Eze Castle Integration Eze Castle Integration

Hedge IT Blog

10 Keys to Launching a Hedge Fund: A Video Premiere

By Kaleigh Alessandro,
Tuesday, February 16th, 2016

Today's hedge funds are facing an environment defined by regulatory pressure, investor demands and fierce competition. For hedge fund startups, the challenges are even greater, so too are the demands. Successfully operating a new startup beyond the first year is a feat many managers struggle to accomplish, therefore it's critical for emerging managers to gain a full understanding of the industry that awaits them and the hurdles they should expect to face.
 
While the list of considerations is surely long for new managers, we've whittled it down to 10 Keys to Launching a Hedge Fund Successfully - a guide for new startups to use when setting off on their new journey.
 
Take a look at our latest video for a quick look at our 10 Keys to Success. And be sure to come back to Hedge IT later this week when we'll be sharing an excerpt from our brand new whitepaper on the same topic!
 

 

Categorized under: Launching A Hedge Fund  Cloud Computing  Security  Disaster Recovery  Hedge Fund Due Diligence  Hedge Fund Operations  Hedge Fund Regulation  Infrastructure  Communications  Outsourcing  Business Continuity Planning  Trends We're Seeing 



What is Spam and How Can You Avoid Sending It?

By Jordan DeSantis,
Thursday, February 11th, 2016

Spam is essentially a term used to describe emails that make their way into a recipient’s inbox without their consent. According tothe Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG), almost 90% of all email is considered spam. Due to this shocking number, spam filters are widely used to assist users in keeping tabs on emails that are actually relevant. How do these spam filters work? We don’t know a lot about the algorithms used to operate them, and that’s probably a good thing. With that type of information floating throughout the web, spammers would be able to easily beat these filters, and we’d see cluttered inboxes everywhere. But despite our lack of knowledge on the intricacies of spam filters, there are a few red flags to avoid and best practices to adopt to keep genuine emails from entering total oblivion.

How Spam Filters Work

As mentioned, no one can be 100% certain how a spam filter flags an email, as they use many different benchmarks to judge an incoming message. A few hallmarks include:

  • IP Address – If your IP address has been flagged for sending spam in the past, it will impact the deliverability of your mail. This extends to your ISP as well. Where some ISPs attempt to eliminate spam from their servers, some take a more relaxed approach to spam.

  • What The Email Looks Like – Filters will look at the subject line and body of an email. If the filter deems either of the two to resemble spam, then your email likely won’t make it into someone’s inbox. Words and phrases such as “free” & “buy now” are often cited as trigger words.

  • Code – An innocent mistake many users make is using text formatted from Microsoft Office applications. Unfortunately, this creates rather messy HTML code with unnecessary lines of coding.

Categorized under: Communications  Help Desk 



Four Reasons Why Financial Firms Need Data Backups

By Evelyn Villemaire,
Tuesday, February 9th, 2016

With threats of data loss increasing in both numbers and severity, it is no surprise that data security is on everyone’s mind within the financial and investment industry. Regulatory agencies and investors now expect businesses to have backup solutions and comprehensive record-keeping practices. Understanding the need and importance of implementing a backup solution can add instrumental value to your business.

We at Eze Castle Integration have identified the top four reasons why backups are critical to not only a firm’s growth, but also their survival. 

Data Backup - Eze Vault

1. Regulatory agencies demand security of financial records.

The Securities and Exchange Commission (SEC) has instituted regulations on the storage of financial records and electronic communication, and financial industry regulatory agencies such as FINRA now provide standards and guidance information on potential threats. In addition, international regulators such as the FCA, a financial regulatory body in the United Kingdom, are also demanding firms to have a data backup solution. 

The reasoning behind these recommendations is the volume of things that can go wrong with your data storage solution. From hardware failure, software corruption, virus or network security breaches, to natural disasters and human error, the threat to your data is endless. With today’s financial services companies managing exponentially growing volumes of sensitive data, the risk of loss grows as well.

Categorized under: Disaster Recovery  Security  Hedge Fund Operations  Infrastructure  Trends We're Seeing 



When it Comes to Cyber Insurance Coverage, Be Sure to Read the Fine Print

By Kaleigh Alessandro,
Thursday, February 4th, 2016

The cyber insurance industry is growing at a rapid pace as firms look to implement safeguards to protect sensitive data and financial information from ending up in the wrong hands. As hackers become savvier and cyber schemes more elaborate, many firms are relying on cyber liability policies to add an extra layer of protection.
 
