0 visitor like this article | Viewed 2736 times | 0 comment
Summary: Sometimes your best prospecting opportunities are right in front of you. But you miss them. You make things harder than they need to be. But when you have a repeatable system, you find quick wins. Opportunities to let your most obvious prospects know that you’re open for business. And how you will serve them.
0 visitor like this article | Viewed 2981 times | 0 comment
Summary: If you feel like your days slip away from you, give the aforementioned a shot. What’s the likely byproduct? You’ll feel more organized and focused each morning and you’ll undoubtedly get more done.
0 visitor like this article | Viewed 2887 times | 0 comment
Summary: Whether or not you’ve seen the 1979 psychological horror film When A Stranger Calls, at some point you’ve likely heard this memorable line: “We've traced the call and it's coming from inside the house.” According to the 2017 Threat Monitoring, Detection & Response Report, inadvertent breaches prompted by internal users (employees, vendors, etc.) accounted for 61% of cyberattack incidents.
0 visitor like this article | Viewed 2809 times | 0 comment
Summary: The fact is, we all want ideal clients who stick with us over time and give us more of their trust and assets and who also introduce us to their affluent peers. A devoted, delighted client base is vital to creating and growing a truly exceptional practice.
1 visitor like this article | Viewed 2837 times | 0 comment
Summary: As attacks have become increasingly prevalent at wealth management firms, clients are taking notice, said Raymond James’ Chief Information Security Officer Andy Zolper in an interview at the Raymond James' Wealth Manager Conference earlier this month. The Equifax hack has only heightened their concern.