From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
We have the answers
Search Results
When it comes to buying a new home, there can be many unknowns. However, uncovering the issues and hidden risks earlier in the process can help you make a more informed buying decision. As part of your lifestyle and property management best practices, there are four important questions—including matters of insurance and geographical risks—that shou...
Third-party vendors can range from custodial companies, to IT services, to professional service firms. Whatever their contracted function, they have access to your physical premises and/or your network data. So how can you make sure that when you’re signing a contract with an outside vendor, you’re not exposing yourself and your clients to excessiv...
The COVID-19 pandemic has led to an acceleration of adoption of cloud solutions and other remote access tools. However, hasty adoption of any new technology that is not combined with robust security frameworks, policies, and controls can leave businesses vulnerable. A formal vendor management process and having specific controls in place can mean t...
Organizations across the wealth management landscape face an array of technology risks that are growing more prominent in a post-COVID environment. While keeping an eye on the future and building resiliency, learn how to turn five tech risks—including the rise of disruptive technologies—into an opportunity that goes beyond adopting...
Going on the internet can put your devices and personal details at risk from unexpected online threats like malware and ransomware. Learn about the threats and see some internet safety tips to help keep your devices and data safe when you browse online.
The more we use social media to share updates, pictures and videos with friends and family, the easier it can be for cybercriminals to steal our information. See how you can use social media safely to protect yourself and your private information from cybercriminals.
Crafting the right message can be tricky at the best of times—add a global pandemic and new vaccine to the mix and the process can be downright terrifying. Depending on the needs and culture of your organization, you may use one or a combination of these communication approaches when deciding on whether to roll out a vaccination awareness cam...
As many as 20% of family offices have knowingly experienced a cyber security attack prior to the coronavirus pandemic, and it’s likely that number is significantly higher today. Learn how to build cyber protection from the surge in cybercrime, including how to reduce your digital footprint and what to do if you become a victim of a cyber breach. Pr...
In the wake of the COVID-19 pandemic, cybercrime syndicates and hackers have been busy: the FBI estimates there’s been an 400% spike in cybercrimes since the onset of the pandemic. In this infographic, learn what’s at stake for affluent and high-net-worth individuals—and how to build protection from the surge in cybercrime.
Water damage is one of the biggest challenges for property managers. Improving plumbing infrastructure and creating a risk mitigation plan can be the difference between sinking or swimming until your next insurance renewal. Learn the five ways to minimize your risk and the cost of water damage. Every preparation you take to combat future water dama...
Ransomware is one of several common cybersecurity risks companies face today. In addition to being a victim of a cyber attack, these companies may become the target of lawsuits alleging a variety of harms, including failure to deliver contractual promises and negligent cybersecurity practices. By being prepared and employing practical strategies, c...
From Australia to United States and many places in between, this Global Employer Guide reflects an easy-to-read summary of employment law that changed in each country over the past year, including pandemic-related changes where applicable. Visa processes, employee rights, contract requirements, transfer of business considerations, privacy standards...
How can an organization be confident it is agile enough to react to the unknown and the evolving risk landscape? One of the best ways is by establishing a strong risk culture. In this e-book, Baker Tilly practitioners take a closer look at some of the critical risks that organizations are dealing with now, how those risks have evolved in recent yea...
Environmental, social, and governance (ESG) has become the next frontier in risk mitigation and long-term value creation. While ESG introduces high-stakes responsibilities for the board, it rests on the same overriding principles of traditional governance, including communicating execution of a strategy in alignment with corporate purpose, vision, ...