Stop the Alert Spam: A Practical Playbook for RiskBO Thresholds Your Dealers Will Actually Trust
Your dealing team isn’t ignoring the RiskBO dashboard because they don’t care. They’re ignoring it because it’s training them to.
When every small fluctuation triggers an alert, the desk learns a dangerous habit: "red doesn’t mean urgent." Alert hygiene is the discipline of tuning thresholds, routing, and escalation so the dashboard stays quiet most of the time—and unmistakably loud when it counts.
What “alert hygiene” means in a brokerage risk backoffice
Alert hygiene is not “fewer alerts at any cost.” It’s fewer low-signal alerts and more consistent responses to high-signal ones.
In a RiskBO setup, most noisy alerts come from three patterns:
- Static thresholds on dynamic markets (e.g., the same exposure limit used during Asia and during NFP).
- One-size-fits-all rules applied to every symbol, client segment, and book.
- Missing escalation logic (everything goes to the same place with the same priority).
A healthy alert system has clear intent:
- Protect the book (exposure, concentration, correlation).
- Protect execution quality (latency/arbitrage patterns, toxic flow, slippage spikes).
- Protect operational control (bridge disconnects, hedging failures, unusual P&L swings).
If an alert doesn’t map to an action the desk can take within minutes, it’s a candidate for downgrade, batching, or removal.
Start with actions, not numbers: define the “dealer response map”
Before touching thresholds, define what the desk should do when an alert fires. This prevents tuning into a random collection of limits.
Build a simple response map with three severities:
- Info (log-only / digest): No immediate action; used for trend review.
- Warning (desk checks): Dealer validates, monitors, or prepares a hedge.
- Critical (desk acts now): Hedge, reroute (A/B), widen limits, pause a symbol, or escalate.
Then assign each severity an owner and a maximum response time:
- Warning: owned by the active dealer; response within 10–15 minutes.
- Critical: owned by the senior dealer/risk lead; response within 2–5 minutes.
This sounds basic, but it changes everything: once you can answer “what do we do,” you can tune thresholds to match the cost of being wrong.
Tune RiskBO thresholds by symbol and session (not globally)
Global thresholds are the fastest path to alert fatigue. EURUSD and XAUUSD do not behave the same. Neither do Asia and London.
Practical tuning approach:
- Group symbols into risk profiles (example: majors, minors, gold, indices, crypto, exotics).
- Set separate exposure and P&L thresholds per group.
- Add session multipliers (Asia vs London/NY overlap, news windows).
A concrete example (conceptual, not a universal rule):
- Majors: tighter exposure thresholds, because liquidity is deep and hedging is easier.
- Gold/crypto: wider “normal” movement bands, but stricter concentration controls because spikes are common.
- Exotics: lower max exposure per client and per symbol, because spreads and liquidity can deteriorate quickly.
If your RiskBO supports it, consider two-stage thresholds:
- Stage 1 (Warning): “Heads up—trend is building.”
- Stage 2 (Critical): “You are now at a level where hedging/routing must change.”
That staging is what keeps the desk from getting pinged for every small drift while still catching the build-up early.
Use baselines: thresholds should follow your real distribution
Many teams pick thresholds from intuition (“$X exposure feels big”). Better: anchor limits to your own history.
A lightweight baseline method your ops/risk lead can run monthly:
- Pull 30–90 days of:
- net exposure by symbol and book
- P&L swings (realized/unrealized)
- top client concentration
- number of alerts fired per category
- For each category, identify:
- median (typical)
- 95th percentile (unusual)
- 99th percentile (rare/urgent)
Then align severities:
- Info: around typical-to-unusual (for visibility)
- Warning: around the 95th percentile (unusual, requires attention)
- Critical: around the 99th percentile (rare, requires action)
The point is not statistical perfection—it’s stopping the system from screaming about “normal.” As your brokerage grows, those percentiles will shift, so schedule a recurring review.
Reduce noise with smart aggregation: concentration beats micro-alerts
A common anti-pattern is micro-alerts: “client A exposure,” “client B exposure,” “client C exposure,” all individually below the true risk line—yet together creating a real problem.
Instead, prioritize aggregation alerts that describe the risk the dealer can actually manage:
- Concentration by symbol: top 5 clients represent X% of exposure
- Concentration by strategy tag: scalpers/arbitrage cohort driving Y% of toxic flow signals
- Correlation clusters: multiple symbols moving exposure in the same direction (e.g., EUR crosses)
Where possible, batch lower-level alerts into a digest:
- “Top exposure movers in last 10 minutes”
- “Symbols with increasing one-way flow”
Dealers don’t need 30 pings. They need one alert that says: “This is the cluster that matters; here’s who’s driving it.”
Make alerts operational: route by book (A/B), hedge state, and system health
Even well-tuned thresholds fail if they ignore context. The same exposure number means different things depending on routing and hedging status.
Three context gates that improve signal quality:
- Book-aware alerts:
- B-book exposure thresholds should be tighter when you’re intentionally warehousing risk.
- A-book alerts should focus more on execution health (bridge rejects, slippage spikes, LP latency).
- Hedge-state-aware alerts:
- If hedging automation is active and healthy, the desk may only need warnings.
- If hedging is failing (rejects, disconnects, partial fills), escalate to critical quickly.
- Infrastructure health alerts:
- Bridge connectivity, price feed gaps, MT server load, plugin failures.
Operationally, this is how you stop “risk alerts” from masking “system alerts.” A dealing team can manage exposure—but they must first know whether the plumbing is stable.
A simple weekly checklist to keep RiskBO alert hygiene tight
Alert hygiene is not a one-time tuning project. Markets change. Your client mix changes. Your routing logic changes.
Use a weekly 20–30 minute review with dealing + ops:
- Alert volume:
- Which 3 alerts fired most?
- Which 3 were ignored most?
- Actionability:
- For each high-volume alert: what action did we take (if any)?
- If “none,” should it be downgraded, aggregated, or removed?
- False positives / false negatives:
- Did we get alerts that weren’t real risks?
- Did we miss a risk event (slippage blowout, one-way flow, sudden P&L swing)?
- Threshold drift:
- Are “warning” thresholds now being hit daily (meaning they’re effectively “info”)?
- Compliance and client treatment checks:
- If alerts trigger routing changes (A/B) or execution controls, confirm you’re applying policies consistently.
- Document the rationale and check local regulations and your internal best-execution / disclosure obligations.
The goal is a living system: fewer alerts, clearer priorities, and better auditability of why you acted.
The Bottom Line
RiskBO alert hygiene is about keeping your dealing desk responsive by protecting them from noise.
Define what actions each alert should trigger, tune thresholds by symbol/session, and use baselines from your own history—not gut feel.
When alerts reflect real, actionable risk (and escalation is clear), the dashboard becomes a tool the desk trusts again.
If you want help implementing a clean alert framework in RiskBO, start here: /get-started.