Hiring domestic staff such as nannies, personal assistants, and housekeepers can expose you to liability issues and danger from unscrupulous employees. It is important to understand your areas of vulnerability and take steps to protect your family and your finances. Whether you hire your own employees or the family office hires them, three often ov...
We have the answers
Search Results
This is a field guide for avoiding the pitfalls that cause families to overpay, waste time, or lose money due to estate transitions. If you are dealing with a family member’s house full of possessions when age, personal or medical reasons dictate that it is time to sell a primary or vacation home, then these tips will help you simplify the pr...
From the intense wildfire activity in 2017, lessons were learned on the value of smart landscaping. Applying those lessons and other tips, you can enhance your home's resiliency and keep your family safe.
Each decade of life brings unique challenges and opportunities, financial and otherwise. Focusing on each stage from the 40s to the 70s, we highlight the planning issues that may be ripe for your consideration, including revisiting your estate plan, downsizing your home, and constructing your general retirement plan.
When it comes to protecting digital assets, the users can end up being the biggest flaw in your cybersecurity armor. Mistakes like creating easy-to-guess passwords, not encrypting important data, or sending passwords over email can make a hacker’s job easy. To help strengthen your cybersecurity armor and stay ahead of the hackers, here are so...
As the office of the controller becomes ever more strategic—creating higher levels of financial visibility to help drive growth and profitability—the financial organization’s relationship to the controller role must evolve as well. Specifically, today’s CFO needs to work closely with the controller to ensure that, one, the o...
Both New York State and New York City have recently passed a series of laws that significantly increased the protections against sexual harassment in the workplace. These laws outline additional and specific requirements—including the adoption of anti-sexual harassment policies and training—that employers must comply with over the next ...
When surveying the top causes of home damage that might lead to an insurance claim, water damage is the second highest frequency claim category (after wind and hail). With concerted and targeted educational efforts, water loss prevention measures can become more common place and damage can be prevented.
Before executing a commercial property lease or sales contract, the parties may prepare a letter of intent or an agreement in principle. The letter of intent or a similar document (the “LOIs”) generally signals that the parties have agreed on the outline of a deal, but not on all of its provisions or details. While LOIs can serve differ...
It’s tempting to imagine the computer systems as airtight vaults, impenetrable and immune to cyberattacks. But this would be a risky move. In reality, IT infrastructure is more like a porous sponge with gaping holes where data can leak when things don’t go according to plan: a staff member might lose a laptop, a system might experience ...
While many individuals may have the skills and experience for a private staffing position, it’s the chemistry and having a system in place that makes it work for all parties. With this guide that includes job descriptions and requirements, discover the actionable insights and best practices for optimizing your private staff throughout the hiring pr...
Wealth attracts attention and an increase in personal risk, including the risk of being kidnapped. Why then is there resistance to security among wealthy individuals and families, whether they come from security-savvy hedge fund managers or young parents of families with extensive financial holdings intent upon raising their children “like ot...
Terrorism can take many shapes and involve a vast range of political or ideological agendas. But there are common threads linking all acts of terror: they involve the use of threat of violence, they are random—potentially occurring in any country, against any target, at any time—and their ultimate goal is to generate fear. As terror tac...
Strong cybersecurity for protecting sensitive client data is a critical capability for any Registered Investment Advisor firm. In 2013, Hardy Reed—one of the first firms to earn the Center for Fiduciary Excellence certification—considered cloud services as an option for its IT needs. They wanted to look at alternate options to replacing...
Cybercriminals targets the financial industry 300 times more frequently than any other industry, resulting in mega breaches and millions of records stolen through hacktivism, malware, social engineering, phishing, and other applications. The harsh consequences of remaining vulnerable to cybersecurity breaches are costly, and the number one threat t...