Business impersonation scams are a large and growing risk for high-net-worth individuals, closely held business owners, and institutions. Scams have claimed victims in all 50 states and more than 100 countries and there is every reason to believe the threat is growing. Learn seven steps that can help you protect yourself and your business from impersonation and other types of fraud.
Resource Search
The holidays are approaching and to make it a more relaxed and enjoyable season, it helps to plan in advance and know the best practices for holiday planning, entertaining, gift giving, entertaining, and decorating.
The wealth management industry is constantly reinventing itself, and with every passing year, firms continue to push software vendors to deliver features and functionality that not only enhance their existing solution but offer an unparalleled experience. It is often difficult to know which innovations are relevant and which are not. Having a guide outlining the seven technology innovations can help members of the wealth management industry make more prudent and educated decisions regarding their technology solutions.
Purchasing a wealth management technology solution is a significant business decision for your firm. You have likely been tasked with sourcing a platform that meets the needs of your principals, your team and your stakeholders. The solution should support your internal accounting, investment management and reporting functions while streamlining your firm’s day-to-day operations. As an executive, where should you begin? To assist you in the research, there are more than 50 questions to help guide through the process of finding the right solution for your firm.
When former First Lady Nancy Reagan passed away in March 2016, millions of Americans mourned the loss. While the events honoring Mrs. Reagan unfurled seamlessly, a dedicated team was hard at work behind the scenes to ensure the funeral was being conducted to Mrs. Reagan’s expressed desires. The preparations and demands of the funeral may seem extreme, but many of Mrs. Reagan's concerns apply to other families of wealth and should be addressed.
Most family offices that serve U.S. families are well aware that special planning considerations can arise when a U.S. citizen family member marries a noncitizen. Should the client’s estate plan be revised to incorporate a qualified domestic trust (QDOT) to ensure that assets passing to the surviving noncitizen spouse qualify for federal estate tax marital deduction?
For family offices of all profiles—large and small, established and brand new—there are dozens of technology solutions available. In the first of the Family Office Series report, the focus is on technology, a topic that some families find daunting and neglect at their own risk. To simplify the landscape, the report identifies key reasons why family offices may need technology solutions and offer a review of the leading platforms and solution-providers currently available.
Identity theft is a risk that continues to grow and change daily. Due to the many forms identity theft can take, including medical, credit, and financial, the threat remains prevalent and affects millions of people every year. Keeping up-to-date with the latest prevention methods is the surest way to protect the assets and identity. There are a number of steps that can be taken to reduce the risk of identity theft, including reducing access to personal information and maintaining a list of credit card issuers and phone numbers.
All businesses face cyber threats. Almost every company has some kind of network, database or online presence that puts it at risk for a cyber breach. Smaller businesses can be more vulnerable than larger ones as they often use third-party hosting and information processing that can be an entry point for cyber attacks. By following various proactive efforts, companies can protect their employees, their clients, the products, and their intellectual capital.
Each year fraudsters are stealing millions of dollars through sophisticated fraudulent use of Email Compromise Scams targeted at individuals and employees who regularly perform wire transfers. The scam involves a fraudster creating a false email or alternatively, hacking into a real email account of an executive, business partner, employee or financial advisor in order to generate a fraudulent request for a transfer of funds. The email is normally well designed and appears legitimate. Stay protected and secure by following preventive measures and developing good security habits.