As investment management firms grow, the cyber threat landscape evolves and new and improved technologies emerge, it is critical for firms to outsource their IT to a managed service provider who they rely on to provide the best possible support, service and products. Continue reading for five signs that your firm has outgrown their 'Mom & Pop' IT shop and is ready for an upgrade.
The service level isn't meeting your needs.
For investment management firms, having the appropriate support and service level is crucial. Investors are vigilant about mitigating operational risk, and by leveraging a provider with a 24/7/365 Help Desk, you can ease their minds by ensuring your employees, systems and network have constant support. Additionally, if your existing IT service provider isn't responding to emails or returning calls in a timely manner, or you if their support is inconsistent with your service level agreement (SLA), it may be time for an upgrade.
They lack experience with cutting-edge technologies and strong partnerships.
If your IT provider isn't using cutting-edge technologies and best-in-breed solutions, it may be time to consider an upgrade. When outsourcing IT, you want to make sure that the provider offers an array of solutions that are going to best meet your firm's needs. It is unusual for one technology provider to be the best at everything, so you'll want to to work with a service provider that leverages long standing partnerships with a wide-variety of technology vendors.
Especially in today's evolving threat and technology landscape, there is no "one-size-fits-all" approach to either security or IT, and you'll want to partner with a firm that has the experience and flexibility to build a custom solution right for you and your organization.
New technology is emerging, cloud computing is becoming the new norm and cybersecurity threats are growing exponentially, but how does this impact investment management firms across the globe? Eze Castle Integration surveyed 150 senior-level executives with IT decision making responsibility to find out how the current landscape has shaped their strategies and attitudes on cybersecurity, IT spend and third-party outsourcing.
Our newest infographic explains the findings: see it here!
More than ever before, technology has become a key element of the already thorough due diligence processes that businesses go through, in order to secure funding from investors. Thus, being able to illustrate a strong and resilient infrastructure is vital for both start-up and established firms operating in today’s wider professional services landscape.
Today’s blog article will take a look commonly asked investor due diligence questions (DDQs), as well as share best practices on how firms can leverage technology to win the trust of investors and subsequently unlock the capital needed to help their business flourish.
Download a copy of our whitepaper ‘Outsourcing in the Alternative Investment Management Industry’ to learn more about managing third-party vendor relationships effectively.
With new technology emerging, cloud computing becoming the new norm and cybersecurity threats growing exponentially, how does this impact investment management firms across the globe? To gain a better understanding of industry IT priorities, Eze Castle Integration, in partnership with Microsoft and IDG Reserach, conducted a survey of 150 senior-level executives from the United States and United Kingdom. The findings cover technology priorities, cybersecurity plans and concerns, outsourcing attitudes and trends, and IT budgeting.
Continue reading for a synopsis of our findings, or to view the full report, you can access The 2019 Global Investment Management Survey: Understanding Industry IT Priorities and Spending HERE.
In today’s investor landscape, operational due diligence (ODD) can eliminate a manager from consideration, regardless of a positive investment management analysis. With ODD teams increasingly using this veto-power in the decision-making process, it is important for asset managers to be cognizant and well-prepared for thorough operational due diligence tests.
Together, leading accountancy and advisory firm, EisnerAmper, and trusted global provider of managed IT services, Eze Castle Integration, hosted a breakfast seminar to share secrets to operational due diligence excellence with investment firms, in London last week.
Today’s blog article will round-up the technology considerations concerning ODD, covered at the event by Dean Hill, Executive Director at Eze Castle Integration.
If there’s one thing we’ve learned over the years when it comes to cybersecurity, it’s that there’s a whole lot more to creating a secure investment firm than robust technology. Before identifying infrastructure components and implementing operational policies, a firm must first be clear on what its attitude is toward security. This attitude will filter through the company from the top down, and will therefore dictate how employees and the business as a whole operate on a daily basis.
To give you a clearer understanding of what we mean, we’ve created three security profiles that cover a wide spectrum in terms of security attitudes and practices.
