hedge fund technology security
DESCRIPTION
This presentation outlines various types of security threats and malware, as well as tips and best practices for protecting your hege fund's technology.TRANSCRIPT
![Page 1: Hedge Fund Technology Security](https://reader033.vdocuments.us/reader033/viewer/2022061205/5480851db4af9f182a8b4718/html5/thumbnails/1.jpg)
Hedge Fund Technology SecurityBest Practices, Potential Threats, & Helpful Tips
![Page 2: Hedge Fund Technology Security](https://reader033.vdocuments.us/reader033/viewer/2022061205/5480851db4af9f182a8b4718/html5/thumbnails/2.jpg)
A Few Statistics…
46% of SMBs have been victims of cybercrime.
31% are operating without anti-spam protection.
23% have no anti-spyware in place.
15% have no firewalls in place.
13% are operating without any security systems in place at all.
Source: http://press.pandasecurity.com/wp-content/uploads/2010/08/2nd-International-Security-Barometer.pdf
![Page 3: Hedge Fund Technology Security](https://reader033.vdocuments.us/reader033/viewer/2022061205/5480851db4af9f182a8b4718/html5/thumbnails/3.jpg)
Six Basic but Overlooked
Security Practices
![Page 4: Hedge Fund Technology Security](https://reader033.vdocuments.us/reader033/viewer/2022061205/5480851db4af9f182a8b4718/html5/thumbnails/4.jpg)
1. Passwords are essential but simply having one isn’t enough.• Avoid leaving passwords on sticky notes or under
keyboards.• Use new passwords immediately and often.
2. Create strong passwords.• Consider substituting letters for numbers and vice
versa.• Change passwords every 30-90 days.
![Page 5: Hedge Fund Technology Security](https://reader033.vdocuments.us/reader033/viewer/2022061205/5480851db4af9f182a8b4718/html5/thumbnails/5.jpg)
3. Remember to lock the doors.• Be sure to keep doors locked at the end of the day or
when the front desk is unattended.
4. Laptops are easy prey while traveling.• 97% of stolen computers are never recovered.• Do not leave laptops unattended in public areas.
![Page 6: Hedge Fund Technology Security](https://reader033.vdocuments.us/reader033/viewer/2022061205/5480851db4af9f182a8b4718/html5/thumbnails/6.jpg)
5. Add local security measures.• Use portable locking mechanisms, active
directory, biometrics, and encryption.
6. PDAs need protection too.• Blackberrys, iPhones, and other
PDAs provide access into a company’s network and shouldbe secured to avoid intrusion.
![Page 7: Hedge Fund Technology Security](https://reader033.vdocuments.us/reader033/viewer/2022061205/5480851db4af9f182a8b4718/html5/thumbnails/7.jpg)
Malware Definitions and
Security Tips
![Page 8: Hedge Fund Technology Security](https://reader033.vdocuments.us/reader033/viewer/2022061205/5480851db4af9f182a8b4718/html5/thumbnails/8.jpg)
Types of Malware
Virus– A program that can infect a computer and replicate
itself, spreading from one PC to another over a network– Can also be spread via removable media, such as USB
drives, DVDs, and CDs
Worm– Another form of self-replicating
malware–Does not require any action on the
part of the user to be spread
![Page 9: Hedge Fund Technology Security](https://reader033.vdocuments.us/reader033/viewer/2022061205/5480851db4af9f182a8b4718/html5/thumbnails/9.jpg)
Trojan Horse– A malicious program that disguises itself as a
legitimate application– When the user initiates the program, the hacker gains
access to the user’s PC and information stored there
Spyware– Malware that collects bits of information about a user
over time– Typically installed discreetly and hidden, making it
very difficult to detect
Types of Malware continued
![Page 10: Hedge Fund Technology Security](https://reader033.vdocuments.us/reader033/viewer/2022061205/5480851db4af9f182a8b4718/html5/thumbnails/10.jpg)
Tips for Protecting Your Data from
Malware
![Page 11: Hedge Fund Technology Security](https://reader033.vdocuments.us/reader033/viewer/2022061205/5480851db4af9f182a8b4718/html5/thumbnails/11.jpg)
Ensure that all anti-virus programs are up to date.
Ensure that all Microsoft patches are deployed in a timely manner.
Deploy a program that constantly scans the network for malware and removes threats.
![Page 12: Hedge Fund Technology Security](https://reader033.vdocuments.us/reader033/viewer/2022061205/5480851db4af9f182a8b4718/html5/thumbnails/12.jpg)
How Secure are Your iPhone
and iPad?
![Page 13: Hedge Fund Technology Security](https://reader033.vdocuments.us/reader033/viewer/2022061205/5480851db4af9f182a8b4718/html5/thumbnails/13.jpg)
Although they offer many advantages to busy investment professionals on the go, there are a few considerations to be mindful of before purchasing an iPhone or iPad for corporate use:
They contain only consumer-grade security encryption, so they create vulnerable points of entry into the network.
Even iPhones that require a PIN for access can be easily hacked by connecting the device to a computer or laptop.
![Page 14: Hedge Fund Technology Security](https://reader033.vdocuments.us/reader033/viewer/2022061205/5480851db4af9f182a8b4718/html5/thumbnails/14.jpg)
Once a hacker has gained physical access to your device, he or she can upload the data stored on it onto a PC or laptop and introduce malware into the network, leaving no noticeable evidence of the intrusion.
iPhones and iPads do not currently have the ability to archive email and IM communications, which could lead to compliance issues for your firm.
![Page 15: Hedge Fund Technology Security](https://reader033.vdocuments.us/reader033/viewer/2022061205/5480851db4af9f182a8b4718/html5/thumbnails/15.jpg)
15
Eze Castle Integration OverviewFounded 1995
Mission To be the leading provider of IT services and technology solutions to the investment community worldwide
Headquarters
Additional Offices
1 Federal StreetBoston, Massachusetts, 02110617-217-3000
New York City, Chicago, Dallas, Minneapolis, Los Angeles, San Francisco, Stamford and London.
Website & Blog www.eci.comwww.eci.com/blog
Core Services • Strategic IT Consulting
• Outsourced IT Solutions
• Professional Services
• Managed Services
• Startup & Relocation
• Communications Solutions
• Network Design & Management
• Business Continuity Planning
• Disaster Recovery
• Compliance Solutions
• Storage Solutions
• Colocation Services
• Internet Service
• E-Mail & IM Archiving
![Page 16: Hedge Fund Technology Security](https://reader033.vdocuments.us/reader033/viewer/2022061205/5480851db4af9f182a8b4718/html5/thumbnails/16.jpg)
One Federal Street, 9th Floor Boston, MA 02110 Tel: 617.217.3000 www.eci.com