An unprecedented cyber theft transpired earlier this year, one as daring as it is revelatory. When unknown thieves siphoned $81 million from the Bangladesh central bank, by using the SWIFT system to trick the U.S. Federal Reserve into turning over the money, the criminals showed that hackers can exploit virtually every aspect of the global financial system. Ramifications for registered investment advisors and broker-dealers should be obvious. If some of the biggest financial entities in the world can find themselves involved in cyber breaches, so can your firm.
Resource Search
During the past year, financial institutions of all kinds have experienced repercussions from cybersecurity gaps. The alarming truth is that many broker-dealers have failed to stay up to date with cybersecurity controls and must swiftly get in compliance with all computer-related rules that the Financial Industry Regulatory Authority (FINRA) enforces or risk disciplinary action.
In a referendum held on June 23, 2016, the United Kingdom (UK) voted to leave the European Union (EU). For risk professionals, many of the key issues that affect them will be decided during the negotiations over the coming years that will determine the UK’s new relationship with the EU. However, firms need to begin assessing which areas of their business could be affected and begin having discussions with their insurers and risk advisers. For insurers, this vote could also have significant implications.
After months of fierce debate and a policymaking hiatus, the United Kingdom (UK) electorate has voted in favour of leaving the European Union (EU). While the broad direction is set, companies will still face considerable uncertainty until the UK’s exit strategy is defined and trade negotiations (including the trans-border movement of people) with the EU and other countries are completed.
Looking back over the first half of 2016, the FTSE 100 index increased by 6.7 percent when dividend payments are taken into account. However, this positive performance disguises the substantial equity market volatility seen in February, and again following the Brexit decision in June. The moves in the headline index are again misleading and market outlook is clouded in political maneuvering.
Recognize that a cyber attack will occur at some point during a business lifecycle. Whether it is through web attacks, email phishing, exploit kits, point of sale, keystroke logging, or ransomware, the bad actors have figured out how to defeat your latest defense against a cyber attack. They know what will make you click on the link that will give them the beachhead into your computer system.
Investment in collectible assets is growing worldwide as wealthy individuals in emerging markets such as China, India, and Latin America join the ranks of collectors. While most collectors invest primarily for their own pleasure, collectibles can be a good investment, too. If you collect items that you’re passionate about—whether they are cars or wine or jewelry or even autographed baseballs—it’s important to consider the financial side of your avocation and how to maximize the investment value of your collection.
It is an unfortunate fact of life that, as we age, our cognitive powers often decline. To assist people as they reach this stage in their lives, states provide a mechanism by which a person’s friends and family may petition a court to declare him or her incapacitated, and for the court to appoint a guardian to manage his or her affairs. While the guardianship process is meant to assist people in cognitive decline, it also exposes them to considerable risk. However, there are steps that you and your family can take to minimize those risks, including designating a preneed guardian.
Cloud-based applications, also known as Software as a Service (SaaS), offer significant benefits. They are highly affordable, require minimal IT involvement, have no hardware requirements, and offer great flexibility. Yet there can be significant risks to a firm if it does not review vendors carefully. Unfortunately, security controls vary significantly from one SaaS provider to the next. Knowing what to look for when selecting SaaS vendors and implementing sound security measures will help protect your firm against a data breach and the significant repercussions that come with it.
Commercial agreements come in a variety of types, but most have certain common provisions that should be carefully reviewed in the context of the underlying transaction covered by the agreement. When entering or reviewing one of these agreements, it is important to address the five key provisions that sometimes go unnoticed or are not given proper attention in the review process: (1) Confidentiality Provisions; (2) Indemnity Provisions; (3) Consequential and Special Damages; (4) Product Warranties; and (5) Audit Rights.