Cloud-based applications, also known as Software as a Service (SaaS), offer significant benefits. They are highly affordable, require minimal IT involvement, have no hardware requirements, and offer great flexibility. Yet there can be significant risks to a firm if it does not review vendors carefully. Unfortunately, security controls vary signific...
We have the answers
Search Results
Commercial agreements come in a variety of types, but most have certain common provisions that should be carefully reviewed in the context of the underlying transaction covered by the agreement. When entering or reviewing one of these agreements, it is important to address the five key provisions that sometimes go unnoticed or are not given proper ...
A significant step in the acquisition process is determining the structure of the deal. The two most common deal structures are: (1) the purchase of the ownership interests of the target (such as a stock deal), and (2) the purchase of substantially all of the target’s assets (or an asset deal). In an asset deal, the implication is that the ta...
The revolution of the “information age” has created tremendous advantages and helped accelerate innovation, but it has also brought with it new risks—namely cyber attacks. While the corporate attacks get most of the media attention, do not forget that individuals—especially the high net worth—need to be vigilant about cyber security. The good news ...
News reports show large-scale data breaches are on the rise and affecting large retailers and even consumer credit organizations. There are numerous categories of cyber crime, but the ones that affect the most victims include identity theft, credit card fraud, and social networking scams. However, there are actions you can take to better protect yo...
Estate-planning advisors should be aware that there are many creative planning opportunities for the use of Private Placement Life Insurance (PPLI) with trusts. PPLI is essentially a flexible premium variable universal life insurance transactions that occurs within a private placement offering. Previously, PPLI hadn’t been as appealing due to...
Business impersonation scams are a large and growing risk for high-net-worth individuals, closely held business owners, and institutions. Scams have claimed victims in all 50 states and more than 100 countries and there is every reason to believe the threat is growing. Learn seven steps that can help you protect yourself and your business from impe...
Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
As the benefits and capabilities of the Internet of Things (IoT) accrue, so does the amount of data that must be collected, managed, and integrated with connected devices—and by enterprises everywhere. It’s a challenge that demands a new kind of digital trust and data sharing tradeoffs. For more insights from this IoT se...
The Internet of Things (IoT) has inspired unprecedented cooperation and coordination for the businesses and industries interested in ensuring a sustainable future for themselves. From the lens of eleven case studies, see how the IoT revolution is transforming the world in which we live in. For more insights from this IoT series, see:Part ...
The rise of the connected objects known as the Internet of Things (IoT) will rival past technological marvels, such as the printing press, the steam engine, and electricity. As IoT solves problems that have plagued businesses for decades, it will also create entirely new dilemmas across all sectors and for all industries. Concerns over privacy, cyb...
The Internet of Things (IoT) connects machines and devices to one another. Today’s devices have between 6 to 9 sensors capturing and transmitting data to help all industries become more efficient, productive and safer. The 2020 annual global economic potential across all sectors is estimated up to $14.4 trillion—that is the current GDP ...
The cloud is one of the largest drivers of emerging technology solutions, and for many organizations, it has become one of their most valuable information technology (IT) tools. It enhances data storage capabilities, security and agility to both scale up as well as scale down, while also reducing costs, in part due to its inherent flexibility and t...
Lawsuit awards can be incredibly high, and individuals known to have substantial assets are particularly vulnerable. In some cases, the high-stake lawsuits can cause devastating reputational damage. Given the risks and exposure, the need for holistic liability protection is an important issue. Learn the different types of liability i...
The disruptive political events and social unrest of 2016 may pose significant operational and strategic risk for businesses. With events at the ballot box and on the streets exposing flaws in the systems of liberalism and globalization, business leaders must think differently about priorities and risk management practices. In partnership with the ...