Blog

Cybersecurity: 4 Point Plan

Cybersecurity: 4 Point Plan

With unprecedented and continued government warning to the financial sector (from the FBI, GCHQ & EU Regulators, to name but a few) the need to mitigate cyber fraud has never been greater. But have you covered the basics? Don't be complacent - act now and follow our 4 Point Plan:

Read more

Patch Tuesday: Foreshadow Casts Its Shade

Patch Tuesday: Foreshadow Casts Its Shade

It may still be vacation season, but this month’s Patch Tuesday has confirmed that security doesn't take a holiday! Microsoft have addressed 12 critical vulnerabilities and of course, the casting of Foreshadow.

In an already challenging year for CPU manufactures, there is now a third major chip flaw to add to Spectre and Meltdown.

Read more

DUO: Our Authentication Ally

DUO: Our Authentication Ally

With a staggering 81% of compromised user accounts accessed through stolen or weak passwords, user authentication poses one of the greatest cybersecurity risks in 2018. Whether through remote connectivity, shared services or email, there are no shortage of widely used technologies that (conditions permitting) make industrialised cybercrime and sophisticated hacking a walk in the park.

Read more

Options: In Solidarity With Pride

Options: In Solidarity With Pride

At Options, we are always seeking to add value to our global team. Whether through cultivating our employee’s health and fitness, maintaining a flat structure for career development or offering some of the most exciting travel opportunities in the sector, there are no shortage of company-wide initiatives that ensure our workforce are rewarded and, more importantly, valued.

Read more

Building Fitness Into Company Culture

Building Fitness Into Company Culture

‘Your Health is Your Wealth’ – simultaneously a snappy slogan and a wise adage you can use to motivate yourself to keep fit, healthy and well-balanced. In a welcomed trend, many companies have been promoting the concept of their team’s health and wellbeing as a priority.

Read more

Patch Tuesday: Explore with caution and mind the Edge…

Patch Tuesday: Explore with caution and mind the Edge…

Browser bugs are the focus for this month’s Microsoft Patch Tuesday release. A total of 53 bugs rated as 17 critical vulnerabilities and 10 of these belong to Internet Explorer alone. The rest are made up of 34 important vulnerabilities, 1 moderate and 1 low.

Let’s take a closer look:

Read more

Tech Innovation Focus: The Path to 100Gb Market Connectivity

Tech Innovation Focus: The Path to 100Gb Market Connectivity

At Options, we regularly review the market to see what technologies can be adopted to improve our platform – and by extension, the service that we provide to our clients. We try to be early adopters where it makes sense, and we typically offer the benefits of these new technologies to our clients at no extra cost (e.g. Ixia TradeVision market data gap detection).

Read more

Gone Phishing…

Gone Phishing…

These days hackers are casting their net wider to catch a greater variety of phish, their success aided by a new breed of strategically crafted email campaigns that even the most savvy user can be duped into clicking through.

And not every phish is created equal.

Read more

Patch Tuesday: May Has Two In The Wild

Patch Tuesday: May Has Two In The Wild

Top of mind for our Vulnerability Management team is the revelation from Microsoft that hackers are currently playing with two zero-day vulnerabilities.

The firm issued a total of 66 CVE issues in its May Patch Tuesday update related to Microsoft Windows, Internet Explorer, Edge, Office, and Exchange Server among others.

Read more

GDPR & Options

GDPR & Options

Much has been publicized about the EU’s GDPR (General Data Protection Regulation) and its requirement for more governance and transparency around personal data privacy and security. At Options, we see this regulation beyond its European scope and have adopted a global framework and policies to protect the data of all clients on our platform, regardless of location.

Read more

  1. «
  2. 1
  3. 2
  4. 3
  5. 4
  6. 5
  7. 6
  8. 7
  9. 8
  10. »