Strong cybersecurity for protecting sensitive client data is a critical capability for any Registered Investment Advisor firm. In 2013, Hardy Reed—one of the first firms to earn the Center for Fiduciary Excellence certification—considered cloud services as an option for its IT needs. They wanted to look at alternate options to replacing their in-house server. Two factors were particularly important: heightened security concerns for protecting client information and the need to enable advisors and staff to serve clients while on the road.
Resource Search
Cybercriminals targets the financial industry 300 times more frequently than any other industry, resulting in mega breaches and millions of records stolen through hacktivism, malware, social engineering, phishing, and other applications. The harsh consequences of remaining vulnerable to cybersecurity breaches are costly, and the number one threat to cybersecurity is the uninformed employee. As cybercrime becomes commonplace, it’s essential to learn about the current cybersecurity landscape, the tools a financial firm needs, and best practices for keeping your firm protected.
An unprecedented cyber theft transpired earlier this year, one as daring as it is revelatory. When unknown thieves siphoned $81 million from the Bangladesh central bank, by using the SWIFT system to trick the U.S. Federal Reserve into turning over the money, the criminals showed that hackers can exploit virtually every aspect of the global financial system. Ramifications for registered investment advisors and broker-dealers should be obvious. If some of the biggest financial entities in the world can find themselves involved in cyber breaches, so can your firm.
During the past year, financial institutions of all kinds have experienced repercussions from cybersecurity gaps. The alarming truth is that many broker-dealers have failed to stay up to date with cybersecurity controls and must swiftly get in compliance with all computer-related rules that the Financial Industry Regulatory Authority (FINRA) enforces or risk disciplinary action.
In a referendum held on June 23, 2016, the United Kingdom (UK) voted to leave the European Union (EU). For risk professionals, many of the key issues that affect them will be decided during the negotiations over the coming years that will determine the UK’s new relationship with the EU. However, firms need to begin assessing which areas of their business could be affected and begin having discussions with their insurers and risk advisers. For insurers, this vote could also have significant implications.
After months of fierce debate and a policymaking hiatus, the United Kingdom (UK) electorate has voted in favour of leaving the European Union (EU). While the broad direction is set, companies will still face considerable uncertainty until the UK’s exit strategy is defined and trade negotiations (including the trans-border movement of people) with the EU and other countries are completed.
Looking back over the first half of 2016, the FTSE 100 index increased by 6.7 percent when dividend payments are taken into account. However, this positive performance disguises the substantial equity market volatility seen in February, and again following the Brexit decision in June. The moves in the headline index are again misleading and market outlook is clouded in political maneuvering.
Fund groups face disruptive developments, as advances in financial technology, often called fintech, continue at an ever more rapid pace. Even as new efficiencies and opportunities blossom, regulators have pushed financial firms to recognize the dangers of technological failures. To prepare for the changes ushered in by fintech, it is important for fund boards, investment managers and separate account advisers to have a deep understanding of the issues and risks surrounding Fintech developments.
While not every breach involves a type of personal information that requires notification or disclosure, every breach requires attention and an individualized response tailored to the facts and nature of the breach, and an evaluation of how processes can be improved to minimize the risk of future breaches. The most recent Security Breach Notification Law Chart offers business owners and compliance professionals a comprehensive view of state laws and understanding of each state’s sometimes unique security breach notification requirements.
The dynamic of having an exciting company with immediate needs juxtaposed against the uncertainty of the company’s growth or other changes in the coming years requires a thoughtful and practical approach when it comes to negotiating lease terms. The issues to consider for these types of leases are not just an “us versus them” or a “millennials versus older generation” polarization. For these types of leases, both the landlord and tenant must communicate expectations and deal-breakers early in the process.