In some cases, however, insurance coverage has not satisfied the demands of firms and instead left them feeling scammed a second time.
 
One example of this comes from Texas where a manufacturing firm is suing their cyber insurance provider for refusing to cover a loss that came at the hands of a phishing scheme. According to the provider, the loss – of $480,000 – did not meet the specific criteria needed for a successful claim.
 
Situations like these are reminders for Chief Financial Officers and Risk Officers to carefully comb their cyber insurance policies to gain a comprehensive understanding of what exactly is covered – and what is not.
 
Our friends at Willis Holdings Inc. work with investment firms regularly to craft cyber liability policies and provided their take on the insurance landscape as part of our Hedge Fund Insiders Article Series: 
------------------------------

BY: John Mullen and Jennifer Coughlin, Lewis Brisbois Bisgaard & Smith, and Talene Megerian and Kristin Zieser, Willis FINEX Claims & Legal Group

The Cyber risk landscape is rapidly evolving. Governments are facing an unprecedented level of Cyber attacks and threats with the potential to undermine national security and critical infrastructure. Similarly, businesses across a wide range of industry sectors, particularly those in the health care, retail and financial services industries1, are exposed to potentially enormous liability and costs as a result of Cyber incidents and data breaches.

Given the risk landscape, it is no wonder companies of all sizes continue to be subject to increasing data breach liability, both in the form of single plaintiff or class action lawsuits and regulatory investigations and proceedings. Negligence, breach of fiduciary duty and breach of contract are just some of the allegations that a company may face as a result of a systems failure or lax security that compromises the security of customers’ personal information or data.

Categorized under: Security  Trends We're Seeing 



The Social Age: Have We Lost Our Privacy Filters?

By Katie Sloane,
Tuesday, February 2nd, 2016

In an interconnected world, social platforms such as Facebook, have evolved into components of our everyday lives. Real-time updates keep us in the loop with popular events, friends, “liked” company pages, the latest apps and so on. Behavior quizzes offer entertainment to discover your celebrity and fairytale doppelgängers, or breakfast food and ice cream personality matches. To partake in this social extravaganza, we hand over our personal information freely, forgetting its value somewhere between each hashtag and viral post.
Social-Media-Conversation

It seems that every hour emerging innovations and dynamic social platforms open the threshold of new opportunities to share and attain information. Typical data requested from social sites may include your full name, age, sex, birthday, relatives, photos, account access, etc. However, what most people don’t realize while tuning out to plug in our witty social facts, is the depth of personal data they’re unwittingly dispensing to persons, companies and third parties unknown.

When it comes to social media engines, when did people become the mindless machines pumping out sensitive information?

Categorized under: Security  Communications 



Winter Weather Preparedness Tips (Webinar Recap)

By Jordan DeSantis,
Thursday, January 28th, 2016

The winter season has officially greeted the East Coast with the first major storm of 2016, Storm Jonas. Jonas produced historic amounts of snow in many East Coast states setting records for all-time heaviest snowstorm at two prominent New York airports, JFK (30.5 inches) and LaGuardia (27.9inches). With these unprecedented levels of snow, New York City was forced to halt public transportation and implemented a mandatory restriction on private transportation as well. Jonas proved to be kind in the fact that the majority of the impact fell on the weekend but many firms can recall more disruptive storms occurring during regular business hours leaving many employees feeling stranded. To alleviate the stress incurred during winter storms, we sat down with our own Business Continuity Analyst, Matt Donahue, who creates, writes, and audits hedge fund’s business continuity plans. Matt spoke with us about different BCP scenarios and provided tips to keep your firm operational during the worst of storms.

Rather watch a video? Scroll down or click here to see Matt’s 15-min Q&A on winter weather prep.

Categorized under: Business Continuity Planning  Disaster Recovery  Hedge Fund Operations  Communications  Videos And Infographics 



What El Niño Means for Your Weather Forecast

By Matt Donahue,
Tuesday, January 26th, 2016

There has been a lot of talk recently on the West Coast about El Niño and its potential impact. Apart from a 1997 Saturday Night Live sketch featuring Chris Farley (do yourself a favor and look it up on YouTube), I realized I needed a refresher on what exactly El Niño is and what its potential impacts could be on regions across the U.S..El Niño Typical Winter
 
According to the National Oceanic and Atmospheric Administration (NOAA), El Niño conditions occur when abnormally warm waters accumulate in tropical latitudes of the central and eastern Pacific Ocean. Consequently, tropical rains that usually fall over Indonesia shift eastward. During El Niño winters, northwestern North America is more likely to experience warmer-than-average temperatures, and the southeastern U.S. is more likely to receive rain.
 
