Call Us Today! (866) 435-8364

Keep up with the latest news!

Press Releases, Latest News, Updates

National Cybersecurity Awareness Month – Know your Attack Surface

2020-07-13T12:54:52-04:00October 1st, 2019|Cyber|

October is National Cybersecurity Awareness Month. Our goal this month is to provide you meaningful information to help you make well-informed, conscious decisions about how you should be protecting yourself and company from cyber threats. To start this month off we felt it was important for everyone to become familiar with the term “attack surface”.

Brokerage firm pays $1.5 million due to a cyber attack

2020-07-13T12:54:55-04:00September 16th, 2019|Cyber|

Phillip Capital Inc. ("PCI")., a Chicago-based brokerage firm was ordered to pay $1.5 million dollars due to a cyber attack. Per the CFTC, PCI allowed "cyber criminals to breach PCI email systems, access customer information, and successfully withdraw $1 million in PCI customer funds." The order also finds that "PCI failed to disclose the cyber

Phishing attack evades detection

2020-07-13T12:54:59-04:00August 30th, 2019|Cyber, Malware, Phishing|

Inform your HR departments, internal recruiting teams, and hiring managers to be on the lookout for emails that come from someone submitting a resume for an open position in your firm. Why? There has been a significant increase in the use of this type of email attack to deliver malware. What makes these emails different?

New York State SHIELD (Stop Hacks and Improve Electronic Data Security) ACT

2020-04-27T10:29:50-04:00July 30th, 2019|Cyber|

New York State SHIELD (Stop Hacks and Improve Electronic Data Security) will go into Effect March 21, 2020. This gives businesses a little less than nine months to become familiar with it and prepare for it entails. What is the SHIELD Act? The Stop Hacks and Improve Electronic Data Security (SHIELD) Act redefines data security

Update your web filters and block these sites

2020-04-27T10:29:52-04:00July 16th, 2019|Cyber|

Are you blocking websites today? If you are, they are most likely sites such as file sharing, public email, social media, and other non-business related websites.If you do not have a web filtering solution or have avoided blocking websites for the sake of keeping your employees happy, you should reconsider. Many of these sites, especially

Cybersecurity Alert – OCIE – Safeguarding Customer Records and Information in Network Storage – Use of Third Party Security Features

2020-04-27T10:29:52-04:00May 27th, 2019|Cyber, OCIE|

Alert On May 23, 2019, the Office of Compliance Inspections and Examinations ("OCIE") issued the alert "Safeguarding Customer Records and Information in Network Storage - Use of Third Party Security Features". In this alert the OCIE 'identified security risks associated with the storage of electronic customer records and information by broker-dealers and investment advisers in

External Vulnerability Assessments

2020-04-27T10:29:56-04:00April 2nd, 2019|Services|

Are you in need of external vulnerability assessments to satisfy business or regulatory requirements? Or are you afraid you can not keep up with the latest known threats, and want a better handle on it? Elteni can help you meet any of those needs, and more, by providing you various external vulnerability assessment options. We

Beyond the Grave virus, is it a hoax or a warning sign?

2020-04-27T10:29:58-04:00March 1st, 2019|Cyber|

Here’s why we think there is something interesting about the “Beyond the Grave Virus” supposedly affecting hedge funds. We were curious because there was some chatter about it being a hoax. While this can be (very) true, we think it was worth looking in to. Who knows, it may possibly be an early exploration expedition

There is a difference between privacy and cyber(security).

2020-04-27T10:35:16-04:00February 28th, 2019|Cyber|

We see too often that the terms privacy and security (cybersecurity) are used interchangeably and felt it was important to help people understand that they are not the same thing. Yes, there is a relationship between the two, but again, they are not the same thing. If you ask a group of cybsecurity professionals whether

Automating Password Cracking Using Responder and Hashcat! (Part 1)

2020-04-27T10:35:18-04:00February 7th, 2019|Cyber|

Responder, one of the tools that is part of every pen-testers toolkit (if you are a pen-tester and you don't use it, shame on you), is by far one of the greatest tools ever made. We use it on every internal and sometimes external pen test that we do. For those that aren't familiar, responder

Go to Top