During the Great Resignation, retaining talent has become a big challenge for many employers who know that losing talent can be costly and high-performing employees are difficult to replace. While employees may leave if they are underpaid relative to the market, it is rarely the sole reason for leaving an employer. As companies think about ret...
We have the answers
Search Results
Eton Solutions discusses how to mitigae cyber secuirty breaches in family offices.
Facing more frequent and intense cyber threats, it’s vital that businesses are prepared for the attacks. In this episode of Marsh’s Risk in Context podcast, learn how organizations can build effective cyber incident and ransomware management plans and the actions they can take before, during, and after an attack. An important piece of y...
The Family Office 5.0 model is changing how advisors deliver services. Strategic partnerships can help family office service providers better focus on delivering core value-added offerings. A roadmap toward that goal will help you meet the evolving needs of family offices and provide best-in-class services.
Family offices are often tasked with managing a family’s philanthropy but may have limited knowledge and resources. Several best practices can help both families and family offices lead philanthropic efforts to heighten their impact.
While the labor market remains volatile with the persistence of America’s Great Resignation, businesses face novel challenges to make sure they attract and retain the workforce they need to sustain and grow. From the findings in the State of Work in America survey, a number of areas are identified to help companies succeed in the “...
Having a good cyber risk management program in place might help a company prevent some breaches. But more importantly, when a breach does happen, it can help companies get back on their feet faster and mitigate financial and reputational damage. How do you know whether your company is doing what it should to address the risk and become cyber resili...
An increasing problem facing employers is the threat of class action lawsuits related to their use of background checks. In these lawsuits, plaintiffs claim that employers are violating a federal statute called the Fair Credit Reporting Act (the “FCRA”), which regulates, among other things, an employer’s use of background checks p...
In this webcast, experts from Marsh’s Cyber Practices take a closer look at how changing cyber risk exposures, regulations, and best practices will change the cyber risk management landscape in 2019. Download and view the Cyber Landscape 2019 slides as you listen to the discussion that includes:The impact of new regulations and laws on the wa...
No matter your industry, your company is a data company and for that reason, we are in a post-data world. Gen Z—your future customers and future employees—are already digital and they control over $100 billion in consumer spending today. In this video series, learn how to adopt a strategy that treats your data as the pre-tangible a...
Privacy and data security are issues that every company needs to pay attention to. But how do companies comply with all the various laws between Europe with the GDPR and in California with the California Consumer Privacy Act? In this video series on data management best practices and privacy strategy, you can:learn about the best practices for...
In light of the recent severe weather events around the world, the Intergovernmental Panel on Climate Change’s Special Report on Global Warming of 1.5°C has caught the attention of the media and the public. The coordinated action of governmental policymakers, politicians, and scientists will be required to address the serious concerns rai...
Your organization’s people strategy should align with your business strategy, and every people-related initiative should result in something that your customers value. Knowing how to find the right people and get them to want to work for you and stay is the secret to competitive advantage. Leverage your human capital and take advantage of the...
The reality today is many companies have relied too much on conducting just a cybersecurity compliance checklist assessment and framework. While compliance with government and industry documentation standards is good, it is not sufficient, nor does it ensure real information security. Organizations need to take appropriate action both before and af...
The Internet has bought connection, communication, and efficiency to the business world, including family offices. However, conducting business online without proper security and knowledge of risks can endanger the family and its data. The right level of expertise, planning, and effort is required to safeguard sensitive information. It is an organi...