• Nov
    29
    Three Ways to Improve Mobile Productivity

    Virtually every employee today has a smartphone. Many also have tablets, such as iPads and Android devices. Many organizations are under-utilizing these devices, both because they belong to the employee in most cases, and due to long standing concerns about mobile security. When adopting a BYOD policy, the key is to empower the mobile experience of…

    Read more >

  • Nov
    22
    Hedge Fund Information Security Planning

    In order to ensure that your hedge fund maintains a strong cybersecurity posture, it is essential that you enact the appropriate information security policies. But which policies should your firm be considering? In today’s post, we outline five important policies that should be part of your hedge fund’s information security plan. Acceptable Use Policy An…

    Read more >

  • Nov
    17
    Phishing Attacks: How to Avoid Them

    By George Ralph, Managing Director, RFA UK Ltd. Phishing attacks are the most common type of cyber-attack method today, with new mutations and versions appearing every day. Hedge funds have become prime targets for attackers based on the vast amounts of valuable data they contain. Over time, these phishing scams have evolved to appear highly…

    Read more >

  • Nov
    8
    Six Best Practices for Managing a Virtual Team

    A virtual team is a group of individuals who work across time, space and organizational boundaries with links strengthened by webs of communication technology. With the number of virtual teams increasing, either in part, or in entirety, the person who has to manage a virtual IT team needs a whole host of additional tools and mechanisms…

    Read more >