Eze Castle Integration Eze Castle Integration

Hedge IT Blog

> Subscribe to Blog Entries about Outsourcing RSS

KRACK Wi-Fi Vulnerability Puts Patch Management in the Spotlight

By Mary Beth Hamilton,
Thursday, October 19th, 2017

Teams across our company are hard at work testing, validating and implementing the many new patches being released from vendors, including Cisco and Microsoft, as a result of the KRACK (‘Key Reinstallation Attacks’) vulnerability.

Warnings around the new vulnerability, KRACK, made headlines earlier this week as its identification meant that virtually any Wi-Fi enabled device could be made vulnerability to exploit. This latest exploit also reinforces the importance of being prepared to execute both reactive and proactive patch management measures.

Yet when it comes to patch management, most firms do not have the internal resources necessary to effectively monitor, test and roll-out patches in a timely fashion. Remember the Equifax breach? It is widely reported the Equifax breach occurred because the company missed a patch to address an application vulnerability, which the criminals later exploited.

You Need a Patch Management Service

Outdated systems are dangerous yet all systems can become dangerous if left unpatched. That’s why we recommend looking at a patch management service. Companies – such as Eze Castle Integration! – can provide fully managed patch services to ensure software and firmware remain up-to-date and are proactively monitored to prevent security bugs and malicious exploits, reducing overall firm risk. 

Categorized under: Cloud Computing  Security  Outsourcing  Infrastructure 

Five Questions with…Bob Shaw, Director of Technical Architecture

By Kaleigh Alessandro,
Thursday, October 12th, 2017

From time to time, we like to introduce new voices to our blog and pick their brains about technology trends and industry observations. Most recently, I sat down with Eze Castle’s Director of Technical Architecture, Bob Shaw, to discuss cybersecurity and how clients are responding to increasing threats.

1. Earlier this year, the WannaCry outbreak made a lot of waves and forced firms to reevaluate their protections against ransomware. What would you say is the biggest takeaway from the WannaCry incident?

BS: The first thing I would say to firms – and it sounds simple but it’s not always a given – is don’t pay the ransom! You’ll never get your files back. That’s where the second part comes in, and that’s always have backups. Backups are the only fool-proof method for recovering your data, and it’s critical that firms use robust and secure backup and recovery tools to safely store their files and protect them against these types of incidents.

2. What’s the technology you’re most excited about right now that’s helping firms guard against cyber threats?

BS: Next-generation firewalls are really interesting and effective. We work with Palo Alto to deliver these to our clients, and when we lay out the facts, it becomes pretty evident how beneficial they are. Older, port-based firewalls can’t necessarily detect that traffic is doing, but next-gen firewalls have the ability to analyze unknown traffic and simultaneously develop protections to safeguards networks. Firms also have greater visibility and control in managing applications and content to uniquely implement security protections for their infrastructure.

Categorized under: Security  Operational Due Diligence  Outsourcing 

What Makes Hybrid Clouds Appealing?

By Mary Beth Hamilton,
Tuesday, October 10th, 2017

There has been discussion for years about whether public or private cloud platforms were more suitable to financial and investment management firms. And that debate continues, but with the addition of a new player – the hybrid cloud.

While the public cloud receives praise for its flexibility and potential cost savings and the private cloud for its robust security and reliable performance, the hybrid iteration essentially marries these features to create a compelling package for firms who don’t fit naturally into the previous two categories.

As its applicability continues to surge, it is worth understanding the concepts and benefits behind the hybrid cloud. Let’s take a look at what makes hybrid environments appealing to some organizations:

  • Agility & Flexibility: A hybrid cloud model allows a company to combine public cloud assets with those in a private cloud to increase agility and availability. For example, combine Microsoft Exchange and file services via the public cloud with robust security layers and 24x7x365 managed support via the private cloud, and suddenly you’re benefiting from the best of both worlds (hint: we’re talking about the Eze Hybrid Cloud).

