Many employers and family offices find performance reviews can be a challenging task. But with a new take—one that turns a performance review into a career conversation—it can become an opportunity to establish a healthy dialogue that provides space to exchange feedback, assess performance, and “take the temperature” of the ...
We have the answers
Search Results
Are you maximizing protection when it comes to your online activity? Or do you open yourself to cyberattacks by clicking on links in promotional emails and allowing third-party applications to access your contacts and other personal information? To help identify areas where you might be at risk, follow the experts’ checklist of best practices...
When you’ve made the decision to protect a collection through insurance, you want to be sure that coverage amounts measure up to the value of your items. Determining proper values can be tricky, as so many variables impact a piece’s worth. Given the ever-changing market, values are in constant flux. That’s why professional appraisals are critical, ...
The 2018 U.S. Trust Insights on Wealth and Worth® study asked nearly one thousand high-net-worth individuals about their approach to building wealth and the extent to which they are using it to achieve their goals and support the causes they care about most. The study found that while wealth provides the freedom to do more, it also brings increased...
The compensation structure for advisors is evolving from a commission- and transaction-based system to a fee-based, asset management framework that is seen as a mutually beneficial transition for clients and advisors. However, the traditional value proposition for many advisors has been primarily based on their investment acumen and their prospects...
As the office of the controller becomes ever more strategic—creating higher levels of financial visibility to help drive growth and profitability—the financial organization’s relationship to the controller role must evolve as well. Specifically, today’s CFO needs to work closely with the controller to ensure that, one, the o...
The hedge fund industry got started in Greenwich when the location offered access to the best talent, tax and business incentives, and proximity to key executives’ homes. These important factors and the trend towards a private investment model have been shifting and accelerating the location of hedge funds and private equity firms to Palm Bea...
Strong cybersecurity for protecting sensitive client data is a critical capability for any Registered Investment Advisor firm. In 2013, Hardy Reed—one of the first firms to earn the Center for Fiduciary Excellence certification—considered cloud services as an option for its IT needs. They wanted to look at alternate options to replacing...
Cybercriminals targets the financial industry 300 times more frequently than any other industry, resulting in mega breaches and millions of records stolen through hacktivism, malware, social engineering, phishing, and other applications. The harsh consequences of remaining vulnerable to cybersecurity breaches are costly, and the number one threat t...
Families are often overwhelmed by the complexity and sense of burden that comes with managing all the component parts of wealth across generations. More concerning, though, is the lost opportunities and the loss of capital that results from not getting it right. But owning and managing significant wealth does not have to be difficult, and learning ...
Recognize that a cyber attack will occur at some point during a business lifecycle. Whether it is through web attacks, email phishing, exploit kits, point of sale, keystroke logging, or ransomware, the bad actors have figured out how to defeat your latest defense against a cyber attack. They know what will make you click on the link that will give ...
Data breaches have become an accepted fact of modern business. According to the Privacy Rights Clearinghouse, twenty-nine businesses reported data breaches in August of 2016 alone. No industry was safe. For many organizations, the question now is not “if,” but “when.” This year appears to be on pace to surpass the number of ...
Cloud-based applications, also known as Software as a Service (SaaS), offer significant benefits. They are highly affordable, require minimal IT involvement, have no hardware requirements, and offer great flexibility. Yet there can be significant risks to a firm if it does not review vendors carefully. Unfortunately, security controls vary signific...
The revolution of the “information age” has created tremendous advantages and helped accelerate innovation, but it has also brought with it new risks—namely cyber attacks. While the corporate attacks get most of the media attention, do not forget that individuals—especially the high net worth—need to be vigilant about cyber security. The good news ...
For decades, families seeking advice on how to invest their hard-earned capital were forced to endure “beauty contests” where potential advisors attempted to demonstrate their supposedly-unique skills and/or access to information. More often than not, it seemed families would choose an advisor only to inevitably experience disappointmen...