Affluent individuals and families are increasingly becoming targets of criminal activity, such as stalking, kidnapping, theft, harm and vandalism. Does your family use any wireless communication devices? Do you regularly check for spyware on your computers? How do you dispose of sensitive information? These are just some of the potential vulnerabil...
We have the answers
Search Results
The key to any successfully operated wealth management organization depends on having the right talent in the right role. This 2010 FOX Fall Forum session includes a discussion of findings from recent FOX research that focuses on critical talent issues, such as recruiting, compensation and team structure. In addition, a family office executive will...
Compensation and benefits often represent more than 50% of expenses for multifamily offices and wealth advisor firms. In this presentation from the 2009 FOX Wealth Advisor Forum, you will learn the best ways that firms can source talent and structure short and long-term compensation to ensure staff continuity and firm profitability.
Find out what new products are available to family office executives to better respond to the needs of increasingly complex offices. in this 2009 Financial Executives Forum presentation, discover ways to more effectively utilize existing technology to improve business processes needed to fulfill the functions of a family office.
Avoid the pitfalls presented by employing domestic staff with practical advice from Teresa Leigh, founder of Teresa Leigh Household and Property Management in this 2009 FOX Financial Executives Forum session.
In this 2009 FOX Fall Forum presentation, Ellen Perry outlines four ways in which families of significant wealth can enhance their human capital, developing the skills and talents of the younger generation, strengthening family ties and enabling individual members and families as a whole to flourish for multiple generations.
So, you need to hire someone to work at your home—a housekeeper, a chef, or a personal assistant. You have decided not to contract these services to a local company, and your family office does not hire staff for you. It is up to you to fill this position. Before letting a stranger into your home, it is important to understand the domestic em...
In the last few years, hackers and cyber criminals have become much more sophisticated in how they steal private information, which has led to massive data breaches. These data breaches not only cost an organization hundreds of thousands of dollars in fixes and possible fines, they can ruin a long-established reputation in a matter of hours. Puttin...
Bring Your Own Device (BYOD) policies are becoming more and more popular, and with good reason. As the capabilities of tablets and smartphones continue to rapidly expand, the mobility revolution has been a boon for businesses and employees alike, enabling greater productivity and more flexibility. BYOD amplifies those efficiency gains, reducing adm...
Vulnerability assessments and penetration testing may uncover areas where hackers can break in, but what if they are already there? Cyber Hunting is a proactive strategy to identify if anyone is already on your network versus waiting for an actual breach to occur. Most breaches occur weeks or even months after the attacker gets a foothold on the ne...
For American companies who do business in Europe or who process the personal data of EU residents, the world of data privacy and security is about to get much more complicated. While U.S. privacy law is unsettled, with rapidly proliferating state and federal laws and regulations and uncertainty as to how strictly they will be enforced, the rules in...
Financial reports and other real-time operational data are often lagging indicators of performance. These metrics, although perhaps lacking precision, may have been sufficiently effective in the past; however, they are less so now because they lag the current cadence of information dissemination and business volatility today. The challenge for many...
Cyber risk has moved from the IT department to a full-fledged enterprise risk. Unfortunately, a cyberattack can hit a company at any time. There are, however, practical, actionable steps to ensure that when a cyberattack hits, your company and board will be both ready to address the threat and resilient enough to recover from it. Leveraging a flexi...
Due diligence often focuses heavily on financial and operational issues. Often the new or combined organization’s cybersecurity does not receive the attention it deserves. As a result it places the company at risk from a cyber incident, which can detrimentally impact the organization’s reputation and financial security. The risk is high...
Now that The Tax Cuts and Jobs Act (the Act) has been signed into law, you may be wondering what this means for you and your family. The Act is broad in scope and will change the tax rules for individuals and businesses in 2018 and beyond. When thinking about the impact of the Act on you, your family, and your business, it’s important to reme...