Categorized under: Cloud Computing  Security  Outsourcing  Launching A Hedge Fund  Private Equity  Disaster Recovery  Infrastructure  Trends We're Seeing 

ODD Red Flags for Investors: Transparency, Service Providers, Valuation and More

By Kaleigh Alessandro,
Thursday, October 5th, 2017

During a recent webinar on operational due diligence, we explored the changing ODD environment for emerging managers, and our guest speaker, Frank Napolitani of EisnerAmper, helped shed light on some critical missteps that could cause ODD teams to veto an investment.

>> Click here to listen to our full conversation with Frank and hear more about operational due diligence trends

At the highest level, investor due diligence experts see the following as the most egregious red flags:

  • Dishonesty: Demonstrated in the form of failing to disclose or withholding information. This shows a lack of integrity.

  • Belligerence: When managers exhibit an ‘I’m never wrong’ attitude and are unwilling to listen to objective advice.

  • Incompetence: When a firm or manager’s skillset doesn’t align with the expertise required for a particular function.

More specifically, there are a number of red flags that can give investors pause and lead to either increased due diligence or an outright rejection. From a recent Deutsche Bank survey, keep reading for a few reasons:

Categorized under: Operational Due Diligence  Cloud Computing  Security  Outsourcing  Launching A Hedge Fund  Private Equity  Disaster Recovery  Hedge Fund Operations  Infrastructure  Business Continuity Planning  Trends We're Seeing 

Cybersecurity Awareness Month: 'Best of Cyber' Articles to Keep Your Firm Secure

By Amanda Daly,
Tuesday, October 3rd, 2017

October is Cybersecurity Awareness Month, and since we've written A LOT about security over the last few years, we thought it would be helpful to share some of our favorite articles. Here are some of Eze’s latest and greatest cybersecurity articles - happy reading! 

  • 20 Cybersecurity Dos and Don'ts Your Employees Should Follow

  • What’s the Difference Between Next-Generation Firewalls and Traditional Firewalls?

  • Six Myths about Hedge Fund Cybersecurity

  • Is “Smart” Technology Invading Your Privacy?

  • Top 10 IT Security Audit Gaps and How to Avoid Them

  • An Achievable Calendar for Cyber Security Plan Implementation

  • Will Outsourcing Shield You from Cyber Threats?

  • Here Are Investment Managers' Biggest Cyber Security Fears

Categorized under: Security  Cloud Computing  Operational Due Diligence  Outsourcing  Hedge Fund Operations  Infrastructure  Communications  Trends We're Seeing 

Service Provider Risk: Understanding Scope & Calculating Exposures

By Kaleigh Alessandro,
Thursday, September 21st, 2017

Risks are everywhere, particularly in today’s cyber-focused environment. But the risk a financial firm undertakes when outsourcing a function of its business to a service provider is enormous. Not only is the firm relinquishing control to an outside vendor, it also takes on the added burden of managing that company, in addition to its own.

I recently interviewed Eze Castle Cybersecurity and Data Privacy Analyst, Matt Donahue, and we spoke about how hedge funds, private equity firms and other alternatives can roll out and improve third party risk management programs.

Within an organization, where does the accountability for risk live and how do third parties fit into that structure?

Typically, when firms think about where responsibility and accountability live within their organization they mention compliance or information technology – when, in reality, there should be a sense of responsibility at almost every level. As we’ve noted before when talking about establishing a culture of security, tone should be set from the top down – and in this case, risk management responsibility starts at the top also.

If you’re making decisions with only a single lens on technology or cybersecurity or any one area – you’re missing the big picture. Senior execs bring a high-level view point that will help the risk management program align throughout the entire organization.

Categorized under: Outsourcing  Security  Operational Due Diligence  Private Equity  Hedge Fund Operations  Trends We're Seeing 

Emerging Manager Trends in Operational Due Diligence (Webinar Replay)

By Amanda Daly,
Tuesday, September 19th, 2017

Today’s emerging managers face a number of challenges: fierce competition and demanding investor expectations tops among them. With operational due diligence processes evolving rapidly, how can emerging managers differentiate themselves and make an impression on suspecting investors?

