State of the art security
has been implemented across the group, which is a method in which a computer user is granted access only after successfully presenting two or more pieces of evidence to an authentication mechanism
Full daily backup
replication between multi-site servers
All incoming and outgoing email messages are encrypted at source and scanned for malicious content. This protects against spam, malicious attachments and phishing attempts
Outsourced 24/7 security monitoring and control of the full GMG infrastructure
GMG is updated on a daily basis of possible IOCs (indicators of compromise) allowing GMG to proactively respond to any possible incident
Monthly reports are discussed reviewing all transactions, tickets and actions taken around possible threats to the GMG infrastructure
Hard Disk Encryption, Device Protection Antivirus with ATP (Advanced Threat Protection), EDR (Endpoint Detection and Response) and Endpoint Remote and Control to protect our users from other attack vectors such as malicious USBs, media, brute force password attempts, keyloggers, or physical removal of the hard disk to access data. This allows us to remotely track the position of our devices by GPS and remote lock and wipe if necessary, in case of theft.
GMG servers are protected by Veeam, which provides back up, restores and replicates functionality for virtual machines, physical servers and workstations
Port and certificate scanning tests are done on our web application servers on a monthly basis, including vulnerability reports
All our key offices have two internet links in case of redundancy. Access to the internet is monitored and controlled by our security firewalls. In addition, each device has a personal firewall which is also centrally managed
ESG: Act responsibly. Think sustainable.
We incorporate sustainability factors into our investment decisions. We believe that relevant ESG information can provide appropriate insights into both risk and investment opportunities, with creating and growing wealth, responsibly, always front of mind.
Who we serve?
Our alternative investments
Data breaches can be expensive. A recent IBM report highlighted that the cost of a data breach in 2020 was standing at $3.86mio. This year (2020), we’ve witnessed all-time high records for data lost in breaches and the sheer number of cyberattacks. In this newsletter, we touch upon what the rise of cybersecurity means for investors.