In today’s hyperconnected world, news headlines are filled with stories about identity exposure, data breaches and other major threats to your personal information and financial assets. This guide provides best practices, resources, and actionable advice to help you protect yourself or recover from a cyberattack.
Resource Search
As many as 20% of family offices have knowingly experienced a cyber security attack prior to the coronavirus pandemic, and it’s likely that number is significantly higher today. Learn how to build cyber protection from the surge in cybercrime, including how to reduce your digital footprint and what to do if you become a victim of a cyber breach. Protection also means having cyber insurance and knowing the essential elements it should cover.
This annual cybersecurity update covers the leading threats you need to be aware of to keep your clients and your firm protected. 2021 cybersecurity trends and best practices will be shared.
Going on the internet can put your devices and personal details at risk from unexpected online threats like malware and ransomware. Learn about the threats and see some internet safety tips to help keep your devices and data safe when you browse online.
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Cybercriminals have migrated their attacks from larger businesses and hardened targets to private wealth clients and family offices, where the defenses are low or non-existent. In this webcast, hear from Dr. Chris Pierson, CEO of BLACKCLOAK, a Concierge Cybersecurity & Privacy Protection Platform that represents private wealth and family offices in their digital lives. Chris discusses the top five threats that are facing private wealth/family office clients, the controls or defenses that can mitigate these, and how to protect your privacy.
No one is immune from cybersecurity threats. And responsibility for protecting your data doesn’t rest with one person or provider. So it’s essential every organization follows at least some basic cybersecurity best practices. A great step toward ensuring your data is safe is to maintain good cyber hygiene. We recommend hiring a third party to conduct periodic holistic threat assessments to surface issues that should be mitigated/controlled.
The key to success of any risk management plan is the development of an “all risk” approach that takes the entire family enterprise into account. Through a survey of more than 200 family office executives at single and multi-family offices, an uncovering of some worrying approaches has surfaced around the risks that family offices face, particularly cyber risk, family-related risk, investment risk, and employment-related/insider risks.
Adding dual factor authentication to your social media helps make sure that you, and only you, can access your account. Instead of only entering a password to log in, an extra security key will be required to access your account. Step by step, learn how easy it is to configure for your Facebook, Instagram, LinkedIn, SnapChat, WhatsApp, and Twitter accounts.
Identity theft occurs when personal information about an individual is stolen and used typically for financial gain. Criminals can obtain personal information electronically through hacking or illegally purchasing information from the Deep Web/Dark Web. They can also obtain information through paper records that are not properly disposed of or securely stored.