Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
We have the answers
Search Results
As the benefits and capabilities of the Internet of Things (IoT) accrue, so does the amount of data that must be collected, managed, and integrated with connected devices—and by enterprises everywhere. It’s a challenge that demands a new kind of digital trust and data sharing tradeoffs. For more insights from this IoT se...
The Internet of Things (IoT) has inspired unprecedented cooperation and coordination for the businesses and industries interested in ensuring a sustainable future for themselves. From the lens of eleven case studies, see how the IoT revolution is transforming the world in which we live in. For more insights from this IoT series, see:Part ...
The rise of the connected objects known as the Internet of Things (IoT) will rival past technological marvels, such as the printing press, the steam engine, and electricity. As IoT solves problems that have plagued businesses for decades, it will also create entirely new dilemmas across all sectors and for all industries. Concerns over privacy, cyb...
The Internet of Things (IoT) connects machines and devices to one another. Today’s devices have between 6 to 9 sensors capturing and transmitting data to help all industries become more efficient, productive and safer. The 2020 annual global economic potential across all sectors is estimated up to $14.4 trillion—that is the current GDP ...
The cloud is one of the largest drivers of emerging technology solutions, and for many organizations, it has become one of their most valuable information technology (IT) tools. It enhances data storage capabilities, security and agility to both scale up as well as scale down, while also reducing costs, in part due to its inherent flexibility and t...
Lawsuit awards can be incredibly high, and individuals known to have substantial assets are particularly vulnerable. In some cases, the high-stake lawsuits can cause devastating reputational damage. Given the risks and exposure, the need for holistic liability protection is an important issue. Learn the different types of liability i...
The disruptive political events and social unrest of 2016 may pose significant operational and strategic risk for businesses. With events at the ballot box and on the streets exposing flaws in the systems of liberalism and globalization, business leaders must think differently about priorities and risk management practices. In partnership with the ...
Last year, the Western world experienced the twin surprises of the UK’s vote to leave the European Union and Donald Trump’s victory in the U.S. presidential election. Elsewhere, geopolitics will play out in 2017 through numerous elections, the possibility of succession in several countries, continued economic polarization, and more. Mul...
The social and political volatility witnessed last year is rooted in trends and phenomena that have been building up for more than a decade. It has altered the political agenda in advanced economies and emerging markets alike. Companies need to think hard about the structural shifts that may confront them in five specific areas: security of company...
Political events in 2016 gave rise to increasing nationalism and populism globally. Combined with a global slowdown in economic and trade growth, international integration may already have plateaued and could begin to reverse over the coming decade. Multinational organizations should prepare for potentially significant implications by carefully con...
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
To manage wealth well requires understanding and responding wisely to risk. This white paper seeks to help readers gain insight into the heart of risk. It focuses not on technical measures of risk (beta, volatility, variance, and the like) but rather how successful individuals tolerate and manage risk day-to-day.
The economic turbulence over the past year has expanded the concept of risk from simple volatility to actual, and in some cases, permanent losses. While the impact on most financial vehicles is quite obvious and is presented through the news media on a daily basis, others are much more subtle. One such area is critical to the success of many wealth...
Anti-money laundering investigations have become complex, global efforts that may involve funding for terrorist networks. Navigant Consulting devotes an issue of its IQ quarterly publication to exploring AML compliance technology, the state of AML enforcement in the UK and the impact of money laundering inquiries on financial institutions. Navigant...