Risk Management at FOX is focused on all aspects of risk for its membership including families, family offices, operating companies, and advisor organizations. FOX hosts a quarterly meeting comprised of different vendors and thought leader specialists whose focus is in the areas of Cybersecurity, Physical Security, Personal Security, Insurance, Gov...
We have the answers
Search Results
Statistics show that teenagers are more likely than any other age group to be in an automobile accident. In several tragic incidents, the use of a cell phone was involved. Some accidents, however, simply reflected the teenagers’ lack of driving experience. As a parent, you can help your teenager become a safe and skilled driver by setting a good ex...
There are few issues in family business that create more conflict and tension than the employment of family members. The complexities involved and the breakdowns in communication and trust can contribute significantly to the alarmingly high rate of failed intergenerational transitions in family business. The good news is that there is a way for fam...
Families of wealth and business-owning families face security risks in their everyday lives, where personal and business risks are often blended and are typically managed by different people and processes. This creates a gap in identifying risks and solutions that can be addressed through a holistic and collaborative risk management approach. With ...
Vulnerability and personal security risks can be greatly reduced by following five basic principles of security at all times—awareness, low profile, unpredictable routine, communication, and layers of security. Based on those principles, these guidelines are designed to give practical advice on safety and security to anybody who is living in or tra...
Lawsuit awards can be incredibly high, and individuals known to have substantial assets are particularly vulnerable. In some cases, the high-stake lawsuits can cause devastating reputational damage. Given the risks and exposure, the need for holistic liability protection is an important issue. Learn the different types of liability i...
Third-party vendors can range from custodial companies, to IT services, to professional service firms. Whatever their contracted function, they have access to your physical premises and/or your network data. So how can you make sure that when you’re signing a contract with an outside vendor, you’re not exposing yourself and your clients to excessiv...
Going on the internet can put your devices and personal details at risk from unexpected online threats like malware and ransomware. Learn about the threats and see some internet safety tips to help keep your devices and data safe when you browse online.
If you find your family office or growing business suffering from a lack of support in the technology department, then you may benefit from outsourcing IT. While some struggle to find room in the budget to add support staff, there are others continually adding staff only to realize they are unable to keep up with demand. An alternative to those iss...
Each family’s legacy is as unique as the family itself. It can be a bloodline, a name, heirlooms, a legal entity or family stories, myths, and artifacts. In this fourth and final report in the series on family business succession, key insights are shared on the important role that legacies play in uniting the core purpose of the business with the f...
Sustainability is now a business imperative across the world, as much as it is a stewardship one, and those companies that fail to adapt may struggle to compete in a new, low-carbon environment. Fortunately, for many family businesses, the drive for sustainability is already a road well-traveled. Their experiences and the progress they’re making on...
Strategy is often thought of as an art form—an unstructured, intuitive exercise propelled by inspiration and brilliance. However, just like finance, operations, or marketing, strategy is a functional discipline with tools, frameworks, processes, best practices, and metrics. This checklist is end-to-end process for developing and executing a comp...
Fraud is happening at your organization; you just don’t know it. Then again, maybe you do, but you are not sure how pervasive the problem is, where to begin your anti-fraud journey, or how to enhance your current fraud risk management practices. This playbook—which includes templates, checklists, and tools—draws from best practices and leading guid...
By exploring the essence of legacy and its impact on business performance, this report brings together the detailed analysis, academic insights, and the firsthand experiences of family business CEOS to contribute to a deeper understanding of the importance of balancing tradition and innovation for long-term success in family businesses. From this r...
The concept of transferring ownership of a private business to a purpose trust was first popularized when the Patagonia transaction was announced—instead of “going public,” they were “going purpose” to allow the owner to monetize his stake in the business while at the same time ensure that the values of the business are preserved for future generat...