Companies have been employing digital technology for years, but they are only now committing themselves to pursuing durable digital transformations. The shift signals a changed outlook from recent years, when digitization efforts tended to be more tactical than strategic. Companies invested in technological upgrades, remaking individual functions s...
We have the answers
Search Results
The frequency and scope of cyberattacks are growing rapidly, with breaches becoming a significant threat to a business’s reputation and sustainability. No industry or business size is immune to a cyberattack, and small and midsize businesses typically face more acute risks. With cyberthreats evolving and becoming more prevalent, what can your...
Incentives that address the work environment, career development, and compensation are attractive, and they are being offered by a plurality of middle market companies to attract and retain a desired workforce in a tight labor market. But age can have a profound impact on the way incentives are viewed. Management will need to strike a balance betwe...
In a tight labor market, companies are offering a range of benefits and incentives to address the need for a qualified workforce comprised of Boomers, Gen Xers, and Millennials. But are companies striking a balance between the incentives they offer and those that potential employees value?
Successful families and individuals expect their financial advisors to address their complete financial picture, including protecting them from property and casualty risks. However, most financial advisors do not provide this support. This clear expectations gap is demonstrated in a survey of 200 successful families or individuals. Financial adviso...
Families of wealth and business-owning families face security risks in their everyday lives, where personal and business risks are often blended and are typically managed by different people and processes. This creates a gap in identifying risks and solutions that can be addressed through a holistic and collaborative risk management approach. With ...
In today’s hyperconnected world, news headlines are filled with stories about identity exposure, data breaches and other major threats to your personal information and financial assets. This guide provides best practices, resources, and actionable advice to help you protect yourself or recover from a cyberattack.
Many employers and family offices find performance reviews can be a challenging task. But with a new take—one that turns a performance review into a career conversation—it can become an opportunity to establish a healthy dialogue that provides space to exchange feedback, assess performance, and “take the temperature” of the ...
Are you maximizing protection when it comes to your online activity? Or do you open yourself to cyberattacks by clicking on links in promotional emails and allowing third-party applications to access your contacts and other personal information? To help identify areas where you might be at risk, follow the experts’ checklist of best practices...
The compensation structure for advisors is evolving from a commission- and transaction-based system to a fee-based, asset management framework that is seen as a mutually beneficial transition for clients and advisors. However, the traditional value proposition for many advisors has been primarily based on their investment acumen and their prospects...
As the office of the controller becomes ever more strategic—creating higher levels of financial visibility to help drive growth and profitability—the financial organization’s relationship to the controller role must evolve as well. Specifically, today’s CFO needs to work closely with the controller to ensure that, one, the o...
The hedge fund industry got started in Greenwich when the location offered access to the best talent, tax and business incentives, and proximity to key executives’ homes. These important factors and the trend towards a private investment model have been shifting and accelerating the location of hedge funds and private equity firms to Palm Bea...
Strong cybersecurity for protecting sensitive client data is a critical capability for any Registered Investment Advisor firm. In 2013, Hardy Reed—one of the first firms to earn the Center for Fiduciary Excellence certification—considered cloud services as an option for its IT needs. They wanted to look at alternate options to replacing...
Cybercriminals targets the financial industry 300 times more frequently than any other industry, resulting in mega breaches and millions of records stolen through hacktivism, malware, social engineering, phishing, and other applications. The harsh consequences of remaining vulnerable to cybersecurity breaches are costly, and the number one threat t...
Like many families, you may be involved in running businesses or other types of investments together with other family members, but is this necessarily the right choice? Should you consider breaking away and creating your own path. The decision on whether to stick together or unbundle collective assets into separate ownership and investment structu...