The hedge fund industry got started in Greenwich when the location offered access to the best talent, tax and business incentives, and proximity to key executives’ homes. These important factors and the trend towards a private investment model have been shifting and accelerating the location of hedge funds and private equity firms to Palm Bea...
We have the answers
Search Results
Strong cybersecurity for protecting sensitive client data is a critical capability for any Registered Investment Advisor firm. In 2013, Hardy Reed—one of the first firms to earn the Center for Fiduciary Excellence certification—considered cloud services as an option for its IT needs. They wanted to look at alternate options to replacing...
Cybercriminals targets the financial industry 300 times more frequently than any other industry, resulting in mega breaches and millions of records stolen through hacktivism, malware, social engineering, phishing, and other applications. The harsh consequences of remaining vulnerable to cybersecurity breaches are costly, and the number one threat t...
A common question that a family often asks prior to building a family office is “What is a family office anyway and does my family actually need one?” The answer depends on the family’s goals, as well as understanding the four different types of family offices that are commonly used: (1) single family office, (2) family business office, (3) family ...
Based on a FOX Research, the average family office spends about 32 percent of its time on financial administration and reporting. That’s almost 17 weeks a year spent on collecting, verifying, analyzing, and consolidating financial information. For some family offices, these jobs took up as much as 75 percent of their time, which left them with litt...
Families are often overwhelmed by the complexity and sense of burden that comes with managing all the component parts of wealth across generations. More concerning, though, is the lost opportunities and the loss of capital that results from not getting it right. But owning and managing significant wealth does not have to be difficult, and learning ...
Recognize that a cyber attack will occur at some point during a business lifecycle. Whether it is through web attacks, email phishing, exploit kits, point of sale, keystroke logging, or ransomware, the bad actors have figured out how to defeat your latest defense against a cyber attack. They know what will make you click on the link that will give ...
With the advent and growth of Internet-based communications, it has become normal to instantaneously pass on information. If the Single Family Offices (SFOs) and ultra-wealthy do not secure this traffic of critical and private information, they can expose themselves to significant financial—and potentially physical—risks. The threats ar...
The federal government proposed sweeping new tax rules earlier this month that would dramatically affect family businesses, investment partnerships and other entities. These rules, which could become final and binding as early as the end of 2016, would artificially inflate the value of interests in family entities for gift and estate tax purposes. ...
Data breaches have become an accepted fact of modern business. According to the Privacy Rights Clearinghouse, twenty-nine businesses reported data breaches in August of 2016 alone. No industry was safe. For many organizations, the question now is not “if,” but “when.” This year appears to be on pace to surpass the number of ...
Cloud-based applications, also known as Software as a Service (SaaS), offer significant benefits. They are highly affordable, require minimal IT involvement, have no hardware requirements, and offer great flexibility. Yet there can be significant risks to a firm if it does not review vendors carefully. Unfortunately, security controls vary signific...
With the dramatic expansion of family wealth in the United States and around the world, family offices are a growing part of the global financial landscape. Depending on the family’s mission, service needs, professional skill set of individual family members, and their existing advisor network, a family office may be appropriate. While every family...
Business impersonation scams are a large and growing risk for high-net-worth individuals, closely held business owners, and institutions. Scams have claimed victims in all 50 states and more than 100 countries and there is every reason to believe the threat is growing. Learn seven steps that can help you protect yourself and your business from impe...
For family offices of all profiles—large and small, established and brand new—there are dozens of technology solutions available. In the first of the Family Office Series report, the focus is on technology, a topic that some families find daunting and neglect at their own risk. To simplify the landscape, the report identifies key reason...
The cloud is one of the largest drivers of emerging technology solutions, and for many organizations, it has become one of their most valuable information technology (IT) tools. It enhances data storage capabilities, security and agility to both scale up as well as scale down, while also reducing costs, in part due to its inherent flexibility and t...