Affluent individuals and families are increasingly becoming targets of criminal activity, such as stalking, kidnapping, theft, harm and vandalism. Does your family use any wireless communication devices? Do you regularly check for spyware on your computers? How do you dispose of sensitive information? These are just some of the potential vulnerabil...
We have the answers
Search Results
In this 2009 FOX Wealth Advisor Forum presentation, hear from an accomplished branding and marketing expert who will discuss insights from his quantitative analysis of high-net-worth and ultra-high-net-worth behaviors. Dr. Taylor will address the way that the economic downturn and market volatility are affecting the investment strategies of ultra-w...
Anyone who has participated in the acquisition or sale of a company will recognize the typical path of a deal: from flirting to tough questions to hard bargaining to—finally—handshake. Inevitably, however, the road detours from the exhilaration of accord to the anxiety of suspicion. The buyer wants assurance that all the seller's pr...
Have we felt the impact of the economic crisis on the professional liability market? In this 2009 Financial Executives Forum, hear from Jim Kane, President, HUB Personal Insurance, and Tom Handler, Partner of Handler Thayer, LLP on trends, errors and omissions in professional liability coverage for directors, officers and trustees.
In this 2009 Financial Executives Forum presentation, Paul Viollis, CEO of Risk Control Strategies, leads a discussion of new and old threats to our personal safety. From terrorism to cyber security, Dr. Viollis weaves actual experiences into best practices for keeping you and your family secure.
In reaction to the volatility in the current financial markets and economic recession, FOX is exploring ways in which ultra-wealthy individuals and their advisors are adjusting their financial strategies and re-evaluating known and emerging risks. This 2009 FOX Financial Executives Forum presentation examines how investor thinking has changed and w...
More than ever before, families and individuals are creating trusts and limited liability companies and transferring legal ownership of one or more of their properties to these entities. Very often these arrangements are an important component of a family’s overall financial and wealth management strategy. But without an insurance program tha...
So, you need to hire someone to work at your home—a housekeeper, a chef, or a personal assistant. You have decided not to contract these services to a local company, and your family office does not hire staff for you. It is up to you to fill this position. Before letting a stranger into your home, it is important to understand the domestic em...
When it comes to placing a value on your fine art collection, it is important to understand and debunk the appraisal myths. It begins with correcting the myth that an appraisal is not needed when in fact it is crucial to establish and protect your valuable collection. Know the facts and guard yourself against the myths that could place your fine ar...
Lending or transporting your artwork is one of the most vulnerable times when you are susceptible to losses. When it comes to protecting your artwork against those losses, this checklist will help you understand the benefits of working with vendors that have the right level of experience and reputation to help you make an informed decision.
In the last few years, hackers and cyber criminals have become much more sophisticated in how they steal private information, which has led to massive data breaches. These data breaches not only cost an organization hundreds of thousands of dollars in fixes and possible fines, they can ruin a long-established reputation in a matter of hours. Puttin...
Bring Your Own Device (BYOD) policies are becoming more and more popular, and with good reason. As the capabilities of tablets and smartphones continue to rapidly expand, the mobility revolution has been a boon for businesses and employees alike, enabling greater productivity and more flexibility. BYOD amplifies those efficiency gains, reducing adm...
Vulnerability assessments and penetration testing may uncover areas where hackers can break in, but what if they are already there? Cyber Hunting is a proactive strategy to identify if anyone is already on your network versus waiting for an actual breach to occur. Most breaches occur weeks or even months after the attacker gets a foothold on the ne...
The U.S. Department of State estimates that more than 8,000 Americans die in a foreign country each year. While some of those are permanent residents and long-time expatriates, thousands more are tourists or individuals traveling for business. For families and their enterprises receiving that unexpected news, the first inclination may be panic. Hav...
For American companies who do business in Europe or who process the personal data of EU residents, the world of data privacy and security is about to get much more complicated. While U.S. privacy law is unsettled, with rapidly proliferating state and federal laws and regulations and uncertainty as to how strictly they will be enforced, the rules in...