Hedge Fund Blogs From HedgeCo.Net


Category Archives: Not Categorized

10 Common Mistakes That Make Smart Investment Managers Look Naive – Part II

  (Click HERE  For Part I)   6. Employing a “sophisticated, systematic and repeatable” investment strategy but an undisciplined and discretionary marketing strategy  “I did PR once. It didn’t work.” One client’s comment during a brand development discussion Imagine scrapping your entire investment strategy every time a trade doesn’t immediately go your way? Just like investing, marketing requires a strategy, consistent […]

An Achievable Calendar for Cyber Security Plan Implementation

Keeping up with the myriad of cyber security requirements expected of today’s financial firms is a daunting – and sometimes unachievable – task. This list continues to grow in size and scope, and remembering how often to perform tests or when to change passwords is a growing challenge for CTOs and business execs responsible for technology. To assist in guiding […]

10 Common Mistakes That Make Smart Investment Managers Look Naive – Part I

If managers are so bent on being perceived as “contrarian,” why do they insist on communicating their message in such conformist ways? How do you think Apple would look like today if Steve Wozniak ran oversaw marketing instead of Steve Jobs? What do you think would happen to Crest toothpaste sales if Procter & Gamble decided to turn product branding […]

What Hackers Can Do With Your Firm’s Data

There’s a lot hackers can do to wreak havoc for private equity and other investment firms – and it extends far beyond forcing users to change their passwords. In fact, with their roguish hands on the right information, the consequences can be downright destructive for a firm’s business operations and integrity. Systems & Network Access  Of course, with stolen passwords […]

Guards Up, Phones Down: Avoiding Voice Phishing Scams and Social Engineering Tricks

Social engineering tools and tactics have transformed in recent years, and we often stress here on Hedge IT the importance of IT security, particularly when it comes to sophisticated phishing and spear-phishing campaigns via email. One tactic we haven’t touched on is voice phishing (also known as ‘vishing’), which works towards the same ultimate goal – prompting an end user to […]

WannaCry Ransomware: What we know, Where we are

The WannaCry ransomware attack is slowing as IT teams across the globe work to deploy patches, disable SMBv1 and recover files, but we are still very much in the midst of the situation. Here’s a look at what we know and what we can do in an effort to prevent future attacks. What is the WannaCry Ransomware? On May 12, 2017, […]

United Airlines: A Lesson For Alternatives Managers

Anyone who’s read the news in the past month will be familiar with the incident involving a United Airlines passenger being dragged off an airplane. This incident caused all kinds of bad press for United Airlines, with negative perceptions of its corporate reputation increasing to 500% according to new research from The Harris Poll. The end of the road for […]

Anatomy of a Real Estate Crowdfunding Transaction

by David Drake Crowdfunding has now grown from a niche to a legitimate platform for funding projects of all kinds by raising money from the public at large. Nowhere has this been more pronounced than the real estate sector where there are now a number of crowdfunding platforms offering investors the chance to participate directly in real estate projects. Traditionally, […]

What is Your Security Attitude? Hedge Funds + Private Equity Firms Take Note

If there’s one thing we’ve learned over the years when it comes to cyber security, it’s that there’s a whole lot more to creating a secure investment firm than robust technology. Before identifying infrastructure components and implementing operational policies, a firm must first be clear on what its attitude is toward security. This attitude will filter through the company from the […]

The Physical Trap for Managers

“THE PHYSICAL TRAP??” Yes! We’re all susceptible to finding ourselves in a comfort zone and not wanting to move out of it (myself included!). We find ourselves stuck in the Physical Trap when we’ve made investments in old systems or equipment, and are hesitant to pursue fresher, more relevant investments. When we ask what technology managers use to manage their […]