From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
We have the answers
Search Results
Going on the internet can put your devices and personal details at risk from unexpected online threats like malware and ransomware. Learn about the threats and see some internet safety tips to help keep your devices and data safe when you browse online.
As many as 20% of family offices have knowingly experienced a cyber security attack prior to the coronavirus pandemic, and it’s likely that number is significantly higher today. Learn how to build cyber protection from the surge in cybercrime, including how to reduce your digital footprint and what to do if you become a victim of a cyber breach. Pr...
As the world becomes more digitally connected, cybersecurity risks will keep rising. The larger your digital footprint, the greater your cyber risk. With this self-defense guide and best practices by William Blair & Company, you can safeguard your online identity and protect yourself against the loss of personal data and assets.
Under the Tax Cuts and Jobs Act of 2017, the federal estate tax exemption was temporarily doubled through December 31, 2025. Effective January 1, 2026, the exemption limits are scheduled to be reduced by half, adjusted for inflation. Charting the change and inflation adjustment, the projected limits are provided for your tax and estate plannin...
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...
How can an organization be confident it is agile enough to react to the unknown and the evolving risk landscape? One of the best ways is by establishing a strong risk culture. In this e-book, Baker Tilly practitioners take a closer look at some of the critical risks that organizations are dealing with now, how those risks have evolved in recent yea...
This guidebook takes a critical look at significant challenges and opportunities in family office operations and offers comprehensive guidance with a future-focused lens. Gain expert insight, strategies, and best practices on the top-of-mind issues that include strengthening your cybersecurity, leveraging your technology, the role of the chief inve...
Families with the means and flexibility to choose where they live, particularly those anticipating a liquidity event or a life change such as retirement may be looking for a more tax advantageous place to call home. Changing your tax residency has many potential positives, but it’s not as simple as filing a change of address with the U.S Postal Ser...
Before changing your residency to a new state for income tax purposes, consider the items outlined in this checklist. For additional insights, read more on how to successfully change your tax residency.
Cyber security is a subject that continues to make headlining news. Because every business is at risk of a cyberattack, it’s important to know what types of threats your business could be subject to and understand the techniques you can implement to help prevent attacks from happening.
Identity theft occurs when personal information about an individual is stolen and used typically for financial gain. Criminals can obtain personal information electronically through hacking or illegally purchasing information from the Deep Web/Dark Web. They can also obtain information through paper records that are not properly disposed of or secu...
The complex, convergent nature of risks facing high-net-worth families requires family offices to adopt both a holistic and strategic approach to risk management than many have in the past. The ones who can make the change will be best positioned to successfully navigate the challenges that range from overarching trends of growing families to incre...
By implementing proactive controls, organizations can minimize the chance of falling victim to a ransomware attack. This guide explores these eight leading cybersecurity practices, with critical steps to take and tips to incorporate into your approach: Know your environment Keep your data backups safe Implement a patch management program Bu...
Sometimes, portfolios are so focused on returns that tax efficiency gets pushed to the back burner. But proposed changes to tax law under the Biden administration—and the related debates—have brought renewed focus to the tax impact of portfolio decisions. That makes now a good time to review some of key techniques to help manage your investment tax...