The federal government proposed sweeping new tax rules earlier this month that would dramatically affect family businesses, investment partnerships and other entities. These rules, which could become final and binding as early as the end of 2016, would artificially inflate the value of interests in family entities for gift and estate tax purposes. Families should now consider whether to accelerate their plans to transfer family business and investment assets ahead of these rules.
Resource Search
Cloud-based applications, also known as Software as a Service (SaaS), offer significant benefits. They are highly affordable, require minimal IT involvement, have no hardware requirements, and offer great flexibility. Yet there can be significant risks to a firm if it does not review vendors carefully. Unfortunately, security controls vary significantly from one SaaS provider to the next. Knowing what to look for when selecting SaaS vendors and implementing sound security measures will help protect your firm against a data breach and the significant repercussions that come with it.
Business impersonation scams are a large and growing risk for high-net-worth individuals, closely held business owners, and institutions. Scams have claimed victims in all 50 states and more than 100 countries and there is every reason to believe the threat is growing. Learn seven steps that can help you protect yourself and your business from impersonation and other types of fraud.
The holidays are approaching and to make it a more relaxed and enjoyable season, it helps to plan in advance and know the best practices for holiday planning, entertaining, gift giving, entertaining, and decorating.
Purchasing a wealth management technology solution is a significant business decision for your firm. You have likely been tasked with sourcing a platform that meets the needs of your principals, your team and your stakeholders. The solution should support your internal accounting, investment management and reporting functions while streamlining your firm’s day-to-day operations. As an executive, where should you begin? To assist you in the research, there are more than 50 questions to help guide through the process of finding the right solution for your firm.
When former First Lady Nancy Reagan passed away in March 2016, millions of Americans mourned the loss. While the events honoring Mrs. Reagan unfurled seamlessly, a dedicated team was hard at work behind the scenes to ensure the funeral was being conducted to Mrs. Reagan’s expressed desires. The preparations and demands of the funeral may seem extreme, but many of Mrs. Reagan's concerns apply to other families of wealth and should be addressed.
Most family offices that serve U.S. families are well aware that special planning considerations can arise when a U.S. citizen family member marries a noncitizen. Should the client’s estate plan be revised to incorporate a qualified domestic trust (QDOT) to ensure that assets passing to the surviving noncitizen spouse qualify for federal estate tax marital deduction?
The COVID-19 pandemic has led to an acceleration of adoption of cloud solutions and other remote access tools. However, hasty adoption of any new technology that is not combined with robust security frameworks, policies, and controls can leave businesses vulnerable. A formal vendor management process and having specific controls in place can mean the difference between a cloud solution being a huge advantage to agile solutions or leaving the business open to attacks and unauthorized access.
With the IRS increasing their funding and enforcement, upper income taxpayers should expect the IRS audit coverage to increase dramatically on them. It’s important to prepare for the tax changes that are coming—and coming quickly. Along with having a team of professionals on your side, there are steps you can take to protect yourself. Now is the time to review and perhaps recalibrate your risk tolerance for tax strategies.To learn more about the coming changes, listen to the podcast recording here with Waller’s Leigh Griffith.
The more we use social media to share updates, pictures and videos with friends and family, the easier it can be for cybercriminals to steal our information. See how you can use social media safely to protect yourself and your private information from cybercriminals.