During a recent webinar, speakers from Eze Castle Integration and EisnerAmper discussed the current environment for emerging managers and examined the following topics:

  • Key Qualities Investors Look For

  • Red Flags for Emerging Manager Investors 

  • Investors IT Expectations

  • Why Firms Look to Outsource

Categorized under: Operational Due Diligence  Security  Outsourcing  Hedge Fund Operations  Project Management  Videos And Infographics 

Key Cybersecurity Risks to Private Equity Firms

By Amanda Daly,
Tuesday, September 5th, 2017

Below is an excerpt from our whitepaper, 'Cybersecurity for Private Equity'. Click here to download the full whitepaper.

As private equity firms become more dependent on outsourcing and adopt new technologies to support operations, the number of threats they expose themselves to increases exponentially. It can be a daunting task to stay on top of the new and evolving risks at hand, but meticulous attention needs to be employed to mitigate these ongoing threats.

Today’s hackers and cyber criminals are not only targeting IT systems, but humans as well. Attacks vary in target, size and motive, but all pose serious risks to your firm’s wellbeing, thus it’s vital to be aware of common threat types targeting your firm and the broader private equity community. Here are a few to be mindful of:

  • Malware/Ransomware

  • Social Engineering

  • Hacktivism

  • Insider Threats

Download Cybersecurtiy for Private Equity Whitepaper

Categorized under: Security  Outsourcing  Private Equity  Trends We're Seeing 

Reducing Firm Risk with Timely and Adequate Patch Management

By Kaleigh Alessandro,
Thursday, August 31st, 2017

In addition to taking advantage of human errors and naiveté, today’s hackers are also incredibly successful at identifying gaps in technology that can lead them to profit (monetary or otherwise). One of these most critical gaps is a lack of adequate and timely patch management.

Software vulnerabilities have turned heads in 2017 with news-making ransomware outbreaks such as WannaCry and Petya calling attention to outdated patches and legacy technology. First, hackers look for an entry point: often a phishing email or other social engineering scheme intended to fool users into leaving a gateway open. Once inside a firm’s network, there’s no telling the damage a hacker can do, but we’re witnessing increased activity and success in exploiting these security holes caused by inadequate patching.

What can firms do to address this security gap? Unfortunately, the problem of patch management cannot be resolved with one click of a button. Successful and ongoing management and monitoring of security patches requires a diligent effort – and one that cannot be 100% automated. Regardless of size, most firms do not have the internal resources required to manage frequent patch roll-outs, particularly for firms leveraging a host of third-party applications.

To sustain the highest levels of resiliency and prevent software vulnerabilities from causing harm on their own or at the hands of malicious hackers, firms should look to implement a patch management service. Companies – such as Eze Castle Integration! – can provide fully managed patch services to ensure software and firmware remain up-to-date and are proactively monitored to prevent security bugs and malicious exploits, reducing overall firm risk. This means seasoned IT experts are keeping pace with a constantly changing threat landscape, enforcing consistent IT policies to eliminate weak links and reducing overhead so your IT resources can focus on more complex tasks.

Categorized under: Security  Outsourcing  Software  Trends We're Seeing 

Notable Takeaways from the SEC's 2017 Cyber Security Sweep

By Matt Donahue,
Tuesday, August 15th, 2017

Since 2014, the Securities and Exchange Commission (SEC) has made it clear that cybersecurity risk is a top priority, and now via their second round of examinations, the regulator has issued key observations to educate and inform financial firms and investment advisers of their growing expectations.

And while the SEC noted that, overall, firms demonstrated more preparedness than their first round of exams in 2014, gaps remain within cybersecurity programs, notably around employee training, patch management and vulnerability assessments.

Following are noteworthy takeaways from the SEC’s cyber exam sweep observations:

Cybersecurity Gaps Observed:

  • Many firms’ policies & procedures were considered too vague or generic and failed to include specific safeguard examples or implementation procedures.

  • The SEC observed a failure by firms to ensure employees complete annual information security training as well as a failure to take action with employees who did not comply with said requirements.

  • Unlike broker-dealers, the majority of advisers do not have incident response plans in place, which include plans for notifying customers and counterparties of breaches.

Categorized under: Security  Outsourcing  Hedge Fund Regulation  Trends We're Seeing 

View earlier posts in the archive

Recent Posts / All Posts