Updated on: July 14, 2022
How Gen II Safeguards Fund Administration Through Zero Trust
Most companies today say they do everything possible to secure systems, but in a security climate teeming with threats — especially financial services — standards have dramatically shifted. As a result, Gen II has moved to a Zero Trust strategy and continues to implement strong industry-specific compliance controls to protect your data.
Zero Trust strips implicit trust from the security equation and requires validation for every digital interaction. This is a new high-water mark in cyber protection embraced not only by the federal but leading enterprises as well.
One of the primary goals of Zero Trust is to prevent human error from causing a breach. For that reason, Gen II deploys state-of-the-art fund administration technology and regularly tests our company’s network vulnerabilities and readiness with the assistance of third parties.
With so many people working from home in the wake of the pandemic, the threat level has only increased. Even the most conscientious employees occasionally let down their guard. Gen II understands this and trains fund administration employees on proper cybersecurity behavior and reinforces positive practices when it comes to data protection.
Overall, our security protocols are designed to remove the ability of bad actors from exploiting errors in judgment.
More specifically, Gen II employs are:
For more about Gen II’s highest quality controls, read our report: Data Protection in the Age of Cybersecurity Threats
Published on: June 1, 2022