The reality today is many companies have relied too much on conducting just a cybersecurity compliance checklist assessment and framework. While compliance with government and industry documentation standards is good, it is not sufficient, nor does it ensure real information security. Organizations need to take appropriate action both before and af...
We have the answers
Search Results
The Internet has bought connection, communication, and efficiency to the business world, including family offices. However, conducting business online without proper security and knowledge of risks can endanger the family and its data. The right level of expertise, planning, and effort is required to safeguard sensitive information. It is an organi...
Asset protection follows the continuum of life’s events, reflecting the changes that individuals, families, careers, businesses and wealth undergo. Within the wealth spectrum, a simple way of thinking about asset protection strategies is from lower risk and simpler tactics to higher risk and more complex and sophisticated tactics. This approa...
Under their tag as Baby Boomers, the Pre-Retirees have always been different. In the insurance sphere, that difference shows itself as a change in perspective that entails new requirements. Whether to downsize and how, what legacy to leave, and similar questions that call for more than advantageous sales. To provide the added-value advice and servi...
If you pre-order from Starbucks, buy a paper on the corner using Apple Pay, or use the free wifi at the gym to pay your bills online, before lunch you’ve shared multiple pieces of information that could potentially be accessed by cyber criminals. Security experts continue to familiarize themselves with the latest cyber-exposures, but so do cr...
As with many of your possessions, the value of jewelry is not simply monetary. Individual pieces often hold significant sentimental value: a tennis bracelet gifted to mark the birth of a child or an heirloom brooch passed down from a grandmother, for example. These are irreplaceable, so taking the proper steps to secure and protect them is critical...
Some 90 percent of adults over 65 prefer to “age in place,” and even the need for health or mobility assistance doesn’t change their desire to stay in their own homes. It raises issues not just for Baby Boomers, but for those who are responsible for their transitioning through the stages of aging. The “aging in place” ...
There are many reasons to accept a position on a board of directors or as an officer of a company. The cause may appeal to you or you may see this as a way to give back to the community. You may derive additional compensation from this type of position, or it could be an honorary position. Whatever the reason, it is important to remember that with ...
Cybersecurity risk creates a vexing set of challenges for family offices, high net worth families and executives, who, like any other business, would be well-served to make cybersecurity an important part of their estate planning and asset protection strategies. If the family or executive is prominent, a host of other issues related to privacy and ...
No matter where your business is located or operating, if your company suffers a data breach you may have legal compliance and reporting obligations or face possible fines and lawsuits. With legislation passing in South Dakota and Alabama at the beginning of April 2018, all 50 states now have data breach notification laws that businesses are requir...
Every year during tax season the Internal Revenue Service (IRS) releases the “Dirty Dozen” list of tax scams. With the increased number of data breaches, it is important to remain vigilant when sharing your personal data and responding to demands for tax payments. Here are some tips to help you avoid tax scams and identity theft.
According to the 2018 Global Risks Report, cybercrime is the top risk for business leaders in advanced economies, as well as the risk most likely to intensify. In fact, with the rising frequency of data breaches, cyber risk is now a common exposure for individuals, families, family offices, and their related enterprises. To help you assess your cyb...
After years of favorable treatment, will insurance carriers finally shift their appetite for this industry? We’ve been fortunate to have a large volume of carriers interested in obtaining asset management business in the past three years. This increased capacity has driven carriers to create enhanced terms and conditions as well as offer more...
While cyber liability losses and privacy claims continue to rise, a new exposure has arisen. Hackers have determined that due to the increased sophistication in computer security, it may be easier to manipulate an individual rather than a machine. With enough policies and procedures in place, Social Engineering Fraud (SEF) is preventable. However, ...
Moving from home to college is a rite of passage that requires a teenager to assume more responsibility for their actions and requires a parent to respect their child's budding independence. Before college-bound teens make the move, there are important factors families need to fully consider regarding their children’s personal safety, hea...