Featured entries from our Journal

Details Are Part of Our Difference

Embracing the Evidence at Anheuser-Busch – Mid 1980s

529 Best Practices

David Booth on How to Choose an Advisor

The One Minute Audio Clip You Need to Hear

Author: Nell Schiffer

In Your Cyber-Corner: Are Your Passwords Properly Empowered?

In the good old days, online security used to be more nicety than necessity. For years, I had one 8-digit random password to serve every login need. With developments in hacking technology, the standards for passwords have changed, and a one-size-fits-all password no longer makes the cut. In this piece we’ll challenge our old beliefs about passwords and introduce you to five new powerful password procedures to help you stay secure.

  1. Make it unique. Each of your online accounts should have a unique password. Otherwise, if a cyberthief breaches one account, they’ve effectively breached them all. Don’t make it easy for them.
  1. Stay sane with a password manager. Unless you are a master memorizer, assigning unique passwords to each login is a tall order indeed. Solution: install a top-of-the-line password manager. This handy tool will help you to store, and even generate strong passwords. Here’s an independent review of available providers to get you started.
  1. Lead with length. Remember those 8-digit passwords we talked about? There are random generators out there that will decode 8 characters in a computerized heartbeat. Instead, passwords should be 16 or more characters long.
  1. Words are welcomed. It used to be a no-no to use dictionary words in a password. This is now considered okay, as long as the string meets the 16-character suggestion. Bonus points if you include a sprinkling of numbers, symbols and cases. For example, a semi-legible password like April48+greenGoose12% is probably equally as strong as an entirely random string like F8*tjE#378FpP6Jm#@4.
  1. Change it up, often. Once your password game is strong, it’s best to routinely change them. Quarterly is ideal, and the password manager can help. Schwab conveniently prompts you when it’s time to change theirs, as do many other financial institutions.

How else can we assist you with your cybersecurity? Send me your questions … I’m on patrol!

A HIG Podcast Pick: Guy Raz’s “How I Built This”

Like most people, we’re pretty busy here at Hill Investment Group. After dedicating ourselves to family, friends, community and career, it’s hard to find extra time for relaxing and reflecting before we find ourselves fast asleep.

Thank goodness for podcasts. They offer energizing food for thought during our morning commutes (Henry), dog walks (Matt), or while sweating it out on a jog (yours truly). We’ve each got our personal favorites, but Guy Raz’s “How I Built This”  podcast is a HIG-wide hit.

For investing, we typically encourage a steadfast – almost stodgy – buy, hold, and rebalance approach to managing the money you’ve made, emphasizing academic evidence over “lucky breaks.” But first, you’ve got to make some of that money, and sometimes that takes luck and skill alike. So we also love the edgy tales of how some of today’s best-known businesses came to be. To name a few:

Southwest Airlines: Can you believe this airline was initially a side hustle for founder Herb Kelleher?

Starbucks: Founder Howard Schultz tells an incredible story about Bill Gates, Sr. (“The” Bill Gates’ dad), and the role he played in saving Starbucks.

Patagonia: Founder Yves Chouinard became a successful businessman despite himself.

The Home Depot – Being fired may have been the best thing that ever happened to co-founder Arthur Blank.

Next time you’ve got a little downtime of your own, why not tune into “How I Built This”?

In Your Cyber-Corner: Who’s Your Trusted Contact Person?

Not long ago, keeping your financial stuff secure meant having a safety deposit box at your local bank. Wow, times have changed. A real or virtual safety deposit box still comes in handy, but it’s only the beginning. Not sure where to start building solid cybersecurity? Welcome to our periodic column, “In Your Cyber-Corner.” As Hill Investment Group’s Chief Operating Officer and resident “sheriff,” I’ll be offering one or two take-homes at a time. Today, I’ll take on the role a Trusted Contact Person (TCP) can play in safeguarding your stuff.

Picture this. You’re celebrating your 25th wedding anniversary on an ocean cruise. Halfway through, your account custodian receives an unusual electronic request from “you,” asking for a substantial cash transfer abroad. Naturally, they would like to confirm whether it’s really you, but they are unable to reach you. They ask us, your advisor, but we can’t confirm your intentions either.

Or here’s another, far less happy, but increasingly common scenario. Unfortunately, your spouse is exhibiting early warning signs of dementia. One day, he contacts your account custodian out of the blue and asks for a cashier’s check on the entire $550,000 balance in his IRA account. Of course it’s his money, but …

What next? Many custodians (including Charles Schwab) allow you to designate TCPs to contact if they suspect you may be subject to financial exploitation, or with questions about your mental or physical well-being. For example, if you’ve named your daughter as a TCP, they can contact her, let her know what has transpired, and seek her input. Spouses also can name one another as TCPs for each other.

Your TCP does NOT have power of attorney (unless you’ve granted that separately). Schwab notes that your TCP “is not authorized to make investment decisions or withdraw funds from your account.” Naming a TCP does enable your custodian to place a temporary hold on suspicious transactions and report the incident to law enforcement agencies.

So go ahead, pack those bags, enjoy your busy life and make the most of your wealth. If you’re interested in more information on designating a TCP, simply email us at service@hillinvestmentgroup, or call us if you’re a Hill Investment Group client and we’ll make it happen.

Featured entries from our Journal

Details Are Part of Our Difference

Embracing the Evidence at Anheuser-Busch – Mid 1980s

529 Best Practices

David Booth on How to Choose an Advisor

The One Minute Audio Clip You Need to Hear

Hill Investment Group