Gen II Data Protection in the Age of Cybersecurity Threats
Updated on: March 28, 2023
How Gen II Safeguards Fund Administration Through Zero Trust
Financial services is a high-value target for hackers, and private equity is no exception.
Most companies today say they do everything possible to secure systems, but in a security climate teeming with threats — especially financial services — standards have dramatically shifted. As a result, Gen II has moved to a Zero Trust strategy and continues to implement strong industry-specific compliance controls to protect your data.
Zero Trust strips implicit trust from the security equation and requires validation for every digital interaction. This is a new high-water mark in cyber protection embraced not only by the federal but leading enterprises as well.
Mitigating human error
One of the primary goals of Zero Trust is to prevent human error from causing a breach. For that reason, Gen II deploys state-of-the-art fund administration technology and regularly tests our company’s network vulnerabilities and readiness with the assistance of third parties.
With so many people working from home in the wake of the pandemic, the threat level has only increased. Even the most conscientious employees occasionally let down their guard. Gen II understands this and trains fund administration employees on proper cybersecurity behavior and reinforces positive practices when it comes to data protection.
Overall, our security protocols are designed to remove the ability of bad actors from exploiting errors in judgment.
More specifically, Gen II employs are:
- Multi-factor authentication for accessing the company’s network.
- Limits data availability to those who need it.
- Prevents users from sending attachments.
- Blocks the printing of materials at home where data can leak in the form of hard copies.
For more about Gen II’s highest quality controls, read our report: Data Protection in the Age of Cybersecurity Threats
Published on: June 1, 2022