Webinar – DOL Fiduciary Rule: 3 Cs of Compliance

In a month and a half, the DOL Fiduciary Rule will take effect and many in the financial industry are adopting a “wait and see” approach to the rule, with plans to adapt their business once the rule takes effect.

Ebix Consulting partnered with some of the industry’s leading  experts to develop a webinar that addresses your concerns about the impending fiduciary rule and discusses a number of ways you can start preparing now.

 

To learn more about how you can implement solutions for the DOL Fiduciary Rule, contact us today!

Technology Takeover: What You Need to Know About Robo Advisors

Technology Takeover: What You Need to Know About Robo Advisors

Technology is catching up to the financial industry at a rapid rate. According to a report by KPMG and CBInsights, fintech raised more than $19 billion in the last year. Originally, financial technology, or fintech as it’s now called, was the term used to describe technology applied to the back-end of established consumer and trade financial institutions. Since the end of the first decade of the 21st century, the term has expanded to include any technological innovation in the financial sector, including innovations in financial literacy and education, retail banking, investment and even crypto-currencies like bitcoin. Some members of the financial industry are worried about the effect fintech will have on the financial world, specifically the effect of robo advisors. A robo advisor is an online wealth management service that provides automated, algorithm-based portfolio management advice without the use of human financial planners. “Advisors are treating it as a potential threat …

CONTINUE READING

October Is National Cybersecurity Awareness Month

Cybersecurity Awareness

We are thrilled to introduce our guest writer this week. Brian Edelman, CEO of Financial Computer Services (a data security company with more that 20 years of experience), is a nationally recognized technology advisor who specializes in both financial services and technology. Making him uniquely qualified to advise on the risks of data security breaches and how to prevent them.   It only takes a single infected computer to potentially infect thousands and perhaps millions of others- Cybersecurity, A Shared Responsibility.   Cybersecurity has emerged as  a top Priority for the Department of Homeland Security,  we now live in a world that is more connected than ever before and as technology advances, our lives become easier. However, as people become more reliant on modern technology, we bring an increased risk that threatens our finances, identity, and privacy. Cyber exploits such as corporate  security breaches, social media fraud, and spear phishing- which targets employees through …

CONTINUE READING

Employers Increasingly Use Social Media To Find Job Candidates

Employers Increasingly Use Social Media To Find Job Candidates

Social media is now a part of daily life for the majority of Americans — and it’s becoming an important tool for human resource professionals searching for job candidates. New research from the Society for Human Resource Management (SHRM) found that 84% of organizations are using social media for recruitment and another 9% plan to do so in the near future. Approximately two-thirds of American adults (65%) use social media compared to only 7% a decade ago, according to a Pew Research Center report. Considering the vast number of people who interact on social media, and the amount of information that can be gleaned from posts and profiles, it’s no surprise the social networking phenomenon has impacted employee hiring. For SHRM’s “Using Social Media for Talent Acquisition — Recruitment and Screening” survey, 410 HR professionals were asked how their organizations use social media to recruit and screen job candidates. Almost 90% of organizations reported they use social media to post job advertisements and three-quarters …

CONTINUE READING