Eze Castle Integration Eze Castle Integration

Hedge IT Blog

> Subscribe to Blog Entries about Communications

A Checklist for Starting a Hedge Fund in 2015

By Anna Wendt,
Thursday, May 21st, 2015

ChecklistYesterday, we hosted a webinar called “A Checklist for Starting a Hedge Fund in 2015,” which focused on structure and strategy considerations for hedge fund startups as well as focus areas for your technology infrastructure and cybersecurity systems. Marni Pankin, partner at Marcum LLP, and Vinod Paul, managing director at Eze Castle Integration, shared their expert knowledge on what they consider to be the top priorities for hedge fund startups in 2015.

Pankin started with a checklist of her own, including what an emerging manager should look for when launching a new firm. We'll cover Eze Castle's portion of the webinar in Part Two next Tuesday, May 26th.

Categorized under: Launching A Hedge Fund  Cloud Computing  Disaster Recovery  Security  Hedge Fund Due Diligence  Hedge Fund Operations  Hedge Fund Regulation  Infrastructure  Communications  Outsourcing  Business Continuity Planning  Trends We're Seeing 



Planting Seeds: Springing Forward with Cybersecurity Education

By Katie Sloane,
Tuesday, April 28th, 2015

Despite the recent strides hedge funds have made to improve cybersecurity policies and safeguards, studies reveal that a less-heralded group is responsible for the majority of successful cyber-attacks. Flying under the radar and opening the malware floodgates with one click of a spoof email are employees ill-informed of cyber threats and potential risks.  

Unbeknownst to the employee, upon release of their mouse they have guided hacktivists into his or her company’s network, exposing business critical information, financial records and passwords. And that’s just the beginning. The quantity and severity of subsequent damages are limitless, but so is the opportunity for improvement in the firm’s case. 
 

Categorized under: Security  Disaster Recovery  Communications  Trends We're Seeing 



Business Continuity Focus: What happens when it's not a drill?

By Matt Donahue,
Tuesday, April 14th, 2015

What happens when it’s not a drill? What will employees in the office do after hearing an announcement or alarm due to an incident? Quickly make their way to the stairs or ignore it and continue working?Evacuation Plan

In critical situations, time matters. If everyone delays evacuating to make sure it’s the “real thing” or just completely ignores the warning, they can potentially put themselves in serious jeopardy. At home or at work, fire alarms go off from time to time. Unfortunately, responses to such alarms can range from grabbing a fire extinguisher to fuse the situation to putting on ear plugs and continuing with your workday. Inadequate responses to a fire alarm, for example, can put yourself, coworkers, and even first responders at risk. Fines can also be assessed to a firm by agencies such as OSHA or the local fire municipality if employees fail to evacuate in a timely manner.

A recent report from the National Fire and Protection Agency (NFPA) estimated that in 2013 alone there were 487,500 structure fires, causing 2,855 civilian deaths and 14,075 injuries.  Below are four areas of importance that firms should focus on during these types of scenarios to ensure their employees and businesses are not negatively impacted.

Categorized under: Business Continuity Planning  Hedge Fund Operations  Communications 



Encryption 101: Protecting Your Investment Firm's Sensitive Material

By Kaleigh Alessandro,
Thursday, March 26th, 2015

The amount of data and information that passes through the Internet every day is – for lack of a better term - enormous. And truth be told, sometimes we are sharing information that we don’t want to get into the wrong hands, whether it be via email, instant message or other communications. Think: credit card information, personal information (name, address, social security number, etc.), bank account information or sensitive company or financial data.Security Padlock - Encryption
 
A secure way to transmit this information is through encryption. According to TechTarget, encryption is “the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties.”
 
The history of encryption, believe it or not, began a long time before the Internet existed and we started sending electronic data. The ancient Greeks and Romans, in fact, sent secret messages by substituting letters that only a secret key code could decipher. In the time of Julius Caesar, he created a cipher by which he shifted letters to the left or right to hide his messages.

Categorized under: Communications  Cloud Computing  Security  Hedge Fund Operations  Hedge Fund Regulation  Trends We're Seeing 



Power Up, Power Down: The Hidden Risks of Public Charging Stations, Tools

By Katie Sloane,
Thursday, March 19th, 2015

Smartphone charging station; BYODIn a constantly connected world, the majority of us cannot help but feel reliant on our mobile devices, especially when it comes to battery life percentage.

Whether you’re in the airport, train or just on the go, keeping that effervescent green light out of the red zone becomes a priority, and most will plug into just about anything. With public smartphone chargers on the rise, this resource seems ideal for the battery conscious user. However, prior to plugging in to power up, we suggest proceeding with caution. After all, do you know whose hands that charger was in before?

Categorized under: Security  Communications  Software  Trends We're Seeing 



Client Relationship Management: A "Must-Have" Tool for Hedge Funds

By Katie Sloane,
Tuesday, March 17th, 2015

In today’s market, the pressure from both investors and regulators is at a steady incline. Reporting obligations have grown complex, transparency is in high demand and compliance technology has become a vital component to a firm’s success. With various demands tug-o-warring hedge fund managers in multiple directions, a Client Relationship Management (CRM) platform could be the solution your financial firm has been searching for.  Ledgex CRM, Hedge Fund Technology

Introducing Ledgex CRM, the revolutionary, stand-alone Client Relationship Management solution launched today by our sister company, Ledgex Systems. Ledgex CRM is ideal for managing and tracking investor communications, sales pipelines, client relationships and capital movements. The highly configurable, centralized platform is tailor-made for hedge funds, family offices and asset allocators. 

