By Kade Boone
With DBC Finance from SS&C, you can structure your savings in several different ways. Here are the most common options:
By Dianna Tokic Farkas
If it’s not broken, why fix it? Without even realizing it, many of us waste time during the workday. Out-of-date methods and manual processes tie up time, efforts, and budgets. Many tasks could be easily automated and further optimized. Yet, you are stuck in inefficiency because you may not be aware of the options available. Ask yourself, “Is there a better, easier, more efficient way for me to handle the different areas in my finance department? What if my needs were offered by one provider and one single point of contact?”
By John Pavlakis
In today’s global business environment, greater regulatory demands, ongoing fiscal pressures, and the ever-present corporate financial constraints continue to challenge business leaders.
By Tongjai Lertphaisan
Do you regularly miss deadlines? Are your systems manual and error-prone? Are you looking for ways to improve your firm’s corporate action processing?
By Dane Ashworth
Credit card tokenization has been around for several years but few companies have implemented or understand how the process works. Credit cards that are processed natively within your software systems typically write the credit card information into their database and then send it out for approval through the payment gateway. The credit card number is typically encrypted since it is stored in your database. Encryption solves the problem of a hacker stealing a copy of your database, backup file or tape and consequently gaining access to the raw credit card information. However it doesn’t solve the issue of a malicious employee who has access to the credit card data as a part of their day-to-day job duties. Users need access to the credit card information on file in an unencrypted format in order to pass the number up to the payment gateway for approval.
By Adam Hall
Building a culture of effective leadership is not easy, and involves a multi-pronged approach. Hosting a leadership seminar once or twice a year is not enough to guarantee success. To attain long-term success, you need to weave in the search for great leaders throughout the fabric of your organization.
By Lisa McLaughlin, Information Security Officer
Today, cyber threats are real and ever changing. In response, regulatory rules must constantly evolve in attempt to mitigate this dynamic threat. In the first of this two-part blog series, we’ll take a look into the complex roles of in-house attorneys and security professionals, and how they are intrinsic to the success of your business by protecting your organization’s sensitive information.
By: Bernard Hecht
In a tax-exempt housing bond structure, the revenues from the underlying assets – mortgages, bond proceeds account (sometimes called the acquisition fund), reserve funds and (short-term) float interest – are calculated to provide sufficient money for the bondholders. However, additional funds may also be available over the life of the deal, primarily due to surpluses, mortgage prepayments, reduction in the reserve requirements, loans not coming to fruition (undisbursed bond proceeds) and insurance reimbursements.
By: John Hansen
The need to provide timely and accurate information across an entire organization can be difficult and resource-consuming. The challenges are many: business units may have different sources and uses of funds, they may be separated geographically or by differing reporting structures, or there may not be a standard mechanism in place by which this information can be easily disseminated within the organization.
By: Kade Boone
Recent regulation updates have changed treasury arbitrage regulations on bonds for the first time since August 16, 1993.