Networks - Data Security/Technology

FOX Family Office Technology Showcase Interview with Paul Freeland of SEI

Jul 23 2020 - gperkins

body[und][0][value]),'600',TRUE,TRUE); ?> Read more »

FOX Family Office Technology Showcase Interview with Cameron Sheehan of Addepar

Jul 23 2020 - gperkins

body[und][0][value]),'600',TRUE,TRUE); ?> Read more »

USI Insurance Services
Thursday, July 23, 2020

The ability to perform financial transactions online offers tremendous convenience, but also exposes assets to theft and cyber fraud.

BlackCloak
Monday, July 20, 2020

Adding dual factor authentication to your social media helps make sure that you, and only you, can access your account. Instead of only entering a password to log in, an extra security key will be required to access your account.

Venture Investing in Artificial Intelligence Companies

Jul 08 2020 - lgochanour@familyoffice.com

body[und][0][value]),'600',TRUE,TRUE); ?> Read more »

BDO
Tuesday, July 7, 2020

Cyber criminals are increasingly turning their focus on family offices—the "target-rich-zone"—to steal a great deal of valuable information and money. It's also an easy target since there are minimal security measures to stop them.

Sage Intacct
Monday, June 29, 2020

Most small businesses begin their financial lives using Intuit's QuickBooks, but if your business has moved beyond the entry level, your organization may be facing a number of challenges as you hit the limits of QuickBooks’ functionality.

FOX stands up for systemic change. We reject racism, bigotry, and hatred.

Jun 18 2020 - gperkins

body[und][0][value]),'600',TRUE,TRUE); ?> Read more »

Risk Strategies Company
Thursday, June 11, 2020

As anticipated at the onset of the COVID-19 pandemic, there has been a significant uptick in cyber fraud. Cyber criminals are opportunistic and taking advantage of companies at their most vulnerable.

Marsh & McLennan Companies
Tuesday, June 2, 2020

As social distancing measures abate—and ahead of a possible second wave of coronavirus cases—organizations will need to de-risk the enterprise and adapt operations to a “new normal.” This will require a thorough evaluation of pandemic-driven IT and cybersecurity changes, some of which were rapidl