How LA Investment Advisors
Use Vulnerability Testing
to Protect Their Assets
Courtesy of FPA Technology Services, Inc.
http://www.TechGuideforLAInvestmentAdvisors.com
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
A “belt and suspenders”
approach with more layers
of defense are needed:
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
web security solutions,
intrusion prevention services,
anti-spam, and more
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Vulnerability testing,
also known as vulnerability
analysis or assessment,
is a procedure
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
that identifies and categorizes
the externally facing security
flaws in a company’s
IT infrastructure
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Defining and Classifying
Infrastructure Resources
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Cataloguing resources
that are used to deliver
online services and contain
confidential firm data
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
makes it easier to pinpoint
the source of a DOS (Denial of
Service) attack, hack attempt,
or malware opportunity
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Assigning Relative Levels of
Importance to Every Resource
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
In the case of a multi-target
attack, web servers would
take priority over smartphones
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Identifying Potential Threats
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Internet security experts
or specially designed software
packages intentionally probe
a system or network to locate
weaknesses
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Putting Together a Plan to Deal
with More Serious Problems First
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Senior managers need to:
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
• Document the steps for
making major decisions,
such as quarantining any
areas of the network that
have been infiltrated
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
• Identify the personnel
who are integral
to incident response
and business continuity
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
• Ensure that response plans
are available to all
employees in the firm, and
that everyone knows what
they need to do in the event
of a security breach
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Defining and Implementing
Ways to Minimize Attack
Consequences
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
The following steps are also
recommended to ensure
data integrity:
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
• Encrypt all sensitive data
so it becomes harder for
attackers to steal
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
• Provide employees with
access only to the files and
applications they need
to do their jobs
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
• Implement a two-factor
authentication process:
do not rely on passwords
alone
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Bottom Line
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
There are many ways to
address your new found
vulnerabilities
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
- between business continuity
software packages and
security assessment and
remediation services
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Has your investment firm
used vulnerability testing
on its network and systems?
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
And does it do it on a recurring
basis?
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Let us know your thoughts
in the Comments box below
Copyright © FPA Technology Services, Inc.
Learn How to Protect Your Firm’s Technology
With the Right IT Service Provider
Download Your Free Guide
Investing in High Net Worth Clients:
The LA Investment Advisor’s Guide to Using
Technology to Manage and Grow Your Firm
Now at http://www.TechGuideforLAInvestmentAdvisors.com
Top Related