If you were asked to describe a hacker, what image comes to mind? If you’re like most, you are probably picturing unintelligible text flying across a monitor as young men in black hoodies attempt to break into networks, engaging in a very technical dance and speaking in terms the average layperson would not understand.
Introduction Financial services are target No. 1. That was confirmed in a 2014 SEC cybersecurity roundtable when Larry Zelvin, then a top cybersecurity official of the U.S. Department of Homeland Security, laid out the agency’s rankings of the nation’s most … Read more
In this ComplianceCasts Minute, we discuss the growing concerns of social engineering. What is social engineering? This non-technical method of hacking forms one of the weakest links in a firm’s security because it relies solely on human interaction. Even with … Read more
Section 206 of the Advisers Act How to identify red flags Steps to take to prevent fraud in your firm Training your staff to be a second set of eyes