It is important for families to develop a comprehensive risk management strategy as they navigate the blessings and burdens, as well as the choices and challenges, that come with significant wealth. This piece focuses on the potential insurance risks and costs associated with life's milestones and possessions.
Resource Search
While China has denied engaging in espionage efforts as outlined in the joint warning from the U.S. and British law enforcement agencies, it is crucial for businesses to defend against the threat and the cybersecurity attacks that can come at any time from any nation state threat actors. Businesses of all kinds should consider immediate and ongoing actions to protect their intellectual property and critical infrastructure activities, beginning with reviewing patching policies and procedures.
Diving deep into the metrics from more than 1,270 data security incidents, this one-of-a-kind report features actionable insights and checklists to help companies improve their data security measures and operational resilience. Key findings reveal ransomware remains front and center; companies are becoming more resilient after making investments in security enhancements; a change in the risk landscape with the use of cloud assets; and e-crime continuing with a surge in wire fraud.
On August 24, 2022, the California Attorney announced a settlement with Sephora, Inc. that included a fine of $1.2 million for alleged violations of the California Consumer Privacy Act (CCPA). The settlement is important because it makes clear that the use of analytics, advertising cookies, and other automatic data collection technologies are a "sale" under the CCPA. Businesses that are subject to the CCPA (and the upcoming CPRA) should immediately review their CCPA compliance to minimize being a potential target of further enforcement actions.
Ransomware is one of several common cybersecurity risks companies face today. In addition to being a victim of a cyber attack, these companies may become the target of lawsuits alleging a variety of harms, including failure to deliver contractual promises and negligent cybersecurity practices. By being prepared and employing practical strategies, companies can safeguard against a ransomware attack and mitigate other cybersecurity risks.
Corporate insiders pose a unique threat as they are given privileged access to the company’s assets and are trusted to use that access responsibly and ethically. However, this can go awry in several ways, from unintentional, negligent acts to intentional, malicious acts. To help prevent, detect, and respond to that threat, it’s important to address the three key risks when evaluating your Insider Threat Program.
Environmental, social, and governance (ESG) has become the next frontier in risk mitigation and long-term value creation. While ESG introduces high-stakes responsibilities for the board, it rests on the same overriding principles of traditional governance, including communicating execution of a strategy in alignment with corporate purpose, vision, and values. Forward-thinking boards will lean into ESG and view it is as an opportunity to improve business resilience while contributing to the greater benefit of all stakeholders.
The COVID-19 pandemic has led to an acceleration of adoption of cloud solutions and other remote access tools. However, hasty adoption of any new technology that is not combined with robust security frameworks, policies, and controls can leave businesses vulnerable. A formal vendor management process and having specific controls in place can mean the difference between a cloud solution being a huge advantage to agile solutions or leaving the business open to attacks and unauthorized access.
Organizations across the wealth management landscape face an array of technology risks that are growing more prominent in a post-COVID environment. While keeping an eye on the future and building resiliency, learn how to turn five tech risks—including the rise of disruptive technologies—into an opportunity that goes beyond adopting the right technology.
The more we use social media to share updates, pictures and videos with friends and family, the easier it can be for cybercriminals to steal our information. See how you can use social media safely to protect yourself and your private information from cybercriminals.