The new product offers the sophisticated Client Relationship Management capabilities necessary to raise and retain more assets, maintain and grow clients, provide outstanding client service and meet heightened reporting requirements. Out of the box, the web-based solution delivers efficiencies, transparency and flexibility without increasing headcount or costs. By streamlining investor relationship management and capital activity, Ledgex CRM enables managers to optimize their time and focus on fostering relations and growing business.

Categorized under: Software  Hedge Fund Operations  Hedge Fund Regulation  Communications 



Apple Watch: Security Concerns for the Enterprise and Beyond

By Kaleigh Alessandro,
Thursday, March 12th, 2015

By now, you’ve no doubt heard about Apple’s latest tech craze: Apple Watch. Revealed during the company’s latest announcement earlier this week, the Apple Watch is expected to revolutionize the mobile world. Available starting April 24, the Apple Watch will appeal to a variety of end users – with prices ranging from $349 (for the aluminum version) to $10,000+ for gold-plated versions.
Apple Watch
The Apple Watch will feature many of the same abilities of the iPhone – making/answering phone calls and texts, Internet surfing, and app integration as well as new advanced health monitoring features and Apple Pay. But with a user’s data now on his/her wrist in addition to in his/her pocket, should we be concerned about security?

Let’s start with the good news.

Apple Pay, in and of itself, has been thought out well in terms of security, it seems. Users can opt in to use a PIN number which will need to be entered every time the watch is put on a wrist. So if that watch was stolen, it would be impossible for the thief to make purchases via Apple Pay unless they had a user’s PIN number. According to Apple:

“Even if you lose Apple Watch, your accounts are protected. Because when you set up Apple Pay, you’re required to create a passcode. Each time you take Apple Watch off your wrist, the passcode must be entered to access it. And you can quickly remove your cards on iCloud.com."

Categorized under: Trends We're Seeing  Communications 



Hedge IT Blog Awards: Cheers to 500 Posts!

By Katie Sloane,
Thursday, March 5th, 2015

We recently hit our 500th post here on Hedge IT! To commemorate, we are hosting our annual blog awards! We've gathered the most thought-provoking, popular articles according to our readers and included a few of our personal favorites, as well. 

We hope you enjoy!

Categorized under: Eze Castle Milestones  Cloud Computing  Disaster Recovery  Security  Communications  Videos And Infographics 



Opalesque TV Exclusive: Cybersecurity Threats Facing Hedge Funds in 2015

By Kaleigh Alessandro,
Tuesday, February 24th, 2015

In this Opalesque.TV video interview, Bob Guilbert and Vinod Paul from Eze Castle Integration discuss the cybersecurity landscape of the investment community, specifically the risks facing hedge funds and alternative investment managers in 2015. Both spend the majority of their time educating their client base on internal and external risks, protecting them against the “Activist Hacktivists” looking for any means of entry into funds.

These hackers will spend weeks, months, and sometimes even years trying to get access, most often with the goal of triggering illicit wire transfers out of the fund.

Today, the usual efforts of employees to avoid clicking links or opening files and password protocoling aren't enough. Everyone should be aware of new techniques employed by hackers like “spearfishing” and “whaterhole” attacks which, with more institutional dollars flowing into hedge funds, will become more frequent. Unless funds have the right Written Information Security Policy (WISP) and processes in place, together with true intrusion detection that monitors what is coming into the firm and what data and information is going out of the firm, they can be at risk of a cybersecurity attack.

Categorized under: Security  Cloud Computing  Disaster Recovery  Hedge Fund Operations  Hedge Fund Regulation  Communications  Outsourcing  Trends We're Seeing  Videos And Infographics 



Winter Weather Preparedness: Considerations for Keeping Your Firm and Employees Operational This Winter

By Matt Donahue,
Tuesday, February 10th, 2015

Anyone who lives in a region that regularly receives snow knows (and expects) that every winter brings the potential for experiencing disruption, delays, cancelations and closures to roads, buses, trains, boats and subways that transport people to and from work. (If you’re in the Boston area, you’re experiencing this today with the MBTA shutting down all rail service to clean up from more than 70 inches of snow in the last three weeks.) Snow storms don’t just affect transportation though; weather events can cause power outages, force evacuations, impact deliveries, and as we saw recently with Winter Storm Juno, can cause entire states to ban travel.Snowstorm

Impacts of heavy snow if traveling to work

Let’s consider some of the issues firms can face even if a travel ban isn’t in place and employees must attempt to make their way to the office.

Most people who commute to work know that adverse weather can have a major impact on their travel to and from the office. Regardless of the manner of transportation (car, rail, subway, boat, bus, etc.), all will most likely experience delays and present challenges for commuters during a snow storm. Delays, breakdowns, cancellations, and longer commuting times are very common throughout a storm and can still impact travel days after a storm concludes, leaving employees largely unable to work effectively if at all. 

Categorized under: Business Continuity Planning  Hedge Fund Operations  Help Desk  Infrastructure  Communications  Outsourcing  Trends We're Seeing 



View earlier posts in the archive

Recent Posts / All Posts


 

Eze Cloud Information

Subscribe to Hedge IT

Follow Us

    Follow us on Twitter Follow us on FaceBook Follow us on LinkedIn Follow us on Google RSS Feed

Recent Articles

Categories

Archives