Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
We have the answers
Search Results
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
This guide reviews various ways to assess philanthropic impact. It looks at what assessment can accomplish and what it has difficulty measuring. It sets out a series of questions donors can ask as they consider how to proceed with their philanthropy. And finally, it details some of the limitations inherent in trying to understand exactly how donors...
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...
Despite the challenging economic headwinds and shockwaves of 2022 continuing to reverberate, there are silver linings for those who focus on planning for the long term. In looking ahead, we examine wealth planning strategies through the power of resilience from four different lenses: multigenerational families, business owners, women, and philanthr...
Across the world, philanthropy is undergoing a transformation that offers both exciting opportunities and complex challenges. With so much in flux, emerging donors and established funders are seeking new models not only for funding strategies and impact measures, but also for organizational design and management systems that will serve them well in...
A historic agreement was reached in 2015 when member states of the United Nations came together and signed “Transforming Our World: The 2030 Agenda for Sustainable Development,” which included a set of 17 Sustainable Development Goals (SDGs). The SDGs charted a way forward to a just, secure, and sustainable future for people and the planet. This...
Impact investing, which seeks to generate social and/or environmental benefits while delivering a financial return, is expanding as a promising tool for both investors and philanthropists. This guide is part of Rockefeller Philanthropy Advisors’ Philanthropy Roadmap series and acts as an introduction to impact investing. To consider the next ste...
Developing an impact investing strategy and taking subsequent action steps can be organized into three stages: Prepare, Build, and Refine. In this guide, which builds from the introductory guide on impact investing, the three phases are explored further to explain how to take practical steps towards implementing your first impact investment.
The way individuals are approaching philanthropy has evolved in recent years, with philanthropists taking the very best of the corporate world and adding more rigor and measurement to how they give back to social causes, reprioritizing how and where they invest, and going beyond financial contributions to direct both time and talent to their philan...
By implementing proactive controls, organizations can minimize the chance of falling victim to a ransomware attack. This guide explores these eight leading cybersecurity practices, with critical steps to take and tips to incorporate into your approach: Know your environment Keep your data backups safe Implement a patch management program Bu...
Cyberattacks are impossible to completely prevent and the consequences of a data breach can be devastating. In addition to information and finances lost, breaches can result in downtime and reputational damage that can set your company far behind competitors. If your organization has experienced a cyberattack, there are three things that can b...
The form of your giving must follow the function you intend for your philanthropy. Explore the vehicles and structures available to you and how to determine which best supports your philanthropic goals. This primer is the second in a series of seven about the Family Giving Lifecycle by the National Center for Family Philanthropy, comprising of s...