Entrepreneurs are risk takers by nature, leveraging their insight, hard work, and capital to create successful companies. Unfortunately, many entrepreneurs who become business owners don’t think about specific kinds of risk until they’ve experienced a threat first hand. Yet planning ahead is critical to mitigate many different kinds of ...
We have the answers
Search Results
Recognize that a cyber attack will occur at some point during a business lifecycle. Whether it is through web attacks, email phishing, exploit kits, point of sale, keystroke logging, or ransomware, the bad actors have figured out how to defeat your latest defense against a cyber attack. They know what will make you click on the link that will give ...
Looking back over the first half of 2016, the FTSE 100 index increased by 6.7 percent when dividend payments are taken into account. However, this positive performance disguises the substantial equity market volatility seen in February, and again following the Brexit decision in June. The moves in the headline index are again misleading and market ...
After months of fierce debate and a policymaking hiatus, the United Kingdom (UK) electorate has voted in favour of leaving the European Union (EU). While the broad direction is set, companies will still face considerable uncertainty until the UK’s exit strategy is defined and trade negotiations (including the trans-border movement of people) ...
In a referendum held on June 23, 2016, the United Kingdom (UK) voted to leave the European Union (EU). For risk professionals, many of the key issues that affect them will be decided during the negotiations over the coming years that will determine the UK’s new relationship with the EU. However, firms need to begin assessing which areas of th...
During the past year, financial institutions of all kinds have experienced repercussions from cybersecurity gaps. The alarming truth is that many broker-dealers have failed to stay up to date with cybersecurity controls and must swiftly get in compliance with all computer-related rules that the Financial Industry Regulatory Authority (FINRA) enforc...
An unprecedented cyber theft transpired earlier this year, one as daring as it is revelatory. When unknown thieves siphoned $81 million from the Bangladesh central bank, by using the SWIFT system to trick the U.S. Federal Reserve into turning over the money, the criminals showed that hackers can exploit virtually every aspect of the global financia...
Cybercriminals targets the financial industry 300 times more frequently than any other industry, resulting in mega breaches and millions of records stolen through hacktivism, malware, social engineering, phishing, and other applications. The harsh consequences of remaining vulnerable to cybersecurity breaches are costly, and the number one threat t...
Strong cybersecurity for protecting sensitive client data is a critical capability for any Registered Investment Advisor firm. In 2013, Hardy Reed—one of the first firms to earn the Center for Fiduciary Excellence certification—considered cloud services as an option for its IT needs. They wanted to look at alternate options to replacing...
Globalization has increased growth opportunities not only for companies but also for those in the business of kidnapping for ransom. The key is to prepare for dangers both at home and abroad and to assess readiness for a complex resolution process if a kidnapping should occur.
Portfolio volatility needs to be considered in making asset allocations at a given level of risk, and that volatility can take on extreme values that depend on the volatility of volatility, or vovo. This paper from the National Association of Active Investment Managers explores vovo-related concepts and offers insights on tactical asset allocation.
When implemented responsibly, a successful foreign exchange hedging strategy can go beyond mitigating foreign exchange risk to actually improving the bottom line of a global business, according to a paper from SVB Capital. The author addresses the impact of currency exchange rates as well as best practices for implementing a hedging strategy.
A simple, periodic verification of the credit-worthiness of an insurance company and the adequacy of the policy funding is not sufficient to fulfill the requirements of the Uniform Prudent Investor Act. A paper from J.R. Katz recommends that reviews of policy suitability include financial strength and claims paying ability, cost competitiveness, pr...
Even with the safeguards afforded by the Health Insurance Portability and Accountability Act, there still are certain circumstances under which medical privacy is not protected. A new paper from Health Champion notes these areas of vulnerability and offers advice for keeping personal medical information as secure as possible.
Because individuals are more vulnerable in a medical situation when traveling abroad, they are wise to assess risks and create an actionable plan to protect their health and well-being before they leave home. WorldClinic Inc. offers a helpful checklist of six things to consider as part of that preparation for travel.