hedge it blog awards-400th post

14

Upload: eze-castle-integration

Post on 06-Dec-2014

341 views

Category:

Technology


3 download

DESCRIPTION

In honor of our 400th post on the Hedge IT blog, we are celebrating with our annual blog awards. So, we've gathered the most popular articles according to our readers, as well as a few of our personal favorites.

TRANSCRIPT

In honor of our 400th post on the Hedge

IT blog, we are celebrating with our

annual blog awards. So, we've gathered

the most popular articles according to

our readers, as well as a few of our

personal favorites.

HEDGE IT BLOG AWARDS

FAVORITE WEBCAST OR PRESENTATION Managing Your Applications in the

Cloud: Webinar Recap & Replay

“When it comes to implementing

applications, there are many considerations

to think about, some of which include

addressing investor due diligence concerns,

addressing regulatory requirements, and

supporting client service demands. The most

importance goal for many firms, however, is

mitigating risk.”

SOCIAL MEDIA STANDOUT

SEC’s Social Media Guidance Is Changing,

Here's What You Need to Know

“As your firm moves forward with incorporating social

media into its business strategy, it’s important to

develop a written social media usage policy to outline

acceptable and unacceptable use of social media for

employees. This is a highly recommended best

practice for managing effective social media

campaigns, especially given the uptick in discovery

audits administered by the SEC.”

APPLICATION AWARENESS Snapchat "Disappearing" Messages: What it is

and why you should care

“While the app itself is primarily intended for

use in the social sphere, the technology that

powers Snapchat has caught the attention of

some developers in the business world.

Companies that regularly send and receive

emails with highly sensitive or proprietary

information are interested in having the ability

to make those messages disappear after

they’ve been read.”

SOUND SECURITY

Best Practices for Managing Security Risks

(Webinar Recap)

“So, what should you be aware of to help

protect your firm from an intrusion? There are

a variety of sources from which cyber attacks

can originate including:

• Phishing scams

• USB media devices

• Universal Plug & Play

• Malware via Drive-by Download”