Over the past 30 years, families have worked hard and invested enormous resources to create the plans and structures that promise to carry the family into the future and ensure its long-term success. The vast majority of these investments have focused on the quantitative disciplines that serve the family’s financial capital – the collective discipl...
We have the answers
Search Results
Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
This fireside chat will focus on the challenges that family offices are facing today and how to maximize insight into financials. We will identify solutions that Sage Intacct can offer to help streamline your multi-entity management, data security, and transaction automation with artificial intelligence and machine learning technology. Karen M. ...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
We have all been the new person at some point or another—the new person on the block, the freshman at the big university, a manager in a new office. In such hard-to-navigate situations, training and communications are integral parts of the on-boarding process. When both employee and employer are informed about one another’s needs, personalities, an...
For all the risks that tend to step up as you age, there are also far more opportunities to live life the way you want to, and probably longer and in reasonable health. What will help smooth the transition through the stages of aging will be a proactive approach to managing potential roadblocks on the way. As you begin this journey, the more aware ...
Sometimes, unfortunately, a trip to the hospital is unforeseen and unplanned. Often, however, procedures and elective surgery are scheduled in advance. If this is the case for you or a loved one, planning ahead for a hospital stay and taking a few simple steps can ensure greater comfort and a faster recovery. This is important for everyone, but esp...
Hiring domestic staff such as nannies, personal assistants, and housekeepers can expose you to liability issues and danger from unscrupulous employees. It is important to understand your areas of vulnerability and take steps to protect your family and your finances. Whether you hire your own employees or the family office hires them, three often ov...
While many individuals may have the skills and experience for a private staffing position, it’s the chemistry and having a system in place that makes it work for all parties. With this guide that includes job descriptions and requirements, discover the actionable insights and best practices for optimizing your private staff throughout the hiring pr...
Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...
Taking on the role of a direct household employer can be complicated—even for households with a single employee. This guide includes best practices for navigating the complex environment of household employment and provides practical advice on how to avoid the legal, financial, and reputational consequences associated with non-compliant employment.