Business impersonation scams are a large and growing risk for high-net-worth individuals, closely held business owners, and institutions. Scams have claimed victims in all 50 states and more than 100 countries and there is every reason to believe the threat is growing. Learn seven steps that can help you protect yourself and your business from impersonation and other types of fraud.
Resource Search
In May 2014, FASB issued Accounting Standards Update (ASU) 2014-09, Revenue from Contracts with Customers (Topic 606), changing the way revenue is recognized. As of January 25, 2017, the FASB has issued ASUs to revise and clarify the guidance on the original Topic 606. In accordance with the core principle of Topic 606, there are five key steps to consider. Virtually all entities will be affected to some extent by the new guidance.
Strong cybersecurity for protecting sensitive client data is a critical capability for any Registered Investment Advisor firm. In 2013, Hardy Reed—one of the first firms to earn the Center for Fiduciary Excellence certification—considered cloud services as an option for its IT needs. They wanted to look at alternate options to replacing their in-house server. Two factors were particularly important: heightened security concerns for protecting client information and the need to enable advisors and staff to serve clients while on the road.
Cybercriminals targets the financial industry 300 times more frequently than any other industry, resulting in mega breaches and millions of records stolen through hacktivism, malware, social engineering, phishing, and other applications. The harsh consequences of remaining vulnerable to cybersecurity breaches are costly, and the number one threat to cybersecurity is the uninformed employee. As cybercrime becomes commonplace, it’s essential to learn about the current cybersecurity landscape, the tools a financial firm needs, and best practices for keeping your firm protected.
Fund groups face disruptive developments, as advances in financial technology, often called fintech, continue at an ever more rapid pace. Even as new efficiencies and opportunities blossom, regulators have pushed financial firms to recognize the dangers of technological failures. To prepare for the changes ushered in by fintech, it is important for fund boards, investment managers and separate account advisers to have a deep understanding of the issues and risks surrounding Fintech developments.
A rising generation of clients in their 20s and 30s turned to Jim Steiner, president of Abbot Downing, and asked him to share his insights, both as a parent and a wealth management leader. Through four memorable stories and thoughtful questions, Mr. Steiner reflected on matters of career, philanthropy, family, and leaving a legacy. He began with a cab ride in Chicago, learning to see with fresh eyes.
Families of significant wealth often own a diverse mix of assets, including multiple residences, less liquid alternative or private equity investments, and valuable collectibles, all of which requires more sophisticated planning. They also have somewhat different emotions about their wealth that can include, among others, fear that wealth can have a corrosive effect on future generations. Because no single advisor, no matter how talented, can serve their diverse needs, working with ultra-wealthy families requires a team approach and a well-integrated wealth management plan.
Ask a wealth management colleague to define “the cloud” and you are likely to get a vague response. Even among information technology experts, the term “cloud” may refer to different technologies that are only connected in a general sense. And despite the fact that cloud computing has quickly become the IT norm, the question remains: Is the cloud secure enough to support a wealth management firm’s critical company information and workflow? The truth is, not all clouds are equal, in infrastructure and in management.
In a competitive global marketplace, employers across the United States spend countless resources attempting to set themselves apart and claim their share of available business opportunities. Against that backdrop, it is easy to understand why employers will do everything possible to protect the confidential information they have created and the goodwill they have built with their customers. Employees are a critical element in building that success, but they can also be well-positioned to undermine such efforts when a relationship turns sour or where they are courted by a competitor.
The holidays are approaching and to make it a more relaxed and enjoyable season, it helps to plan in advance and know the best practices for holiday planning, entertaining, gift giving, entertaining, and decorating.