hedge it blog awards-400th post
DESCRIPTION
In honor of our 400th post on the Hedge IT blog, we are celebrating with our annual blog awards. So, we've gathered the most popular articles according to our readers, as well as a few of our personal favorites.TRANSCRIPT
In honor of our 400th post on the Hedge
IT blog, we are celebrating with our
annual blog awards. So, we've gathered
the most popular articles according to
our readers, as well as a few of our
personal favorites.
HEDGE IT BLOG AWARDS
BEST VIDEO Our 60-Second
Answer to Why Go
Eze Private Cloud?
“Cloud computing is becoming a
standard IT deployment method
for the investment management
industry.”
FAVORITE WEBCAST OR PRESENTATION Managing Your Applications in the
Cloud: Webinar Recap & Replay
“When it comes to implementing
applications, there are many considerations
to think about, some of which include
addressing investor due diligence concerns,
addressing regulatory requirements, and
supporting client service demands. The most
importance goal for many firms, however, is
mitigating risk.”
SOCIAL MEDIA STANDOUT
SEC’s Social Media Guidance Is Changing,
Here's What You Need to Know
“As your firm moves forward with incorporating social
media into its business strategy, it’s important to
develop a written social media usage policy to outline
acceptable and unacceptable use of social media for
employees. This is a highly recommended best
practice for managing effective social media
campaigns, especially given the uptick in discovery
audits administered by the SEC.”
APPLICATION AWARENESS Snapchat "Disappearing" Messages: What it is
and why you should care
“While the app itself is primarily intended for
use in the social sphere, the technology that
powers Snapchat has caught the attention of
some developers in the business world.
Companies that regularly send and receive
emails with highly sensitive or proprietary
information are interested in having the ability
to make those messages disappear after
they’ve been read.”
CRAZY ABOUT THE CLOUD
The Antidote for IT Headaches: Eze Private Cloud
SOUND SECURITY
Best Practices for Managing Security Risks
(Webinar Recap)
“So, what should you be aware of to help
protect your firm from an intrusion? There are
a variety of sources from which cyber attacks
can originate including:
• Phishing scams
• USB media devices
• Universal Plug & Play
• Malware via Drive-by Download”
OUTSTANDING SURVEY Cloud Adoption Survey Results
Revealed: Part 1
Diary of a Happy Cloud User:
Cloud Survey Results Part 2
Cloud Survey Sneak Peek: 2013
Results (Infographic)
Feel GOOD FUN Reflecting on What We're Thankful For This
Thanksgiving
STAY SAFE In Business Continuity Planning,
Employee Communication is Vital
A Best Practices Guide to Business
Continuity Planning
Why a Disaster Recovery Activation is So
Much More Than a “Test”
Taking Disaster Recovery Replication to
a Virtual Level in the Cloud
HOTTEST TOPIC
SEC to Examine Cybersecurity Policies at
a Hedge Fund Near You
Phishing: How Not to Get Hooked!
Cybersecurity Insurance Evolving to
Protect Businesses From Increasing
Threats