The revolution of the “information age” has created tremendous advantages and helped accelerate innovation, but it has also brought with it new risks—namely cyber attacks. While the corporate attacks get most of the media attention, do not forget that individuals—especially the high net worth—need to be vigilant about cyber security. The good news ...
We have the answers
Search Results
Cloud-based applications, also known as Software as a Service (SaaS), offer significant benefits. They are highly affordable, require minimal IT involvement, have no hardware requirements, and offer great flexibility. Yet there can be significant risks to a firm if it does not review vendors carefully. Unfortunately, security controls vary signific...
Data breaches have become an accepted fact of modern business. According to the Privacy Rights Clearinghouse, twenty-nine businesses reported data breaches in August of 2016 alone. No industry was safe. For many organizations, the question now is not “if,” but “when.” This year appears to be on pace to surpass the number of ...
This presentation uses survey data and case studies to explore non-monetary incentives employed by single and multi-family offices including policies for paid time off and other benefits and perqs. Most single family offices are smaller organizations that employ 20 or fewer people. Their policies related to non-monetary incentives vary dependi...
A rising generation of clients in their 20s and 30s turned to Jim Steiner, president of Abbot Downing, and asked him to share his insights, both as a parent and a wealth management leader. Through four memorable stories and thoughtful questions, Mr. Steiner reflected on matters of career, philanthropy, family, and leaving a legacy. He beg...
Fund groups face disruptive developments, as advances in financial technology, often called fintech, continue at an ever more rapid pace. Even as new efficiencies and opportunities blossom, regulators have pushed financial firms to recognize the dangers of technological failures. To prepare for the changes ushered in by fintech, it is important for...
While many individuals may have the skills and experience for a private staffing position, it’s the chemistry and having a system in place that makes it work for all parties. With this guide that includes job descriptions and requirements, discover the actionable insights and best practices for optimizing your private staff throughout the hiring pr...
The hedge fund industry got started in Greenwich when the location offered access to the best talent, tax and business incentives, and proximity to key executives’ homes. These important factors and the trend towards a private investment model have been shifting and accelerating the location of hedge funds and private equity firms to Palm Bea...
The family wealth industry is at a strategic inflection point with a future that’s both bright and turbulent. Wealth professionals will face challenges driven by the rising complexity of the families they serve and the imperative to evolve quickly and serve a broader range of their clients’ needs and expectations.  ...
Increased use of modern networking technologies, including social media, is creating new forms of participation, shifting power from producer to citizen and building customer sovereignty. For corporations and organizations, entry into the digital society rests on new economic principles, rules of play, and collaborative business models.
Recognize that a cyber attack will occur at some point during a business lifecycle. Whether it is through web attacks, email phishing, exploit kits, point of sale, keystroke logging, or ransomware, the bad actors have figured out how to defeat your latest defense against a cyber attack. They know what will make you click on the link that will give ...
Cybercriminals targets the financial industry 300 times more frequently than any other industry, resulting in mega breaches and millions of records stolen through hacktivism, malware, social engineering, phishing, and other applications. The harsh consequences of remaining vulnerable to cybersecurity breaches are costly, and the number one threat t...
Strong cybersecurity for protecting sensitive client data is a critical capability for any Registered Investment Advisor firm. In 2013, Hardy Reed—one of the first firms to earn the Center for Fiduciary Excellence certification—considered cloud services as an option for its IT needs. They wanted to look at alternate options to replacing...
To be competitive, advisors need to determine and consistently demonstrate what makes them unique and relevant to ultra-wealthy clients. This workbook from Natixis Global Associates helps advisors define what they stand for, understand how they are perceived, determine the priorities and needs of clients, create a personal brand message, develop an...