Your fellow FOX members have contributed these financial statements and reporting documents. Please note that these samples have been provided for illustrative purposes only, and may not represent the latest versions at the organizations listed. For additional examples, see Financial Reporting in the Family Office: Elevating the Conversation and the Best Practices in Reporting Toolkit.
Resource Search
Your fellow FOX members have contributed these travel planning tools and samples. Please note that these samples have been provided for illustrative purposes only, and may not represent the latest versions at the organizations listed.
Your fellow FOX members have contributed these human capital tools and samples. Please note that these samples have been provided for illustrative purposes only, and may not represent the latest versions.
Your fellow FOX members have contributed these document management tools and samples. Please note that these samples have been provided for illustrative purposes only, and may not represent the latest versions.
Your fellow FOX members have contributed these human capital tools and samples. Please note that these samples have been provided for illustrative purposes only, and may not represent the latest versions.
Your fellow FOX members have contributed these technology operations and data security tools and samples. Please note that these samples have been provided for illustrative purposes only, and may not represent the latest versions at the organizations listed.
As the COVID-19 vaccine becomes a larger part of the national conversation, employers will need to assess and/or develop a vaccination policy and plan. Employer-driven vaccination programs require a thorough understanding of employment law, compliance, employee well-being and education. This e-book covers employment law considerations and explains the specific limitations that pertain to requiring employees to be vaccinated.
Strong cybersecurity for protecting sensitive client data is a critical capability for any Registered Investment Advisor firm. In 2013, Hardy Reed—one of the first firms to earn the Center for Fiduciary Excellence certification—considered cloud services as an option for its IT needs. They wanted to look at alternate options to replacing their in-house server. Two factors were particularly important: heightened security concerns for protecting client information and the need to enable advisors and staff to serve clients while on the road.
Cybercriminals targets the financial industry 300 times more frequently than any other industry, resulting in mega breaches and millions of records stolen through hacktivism, malware, social engineering, phishing, and other applications. The harsh consequences of remaining vulnerable to cybersecurity breaches are costly, and the number one threat to cybersecurity is the uninformed employee. As cybercrime becomes commonplace, it’s essential to learn about the current cybersecurity landscape, the tools a financial firm needs, and best practices for keeping your firm protected.
Recognize that a cyber attack will occur at some point during a business lifecycle. Whether it is through web attacks, email phishing, exploit kits, point of sale, keystroke logging, or ransomware, the bad actors have figured out how to defeat your latest defense against a cyber attack. They know what will make you click on the link that will give them the beachhead into your computer system.