A much anticipated and, perhaps, over-hyped news conference rolling out the Trump Administration’s tax reform plan generated very little “new news.” Treasury Secretary Steven Mnuchin and National Economic Director Gary Cohn presented an outline of a plan that is very similar to the talking points the President promoted on the campaign trail. Perhaps the most interesting tidbit of information from the 23-minute briefing was a change in the Administration’s proposal for the treatment of itemized deductions for individual taxpayers.
Resource Search
The stock market abounds with colorful sayings that reflect the collective wisdom of decades of investment experience. For professional investors, these time-worn adages are reminders of sometimes-painful past market episodes and the unending challenge of getting the future right. But at the end of the day, can these slogans actually be useful in making investment decisions? Yes, but the best investment strategy is one that incorporates reasonable expectations for future market returns and establishes guardrails to avoid being swept up by the emotion that inhibits investment success.
Nearly all investment professionals rely upon portfolio optimization techniques grounded in Modern Portfolio Theory to structure investment portfolios for individual investors. Using statistical techniques and computer-assisted modeling, investment advisers are able to combine different types of assets such as stocks, bonds, cash, real estate, and hedge funds to create portfolios that claim to offer the best possible return for specified level of risk, or to minimize the amount of risk an investor must assume to achieve a specified amount of return.
Ask a wealth management colleague to define “the cloud” and you are likely to get a vague response. Even among information technology experts, the term “cloud” may refer to different technologies that are only connected in a general sense. And despite the fact that cloud computing has quickly become the IT norm, the question remains: Is the cloud secure enough to support a wealth management firm’s critical company information and workflow? The truth is, not all clouds are equal, in infrastructure and in management.
When a loved one dies, there isn’t a checklist of tasks to complete to expedite the grieving process. When you have been named the Executor (or “Personal Representative”) of the estate, you have an administrative process to navigate in addition to the emotional one. Thankfully, in that role, there are a finite number of actions that are involved, and plenty of places to turn for guidance.
Cybersecurity is a risk for children and adults alike. If you’re online, you’re visible around the world—and with more than 10 billion internet-connected devices, opportunities for hackers abound. Learn how to protect your family from identity theft and cyberattacks at home and while traveling. By knowing what to look for, you can dramatically reduce the risk of a cyberattack.
One of the most important, yet most forgotten, parts of estate planning is keeping track of who will benefit from those assets, including life insurance, which are not governed by your will. Providing for your family includes knowing which types of assets are not governed by your will; ensuring your assets are going to where you want them to go; and keeping your beneficiary designations updated.
From the intense wildfire activity in 2017, lessons were learned on the value of smart landscaping. Applying those lessons and other tips, you can enhance your home's resiliency and keep your family safe.
You have too much at stake to be caught unprepared, and your family is too important to be left in the lurch by an estate plan you didn’t realize that you had outgrown. If it has been a while since you have looked at your estate planning and settlement documents, it is time to perform a stress-test on your plan to ensure that none of the key components are missing or outdated. Performing this test regularly is time well-spent to protect your family from the unexpected, including an unanticipated incapacity and death.
When it comes to protecting digital assets, the users can end up being the biggest flaw in your cybersecurity armor. Mistakes like creating easy-to-guess passwords, not encrypting important data, or sending passwords over email can make a hacker’s job easy. To help strengthen your cybersecurity armor and stay ahead of the hackers, here are some cybersecurity best practices.