A discussion of pre-nuptial, post-nuptial or cohabitation agreements.
Resource Search
A checklist of things to avoid when taking out life insurance.
When a catastrophic event occurs and total loss and devastation ensues, the reality is that people may decide not to rebuild, and in some cases abandon their ‘property.’ While the choice remains with the owner of the property as to whether or not to repair, there are conditions within your insurance policy that you need to consider.
All modern vehicles are vulnerable to cyberattacks; particularly as “smart cars” become more prevalent, hackers have greater opportunities to penetrate, control, and steal information from vehicle systems. Learn about the types of cyber attacks that are prevalent with smart cars and what you can do to avoid them.
Remote work, IoT devices, and new technologies create risk for your personal data at home. Learn how you can mitigate these risks with this infographic.
This checklist and visual representation of a home is a helpful guide on how to protect your privacy while working from home. These simple tips can be a difference maker.
It is important for families to develop a comprehensive risk management strategy as they navigate the blessings and burdens, as well as the choices and challenges, that come with significant wealth. This piece focuses on the potential insurance risks and costs associated with life's milestones and possessions.
While China has denied engaging in espionage efforts as outlined in the joint warning from the U.S. and British law enforcement agencies, it is crucial for businesses to defend against the threat and the cybersecurity attacks that can come at any time from any nation state threat actors. Businesses of all kinds should consider immediate and ongoing actions to protect their intellectual property and critical infrastructure activities, beginning with reviewing patching policies and procedures.
Diving deep into the metrics from more than 1,270 data security incidents, this one-of-a-kind report features actionable insights and checklists to help companies improve their data security measures and operational resilience. Key findings reveal ransomware remains front and center; companies are becoming more resilient after making investments in security enhancements; a change in the risk landscape with the use of cloud assets; and e-crime continuing with a surge in wire fraud.
Cyber-attacks at all levels are not a new phenomenon, nor do the Russians have a monopoly on them. While the Russia/Ukraine crisis is at the forefront, it won’t be the last global event that family offices will need to address when cybersecurity is involved. Family offices, executives, and enterprises can take actions to help alleviate the cyber-attack risk when it comes to cyber retaliation from Russia or other state-sponsored cyber-attacks.