Recognize that a cyber attack will occur at some point during a business lifecycle. Whether it is through web attacks, email phishing, exploit kits, point of sale, keystroke logging, or ransomware, the bad actors have figured out how to defeat your latest defense against a cyber attack. They know what will make you click on the link that will give them the beachhead into your computer system.
Resource Search
Cloud-based applications, also known as Software as a Service (SaaS), offer significant benefits. They are highly affordable, require minimal IT involvement, have no hardware requirements, and offer great flexibility. Yet there can be significant risks to a firm if it does not review vendors carefully. Unfortunately, security controls vary significantly from one SaaS provider to the next. Knowing what to look for when selecting SaaS vendors and implementing sound security measures will help protect your firm against a data breach and the significant repercussions that come with it.
Business impersonation scams are a large and growing risk for high-net-worth individuals, closely held business owners, and institutions. Scams have claimed victims in all 50 states and more than 100 countries and there is every reason to believe the threat is growing. Learn seven steps that can help you protect yourself and your business from impersonation and other types of fraud.
In May 2014, FASB issued Accounting Standards Update (ASU) 2014-09, Revenue from Contracts with Customers (Topic 606), changing the way revenue is recognized. As of January 25, 2017, the FASB has issued ASUs to revise and clarify the guidance on the original Topic 606. In accordance with the core principle of Topic 606, there are five key steps to consider. Virtually all entities will be affected to some extent by the new guidance.
Strong cybersecurity for protecting sensitive client data is a critical capability for any Registered Investment Advisor firm. In 2013, Hardy Reed—one of the first firms to earn the Center for Fiduciary Excellence certification—considered cloud services as an option for its IT needs. They wanted to look at alternate options to replacing their in-house server. Two factors were particularly important: heightened security concerns for protecting client information and the need to enable advisors and staff to serve clients while on the road.
Cybercriminals targets the financial industry 300 times more frequently than any other industry, resulting in mega breaches and millions of records stolen through hacktivism, malware, social engineering, phishing, and other applications. The harsh consequences of remaining vulnerable to cybersecurity breaches are costly, and the number one threat to cybersecurity is the uninformed employee. As cybercrime becomes commonplace, it’s essential to learn about the current cybersecurity landscape, the tools a financial firm needs, and best practices for keeping your firm protected.
Fund groups face disruptive developments, as advances in financial technology, often called fintech, continue at an ever more rapid pace. Even as new efficiencies and opportunities blossom, regulators have pushed financial firms to recognize the dangers of technological failures. To prepare for the changes ushered in by fintech, it is important for fund boards, investment managers and separate account advisers to have a deep understanding of the issues and risks surrounding Fintech developments.
A rising generation of clients in their 20s and 30s turned to Jim Steiner, president of Abbot Downing, and asked him to share his insights, both as a parent and a wealth management leader. Through four memorable stories and thoughtful questions, Mr. Steiner reflected on matters of career, philanthropy, family, and leaving a legacy. He began with a cab ride in Chicago, learning to see with fresh eyes.
Families of significant wealth often own a diverse mix of assets, including multiple residences, less liquid alternative or private equity investments, and valuable collectibles, all of which requires more sophisticated planning. They also have somewhat different emotions about their wealth that can include, among others, fear that wealth can have a corrosive effect on future generations. Because no single advisor, no matter how talented, can serve their diverse needs, working with ultra-wealthy families requires a team approach and a well-integrated wealth management plan.
Ask a wealth management colleague to define “the cloud” and you are likely to get a vague response. Even among information technology experts, the term “cloud” may refer to different technologies that are only connected in a general sense. And despite the fact that cloud computing has quickly become the IT norm, the question remains: Is the cloud secure enough to support a wealth management firm’s critical company information and workflow? The truth is, not all clouds are equal, in infrastructure and in management.