Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
We have the answers
Search Results
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...
As family offices have grown in number, size and sophistication, they have increasingly looked to invest directly. Largely, the pursuit of direct investing opportunities has been driven by several factors, including the desire for increased control, better alignment of interests, reduced fees and expenses, and higher returns. While the appeal of di...
By implementing proactive controls, organizations can minimize the chance of falling victim to a ransomware attack. This guide explores these eight leading cybersecurity practices, with critical steps to take and tips to incorporate into your approach: Know your environment Keep your data backups safe Implement a patch management program Bu...
Cyberattacks are impossible to completely prevent and the consequences of a data breach can be devastating. In addition to information and finances lost, breaches can result in downtime and reputational damage that can set your company far behind competitors. If your organization has experienced a cyberattack, there are three things that can b...
As noted in The New Family Office 5.0 Model, a rising number of family offices are allocating resources to direct investments, including building an in-house direct investment function to gain greater control, better diversification, increased flexibility, and income and estate tax benefits. From generating deal flow to due diligence, key cons...
For leaders of founder-owned companies, simply making the decision to sell or bring in an outside investor can be anxiety inducing. The transaction process itself is often filled with apprehensive moments—arguably none more so than the potential of sensitive information leaking. This primer helps business owners understand how to avoid leaks, how t...
The growth of ChatGPT and other artificial intelligence (AI) tools is not slowing down. From small startups to multinational corporations, employees across the spectrum are leveraging ChatGPT to enhance their productivity and streamline their workflows. Given the potential risks—including confidentiality and personal data and privacy violations—ass...
While there are predictions of a recession amid a looming economic downturn, there are opportunities for investors to acquire distressed assets as part of their direct investing or mergers and acquisitions plan. In this 10-minute interview, attorney Tom Scannell highlights some of the issues potential buyers may face as they look at financially-dis...
With the increasingly complex patchwork of state privacy laws and regulatory compliance requirements, businesses operating in regulated industries, particularly in the financial services and healthcare sectors, need to ensure they are paying close attention to the details of the exemptions. Key differences in the exemptions built into these new sta...
Focusing on how companies are implementing enhanced security as the attacker-defender struggle continues, this Report dives into the 9 key takeaways along with other cutting-edge topics related to the data life cycle. While ransomware attacks decreased dramatically during 2022, they were again on the rise at the end of 2022 into 2023. Business emai...
Fraud is happening at your organization; you just don’t know it. Then again, maybe you do, but you are not sure how pervasive the problem is, where to begin your anti-fraud journey, or how to enhance your current fraud risk management practices. This playbook—which includes templates, checklists, and tools—draws from best practices and leading guid...