we know, the threat landscape is constantly evolving, cloud computing has gained momentum and is now widely accepted in the investment management industry, and new technologies and trends are emerging to support firms with their IT and operational needs.

Continue reading for Eze Castle Integration's recommendations for IT resolutions for 2019:

1.) Create a Cybersecurity Incident Response Plan

As the experts in the industry say, it's not if, but when, a cybersecurity incident will occur. According to a recent report by TechCrunch, cyber attacks are set to spike again in 2019, meaning firms need to continue to stay on top of cybersecurity best practices, utilizing layers of security to protect sensitive data, of course, have a Cybersecurity Incident Response Plan. This includes creating an Incident Response Team consisting of members throughout different departments in the organization, and mapping out the steps to take before, during and after a security incident.

2.) Develop a Written Information Security Plan

Building on this, developing a Written Information Security Plan, or a WISP, is critical to securing your information, but also required if your firm is registered with the SEC. Having documentation of your firm's plan and systems in place to protect personal information and sensitive company information can help mitigate threats and risk against and protect the integrity, confidentiality, and availability of your firm's data.
 

3.) Create a comprehensive employee security training program

If you don't have an employee training program, it is critical that you create one in 2019. If you already have an existing employee training program, you must periodically audit this program, ensuring it is both effective and current. Having a managed phishing and training program is an effective way to train employees on how to spot and report phishing and social engineering attempts. These simulated phishing attacks against your employees provide real-time and interactive training. 

Categorized under: Cloud Computing  Security  Outsourcing  Private Equity  Disaster Recovery  Hedge Fund Operations  Help Desk  Infrastructure  Communications  Business Continuity Planning  Trends We're Seeing 



Planting Seeds: Cybersecurity Education

By Eze Castle Integration,
Tuesday, November 27th, 2018

Despite the recent strides by the financial industry towards improving cybersecurity policies and safeguards, studies reveal that a less-heralded group is responsible for the majority of successful cyber-attacks. Flying under the radar and opening the malware floodgates with one click of a spoof email are employees ill-informed of cyber threats and potential risks.

Unbeknownst to the employee, upon release of their mouse they have guided hacktivists into his or her company’s network, exposing business critical information, financial records, and passwords. But that’s just the beginning. The quantity and severity of subsequent damages are limitless, but so are the opportunities for improvement in the firm’s case.

Categorized under: Security  Disaster Recovery  Communications  Trends We're Seeing 



Preparing Your Tech Infrastructure for the Future

By Amisha Shah ,
Tuesday, November 6th, 2018

Having a strong technology infrastructure in place is the backbone to any successful business. It helps firms to ensure uptime, unlock maximum operating efficiency and be risk-averse. A ‘strong’ infrastructure model is futureproof. It’s capable of responding quickly and effectively to any new opportunities and threats in the ever-evolving landscape that businesses operate in. Firms today are encouraged to evaluate their existing IT, and to think about shifting from a traditional, sluggish and inflexible structure to a more fluid model.


Keep reading for three key considerations to help your business achieve a futureproof stance.

Categorized under: Cloud Computing  Security  Disaster Recovery  Infrastructure 



Four Scary Signs It's Time to Break up with Your IT Provider

By Eze Castle Integration,
Tuesday, October 30th, 2018

Broken HeartIn any relationship, when things are good, they’re usually pretty good. And when things are bad, sometimes they are really bad. There may come a point when you need to evaluate whether you’re still a good fit together.
 
Just like with a romantic relationship, your firm’s connection to a service provider (especially an infrastructure/cloud provider you rely on daily) should be strong enough to withstand a few hiccups and healthy enough to warrant open communication at all times. In some cases, it might be clear that you’re in a good place and moving forward together, but sometimes there are sure signs it’s time to call it quits.
 
Here are a few of those signs:

1. Your provider’s service levels are not up to snuff.

Maybe you recently experienced a major service outage or find that you not-so-conveniently have to work around confusing and interrupting maintenance schedules during work hours. You’re constantly frustrated and don’t feel like you are receiving the level of support that was agreed to – both verbally and as part of your Service Level Agreement (SLA).

Your SLA should clearly indicate the uptime standard (e.g. 99.995% availability) as well as repercussions to any breaches in the contract (for example, service credits) and associated RPOs if disaster recovery is involved

Categorized under: Cloud Computing  Security  Outsourcing  Disaster Recovery  Hedge Fund Operations  Help Desk  Infrastructure  Communications  Trends We're Seeing 



Outsourcing in the Alternative Investment Management Industry: Navigating Cyber, Legal and Operational Risks + Webinar Replay

By Amisha Shah,
Thursday, October 25th, 2018

Investment firms are increasingly drawn to outsourcing to manage complex technology and operational requirements. And, of course, with this evolution comes a range of considerations. In a recent webinar, Eze Castle Integration’s Executive Director, Dean Hill, and, Lawrence Brown, Information, Communications and Technology Partner at law firm Simmons & Simmons, explored the cyber, legal and operational risks for firms looking to outsource.

Watch the full webinar replay here

Categorized under: Outsourcing  Cloud Computing  Security  Operational Due Diligence  Disaster Recovery  Infrastructure  Business Continuity Planning  Trends We're Seeing 



Exploring the Cost of Unexpected Downtime

By Olivia Munro,
Thursday, October 18th, 2018

When it comes to protecting your business, you can never be too prepared. In the competitive investment management world, downtime for any reason is not an option. Whether it be a natural disaster, inclement weather, or even a flu epidemic sweeping the office, your firm needs to have both Disaster Recovery and Business Continuity Plans to ensure that your firm doesn't undergo the costly financial and reputational losses in the case of downtime.

Firstly, it’s important to understand difference between Disaster Recovery and Business Continuity Plans.

Disaster Recovery refers to the policies and procedures to enable the recovery of key technology systems after the event of a disaster. A robust DR program ensures that data centers are highly redundant, have multiple entry fiber paths and multiple power grids, undergoes annual testing, and comes with around the clock support, as outages can easily occur outside of business hours.

Business Continuity refers to a document that outlines how your firm will respond when confronted with unexpected business disruptions. A cohesive Business Continuity Plan has proven methodology to ensure your firm is prepared for the unexpected, includes a detailed risk assessment and business impact analysis, has strategies and plan development, includes testing and training, and is continuously evaluated and maintained. Our new eBook outlines the seven steps to create a BCP, download your copy here.

Categorized under: Cloud Computing  Security  Operational Due Diligence  Outsourcing  Disaster Recovery  Hedge Fund Operations  Business Continuity Planning  Trends We're Seeing 



7 Steps to Create a Business Continuity Plan

By Amanda Daly,
Tuesday, October 9th, 2018

When confronted with unexpected business disruptions, alternative investment firms must react swiftly, methodically and successfully or else risk significant financial loss. This level of response requires extensive business continuity planning to ensure all aspects of a firm’s business are evaluated and protected. In this blog, we will help you create a Business Continuity Plan and help you identify which threats pose a risk to your firm. 
7 Steps eBook
 

Categorized under: Security  Operational Due Diligence  Disaster Recovery  Business Continuity Planning 



View earlier posts in the archive

Recent Posts / All Posts