In today’s hyperconnected world, news headlines are filled with stories about identity exposure, data breaches and other major threats to your personal information and financial assets. This guide provides best practices, resources, and actionable advice to help you protect yourself or recover from a cyberattack.
We have the answers
Search Results
Many employers and family offices find performance reviews can be a challenging task. But with a new take—one that turns a performance review into a career conversation—it can become an opportunity to establish a healthy dialogue that provides space to exchange feedback, assess performance, and “take the temperature” of the ...
Are you maximizing protection when it comes to your online activity? Or do you open yourself to cyberattacks by clicking on links in promotional emails and allowing third-party applications to access your contacts and other personal information? To help identify areas where you might be at risk, follow the experts’ checklist of best practices...
The compensation structure for advisors is evolving from a commission- and transaction-based system to a fee-based, asset management framework that is seen as a mutually beneficial transition for clients and advisors. However, the traditional value proposition for many advisors has been primarily based on their investment acumen and their prospects...
As the office of the controller becomes ever more strategic—creating higher levels of financial visibility to help drive growth and profitability—the financial organization’s relationship to the controller role must evolve as well. Specifically, today’s CFO needs to work closely with the controller to ensure that, one, the o...
The hedge fund industry got started in Greenwich when the location offered access to the best talent, tax and business incentives, and proximity to key executives’ homes. These important factors and the trend towards a private investment model have been shifting and accelerating the location of hedge funds and private equity firms to Palm Bea...
Strong cybersecurity for protecting sensitive client data is a critical capability for any Registered Investment Advisor firm. In 2013, Hardy Reed—one of the first firms to earn the Center for Fiduciary Excellence certification—considered cloud services as an option for its IT needs. They wanted to look at alternate options to replacing...
Cybercriminals targets the financial industry 300 times more frequently than any other industry, resulting in mega breaches and millions of records stolen through hacktivism, malware, social engineering, phishing, and other applications. The harsh consequences of remaining vulnerable to cybersecurity breaches are costly, and the number one threat t...
Like many families, you may be involved in running businesses or other types of investments together with other family members, but is this necessarily the right choice? Should you consider breaking away and creating your own path. The decision on whether to stick together or unbundle collective assets into separate ownership and investment structu...
Recognize that a cyber attack will occur at some point during a business lifecycle. Whether it is through web attacks, email phishing, exploit kits, point of sale, keystroke logging, or ransomware, the bad actors have figured out how to defeat your latest defense against a cyber attack. They know what will make you click on the link that will give ...
Data breaches have become an accepted fact of modern business. According to the Privacy Rights Clearinghouse, twenty-nine businesses reported data breaches in August of 2016 alone. No industry was safe. For many organizations, the question now is not “if,” but “when.” This year appears to be on pace to surpass the number of ...
Cloud-based applications, also known as Software as a Service (SaaS), offer significant benefits. They are highly affordable, require minimal IT involvement, have no hardware requirements, and offer great flexibility. Yet there can be significant risks to a firm if it does not review vendors carefully. Unfortunately, security controls vary signific...
The revolution of the “information age” has created tremendous advantages and helped accelerate innovation, but it has also brought with it new risks—namely cyber attacks. While the corporate attacks get most of the media attention, do not forget that individuals—especially the high net worth—need to be vigilant about cyber security. The good news ...
Business impersonation scams are a large and growing risk for high-net-worth individuals, closely held business owners, and institutions. Scams have claimed victims in all 50 states and more than 100 countries and there is every reason to believe the threat is growing. Learn seven steps that can help you protect yourself and your business from impe...
For family offices of all profiles—large and small, established and brand new—there are dozens of technology solutions available. In the first of the Family Office Series report, the focus is on technology, a topic that some families find daunting and neglect at their own risk. To simplify the landscape, the report identifies key reason...