Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
We have the answers
Search Results
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
Taking affirmative steps to move one’s property and connections out of their old home is critical to avoiding undesired consequences, such as dual domicile treatment or taxation by another state. This checklist identifies primary and secondary factors that should be considered when establishing domicile in a new state for income tax purposes.
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Under the Tax Cuts and Jobs Act of 2017, the federal estate tax exemption was temporarily doubled through December 31, 2025. Effective January 1, 2026, the exemption limits are scheduled to be reduced by half, adjusted for inflation. Charting the change and inflation adjustment, the projected limits are provided for your tax and estate plannin...
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...
This guidebook takes a critical look at significant challenges and opportunities in family office operations and offers comprehensive guidance with a future-focused lens. Gain expert insight, strategies, and best practices on the top-of-mind issues that include strengthening your cybersecurity, leveraging your technology, the role of the chief inve...
Families with the means and flexibility to choose where they live, particularly those anticipating a liquidity event or a life change such as retirement may be looking for a more tax advantageous place to call home. Changing your tax residency has many potential positives, but it’s not as simple as filing a change of address with the U.S Postal Ser...
Before changing your residency to a new state for income tax purposes, consider the items outlined in this checklist. For additional insights, read more on how to successfully change your tax residency.
By implementing proactive controls, organizations can minimize the chance of falling victim to a ransomware attack. This guide explores these eight leading cybersecurity practices, with critical steps to take and tips to incorporate into your approach: Know your environment Keep your data backups safe Implement a patch management program Bu...
Sometimes, portfolios are so focused on returns that tax efficiency gets pushed to the back burner. But proposed changes to tax law under the Biden administration—and the related debates—have brought renewed focus to the tax impact of portfolio decisions. That makes now a good time to review some of key techniques to help manage your investment tax...
Cyberattacks are impossible to completely prevent and the consequences of a data breach can be devastating. In addition to information and finances lost, breaches can result in downtime and reputational damage that can set your company far behind competitors. If your organization has experienced a cyberattack, there are three things that can b...
With the accelerated pace of technology advancements in addition to tax policy changes that require tax teams to synthesize immense amounts of data, tax departments must fully embrace technology to be able to deliver valuable insights and tax planning strategies. This Tax Innovation Guide outlines how to modernize and future-proof yo...
As new and established tax provisions shape the current tax environment, it’s clear that understanding the landscape of tax law changes and expiring tax credits is key as a high-income taxpayer or business owner preparing for year-end. With this year-end tax guide, you’ll find useful insights, data, and instructive planning information on income an...