Risk Management at FOX is focused on all aspects of risk for its membership including families, family offices, operating companies, and advisor organizations. FOX hosts a quarterly meeting comprised of different vendors and thought leader specialists whose focus is in the areas of Cybersecurity, Physical Security, Personal Security, Insurance, Gov...
We have the answers
Search Results
FOX Technology Resource Partners act as both core and peripheral services and solutions for the community and membership including families, family offices, operating companies, and advisor organizations. FOX hosts a monthly meeting comprised of different thought leader specialists whose focus is in the areas of technology including software, data ...
Wealth advisors continue to experience rapid growth, which on its face is positive – but firms can get into trouble if growth is not properly managed. Join a panel of experienced wealth advisors explaining the ins and outs of effectively managing growth. Topics discussed include identifying the right clients for your business, creating efficiencies...
This fireside chat will focus on the challenges that family offices are facing today and how to maximize insight into financials. We will identify solutions that Sage Intacct can offer to help streamline your multi-entity management, data security, and transaction automation with artificial intelligence and machine learning technology. Karen M. ...
Burdened by manual, routine, and inefficient processes, your high-value employees are left doing low-value work. Not because they are poor performers; ironically, quite the opposite is true— they are extremely efficient at executing inefficient processes. But, what would their output be if you were to streamline and automate these processes? Imagin...
Statistics show that teenagers are more likely than any other age group to be in an automobile accident. In several tragic incidents, the use of a cell phone was involved. Some accidents, however, simply reflected the teenagers’ lack of driving experience. As a parent, you can help your teenager become a safe and skilled driver by setting a good ex...
Families of wealth and business-owning families face security risks in their everyday lives, where personal and business risks are often blended and are typically managed by different people and processes. This creates a gap in identifying risks and solutions that can be addressed through a holistic and collaborative risk management approach. With ...
Vulnerability and personal security risks can be greatly reduced by following five basic principles of security at all times—awareness, low profile, unpredictable routine, communication, and layers of security. Based on those principles, these guidelines are designed to give practical advice on safety and security to anybody who is living in or tra...
Lawsuit awards can be incredibly high, and individuals known to have substantial assets are particularly vulnerable. In some cases, the high-stake lawsuits can cause devastating reputational damage. Given the risks and exposure, the need for holistic liability protection is an important issue. Learn the different types of liability i...
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
While there are many items family offices should look for in technology solutions, one vital component is reporting capabilities. For family offices considering a move to Sage Intacct, there are five reporting advantages you can count on to help deliver the data and transparency that are important to the family members.
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
Third-party vendors can range from custodial companies, to IT services, to professional service firms. Whatever their contracted function, they have access to your physical premises and/or your network data. So how can you make sure that when you’re signing a contract with an outside vendor, you’re not exposing yourself and your clients to excessiv...
Going on the internet can put your devices and personal details at risk from unexpected online threats like malware and ransomware. Learn about the threats and see some internet safety tips to help keep your devices and data safe when you browse online.
From Australia to United States and many places in between, this Global Employer Guide reflects an easy-to-read summary of employment law that changed in each country over the past year, including pandemic-related changes where applicable. Visa processes, employee rights, contract requirements, transfer of business considerations, privacy standards...