Families of wealth and business-owning families face security risks in their everyday lives, where personal and business risks are often blended and are typically managed by different people and processes. This creates a gap in identifying risks and solutions that can be addressed through a holistic and collaborative risk management approach. With ...
We have the answers
Search Results
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
Black swan events—like the 2008 financial crisis and the COVID pandemic—often come with high velocity and are slow to recover. While these events are difficult to predict, the best way to get ready for the next crisis is with extreme preparation. Looking ahead with intentional risk management, here are 8 ways to prepare your business, family enterp...
Cybercriminals have migrated their attacks from larger businesses and hardened targets to private wealth clients and family offices, where the defenses are low or non-existent. In this webcast, hear from Dr. Chris Pierson, CEO of BLACKCLOAK, a Concierge Cybersecurity & Privacy Protection Platform that represents private wealth and family office...
While there are many items family offices should look for in technology solutions, one vital component is reporting capabilities. For family offices considering a move to Sage Intacct, there are five reporting advantages you can count on to help deliver the data and transparency that are important to the family members.
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
Third-party vendors can range from custodial companies, to IT services, to professional service firms. Whatever their contracted function, they have access to your physical premises and/or your network data. So how can you make sure that when you’re signing a contract with an outside vendor, you’re not exposing yourself and your clients to excessiv...
From Australia to United States and many places in between, this Global Employer Guide reflects an easy-to-read summary of employment law that changed in each country over the past year, including pandemic-related changes where applicable. Visa processes, employee rights, contract requirements, transfer of business considerations, privacy standards...
Families hire family office staff with the expectation that the office keeps their information, assets, and reputation protected. To safeguard the families’ interests, it’s critical for family offices to ensure that internal controls take the pragmatic approach, starting with four main areas: segregation of duties, transaction volume, managing comp...
Potential drains on business efficiency include groups of remote workers unable to communicate well with one another, tools that make it hard to adapt to changes or new needs, and the high cost of equipment and IT personnel. Integrating cloud-based solutions address these areas, including better workflow and collaboration and document management. I...
If you find your family office or growing business suffering from a lack of support in the technology department, then you may benefit from outsourcing IT. While some struggle to find room in the budget to add support staff, there are others continually adding staff only to realize they are unable to keep up with demand. An alternative to those iss...
Cyber security is a subject that continues to make headlining news. Because every business is at risk of a cyberattack, it’s important to know what types of threats your business could be subject to and understand the techniques you can implement to help prevent attacks from happening.
Cyberattacks are impossible to completely prevent and the consequences of a data breach can be devastating. In addition to information and finances lost, breaches can result in downtime and reputational damage that can set your company far behind competitors. If your organization has experienced a cyberattack, there are three things that can b...
As family offices expand their technology footprint, cyberattacks are rising. Hackers continue to refine their approaches, but security controls and proactive planning can strengthen your family office cybersecurity defenses. Initially, focus on the key action items to validate your existing security setup and inform your plans to address any short...
Wealthy families have always faced complex risk management issues, but it is particularly challenging when facing soaring inflation, regulatory uncertainty, rising cybercrime rates, and increasingly severe natural disasters. These market stressors impact all sectors of the insurance market, making it more expensive and challenging for affluent fami...