The frequency and scope of cyberattacks are growing rapidly, with breaches becoming a significant threat to a business’s reputation and sustainability. No industry or business size is immune to a cyberattack, and small and midsize businesses typically face more acute risks. With cyberthreats evolving and becoming more prevalent, what can your...
We have the answers
Search Results
Incentives that address the work environment, career development, and compensation are attractive, and they are being offered by a plurality of middle market companies to attract and retain a desired workforce in a tight labor market. But age can have a profound impact on the way incentives are viewed. Management will need to strike a balance betwe...
In a tight labor market, companies are offering a range of benefits and incentives to address the need for a qualified workforce comprised of Boomers, Gen Xers, and Millennials. But are companies striking a balance between the incentives they offer and those that potential employees value?
Successful families and individuals expect their financial advisors to address their complete financial picture, including protecting them from property and casualty risks. However, most financial advisors do not provide this support. This clear expectations gap is demonstrated in a survey of 200 successful families or individuals. Financial adviso...
Families of wealth and business-owning families face security risks in their everyday lives, where personal and business risks are often blended and are typically managed by different people and processes. This creates a gap in identifying risks and solutions that can be addressed through a holistic and collaborative risk management approach. With ...
In today’s hyperconnected world, news headlines are filled with stories about identity exposure, data breaches and other major threats to your personal information and financial assets. This guide provides best practices, resources, and actionable advice to help you protect yourself or recover from a cyberattack.
Many employers and family offices find performance reviews can be a challenging task. But with a new take—one that turns a performance review into a career conversation—it can become an opportunity to establish a healthy dialogue that provides space to exchange feedback, assess performance, and “take the temperature” of the ...
Are you maximizing protection when it comes to your online activity? Or do you open yourself to cyberattacks by clicking on links in promotional emails and allowing third-party applications to access your contacts and other personal information? To help identify areas where you might be at risk, follow the experts’ checklist of best practices...
The compensation structure for advisors is evolving from a commission- and transaction-based system to a fee-based, asset management framework that is seen as a mutually beneficial transition for clients and advisors. However, the traditional value proposition for many advisors has been primarily based on their investment acumen and their prospects...
As the office of the controller becomes ever more strategic—creating higher levels of financial visibility to help drive growth and profitability—the financial organization’s relationship to the controller role must evolve as well. Specifically, today’s CFO needs to work closely with the controller to ensure that, one, the o...
The hedge fund industry got started in Greenwich when the location offered access to the best talent, tax and business incentives, and proximity to key executives’ homes. These important factors and the trend towards a private investment model have been shifting and accelerating the location of hedge funds and private equity firms to Palm Bea...
Strong cybersecurity for protecting sensitive client data is a critical capability for any Registered Investment Advisor firm. In 2013, Hardy Reed—one of the first firms to earn the Center for Fiduciary Excellence certification—considered cloud services as an option for its IT needs. They wanted to look at alternate options to replacing...
Cybercriminals targets the financial industry 300 times more frequently than any other industry, resulting in mega breaches and millions of records stolen through hacktivism, malware, social engineering, phishing, and other applications. The harsh consequences of remaining vulnerable to cybersecurity breaches are costly, and the number one threat t...
Recognize that a cyber attack will occur at some point during a business lifecycle. Whether it is through web attacks, email phishing, exploit kits, point of sale, keystroke logging, or ransomware, the bad actors have figured out how to defeat your latest defense against a cyber attack. They know what will make you click on the link that will give ...
Data breaches have become an accepted fact of modern business. According to the Privacy Rights Clearinghouse, twenty-nine businesses reported data breaches in August of 2016 alone. No industry was safe. For many organizations, the question now is not “if,” but “when.” This year appears to be on pace to surpass the number of ...