Under the Radar: Low Security
If you’re attitude toward security is low, odds are you’re barely scraping the surface in terms of what practices and policies you should be employing to maintain proper security firm-wide. You likely rely on quick fixes to solve problems instead of looking at the bigger picture and thinking strategically about how security can both benefit and protect your business. You’ve employed minimal preparedness efforts and could be in for a difficult task if faced with a serious security incident. You probably take a “it won’t happen to me” attitude and don’t take security seriously enough – a stance that could endanger your firm in the long term.
You can also check out our latest Whitepaper on the required safeguards for 2019 and how to pursue a "security-first" posture.
Technology plays a vital role in determining how successful organisations are in meeting their goals. Together, the right technology and IT strategy enables a firm to practice agility through adapting its business models to changing needs of the firm, as well as enhancing existing services and products to meet the ever-evolving needs of the market. Having the right security practices in place is also fundamental to ensuring a firm’s reputation remains intact no matter how aggressive the cyber threat landscape may become.
This blog article will share steps to building the best technology platform to deliver your organisational goals in today’s digital age.
In a recent webinar, members from the Eze Castle team talked about the security layers that are essential to cloud security for all investment firms. Topics for discussion include:
How to approach a security-first strategy to cloud systems
Defining the essential security layers from the outside in
Must have security safeguards from multi-factor authentication to employee training techniques
To start, we typically find three points in time when it makes the most sense for an existing firm to evaluate a move to the cloud. This includes during an office relocation, adding new applications, and an IT refresh.
Office relocation: This is an ideal time to evaluate your IT environment to determine if a refresh is around the corner. Often it doesn’t make sense to invest in moving a Comm. room that will require a refresh in the near term. We have found that migrating to a cloud environment prior to a relocation can be ideal because it makes the move very low risk and simplifies the process.
New applications: The cloud, of course, is great for applications because it gives firms flexibility to add on as their businesses grow.
Technology refresh: Hardware will typically run a lifecycle of 3 or 4 years before it needs to be refreshed. If you’re getting to that point where your servers and other hardware are getting stale, and if you’re going to be investing in new technology and upgrades anyway, it’s the perfect time to evaluate a cloud solution.
With the new year now upon us, what better time to create your 2019 resolutions for your firm's IT strategy! As we know, the threat landscape is constantly evolving, cloud computing has gained momentum and is now widely accepted in the investment management industry, and new technologies and trends are emerging to support firms with their IT and operational needs.
Continue reading for Eze Castle Integration's recommendations for IT resolutions for 2019:
1.) Create a Cybersecurity Incident Response Plan
As the experts in the industry say, it's not if, but when, a cybersecurity incident will occur. According to a recent report by TechCrunch, cyber attacks are set to spike again in 2019, meaning firms need to continue to stay on top of cybersecurity best practices, utilizing layers of security to protect sensitive data, of course, have a Cybersecurity Incident Response Plan. This includes creating an Incident Response Team consisting of members throughout different departments in the organization, and mapping out the steps to take before, during and after a security incident.
Building on this, developing a Written Information Security Plan, or a WISP, is critical to securing your information, but also required if your firm is registered with the SEC. Having documentation of your firm's plan and systems in place to protect personal information and sensitive company information can help mitigate threats and risk against and protect the integrity, confidentiality, and availability of your firm's data.
3.) Create a comprehensive employee security training program
If you don't have an employee training program, it is critical that you create one in 2019. If you already have an existing employee training program, you must periodically audit this program, ensuring it is both effective and current. Having a managed phishing and training program is an effective way to train employees on how to spot and report phishing and social engineering attempts. These simulated phishing attacks against your employees provide real-time and interactive training.
As we wrap up 2018 and start looking forward to 2019, we thought it would be helpful to share some of our favorite cybersecurity articles from this year!
You may also want to check out the launch of our online Cybersecurity Information Center, three new whitepapers and a series of educational webinars.
Now is the perfect time for firms to reflect on what’s often classed as a key contributing factor to cyber breaches – its employees. We hate to admit it, but human error tends to be the weakest link of any defense practices firms have in place. The IBM X-Force Threat Intelligence Index 2017 advises that simply having the right technology is not enough to ensure protection from threats we’ve seen grow in frequency and sophistication, of late. Reputable airline, British Airways, is one of many businesses to fall victim to a reputation damaging data breach in 2018, compromising the personal and financial details of approximately 380,000 customers.
Read more on how to build a strong human firewall for your firm here.