Of course, this should not be confused with La Niña.

Categorized under: Business Continuity Planning  Trends We're Seeing 



Top 5 Reasons Managers Need a Research Management Software (RMS)

By Jaime Bean, Ledgex Systems,
Thursday, January 21st, 2016

In today’s competitive market, research management software (RMS) has become a must-have integrated feature for investment management firms. Significant benefits offered via RMS have caused a ripple effect of soaring adoption rates across the global investment industry. In this article we’ll examine how adopting a research management solution could benefit your firm.

Central Repository

With offices, colleagues and clients spread across the world, firms need to consolidate data in an organized fashion. From meeting and call notes, to audits and analyst reports, the demand for readily accessible information is ever burgeoning. Storing information within multiple programs and folders not only welcomes disorder and the opportunity for digression in the workplace, but also increases costs and wastes valuable time. This prehistoric method of aggregating data has been replaced with advanced RMS, a much more viable, flexible and comprehensive solution. Hosting a firm’s data within a user-friendly, central repository simplifies processes, optimizes productivity and uncovers new business opportunities. When selecting a RMS, managers may consider a generic or industry-specific product. While both options present benefits, the latter assimilates seamlessly with an investment firm’s daily workflows, terminology and diverse range of data. An ideal RMS will also offer customization, accessibility and integrate with other applications, such as Outlook.

Categorized under: Software  Hedge Fund Due Diligence  Hedge Fund Operations  Hedge Fund Regulation  Communications  Trends We're Seeing 



Cybersecurity for Hedge Funds: The Current Landscape

By Wendy Beers, Wells Fargo Prime Services,
Tuesday, January 19th, 2016

On December 9, 2015, Wells Fargo Prime Services and Eze Castle Integration hosted a panel on cybersecurity to discuss the current landscape. The panel featured leading industry experts including:Cyber threat to hedge funds

  • Eldon Sprickerhoff, Founder & Chief Security Strategist, eSentire

  • Stuart Levi, Partner, New York, Skadden, Arps, Slate, Meagher & Flom LLP

  • Vinod Paul, Managing Director, Eze Castle Integration

  • Timothy O’Brien, Supervisory Special Agent, Cyber branch, Federal Bureau of Investigation – New York Office.

  • Marc P. Berger, Partner, Government Enforcement, Ropes & Gray LLP

Marc Berger’s opening statements emphasized the extent of the cybersecurity threat currently facing firms across a wide swath of industries. He quoted FBI Director James Comey, who stated: “There are two kinds of big companies in the United States. There are those who’ve been hacked … and those who don’t know they’ve been hacked ….”  (FBI Director James B. Comey, 60 Minutes, CBS TV Interview, October 5, 2014). Alarming statistics from the Ponemon Institute’s 2015 Cost of Cyber Crime Study, conducted with HP Enterprise Security, found that the average cost to resolve a single cybersecurity incident is $1.9M, and the average time to resolve is 46 days. Perpetrators range from nation-state-sponsored hackers and disgruntled/rogue employees to organized crime units, activists, and other thieves.

Categorized under: Security  Hedge Fund Due Diligence  Hedge Fund Regulation  Infrastructure  Outsourcing  Trends We're Seeing 



Five Steps of Business Continuity Planning for Hedge Funds

By Mary Beth Hamilton,
Thursday, January 14th, 2016

BCP hedge fundsMany years ago, business continuity plans were a nice-to-have feature for investment management firms. Only the largest and wealthiest firms employed them. In today's landscape, however, investors and regulators alike expect and demand that firms implement preparedness plans for disasters and cyber-attacks. BCP plans, therefore, are no longer optional. 

The key to a successful business continuity plan lies in understanding the impact a disaster situation could have on a business and creating policies to respond to any such impact. Here are the five key steps to this plan:

Categorized under: Business Continuity Planning  Disaster Recovery 



Recent Posts / All Posts / Previous Page / Next Page