Since 2022, there has been a significant increase in cyberattack attempts targeting email accounts. Taking a closer look, BPM’s Cybersecurity Assessment Partner, David Trepp, explains how attacks are launched against employees, business email systems, and their authentication mechanisms. He also outlines the threat scenarios, shows examples from real-world post-breach analysis, and elaborates on strategies to better secure your organization from business email compromise.
Resource Search
The new cyber risk paradigm requires organizations to become more comfortable with the reality that the connective tissue of modern business is digital. Given this landscape and the increasing cyber threat, organizations are recommended to implement twelve cyber hygiene controls that are key to achieving cyber resilience and insurability.
How can an organization be confident it is agile enough to react to the unknown and the evolving risk landscape? One of the best ways is by establishing a strong risk culture. In this e-book, Baker Tilly practitioners take a closer look at some of the critical risks that organizations are dealing with now, how those risks have evolved in recent years, and some basic strategies to effectively manage those risks.
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you can leverage it to enhance your organization's privacy practices and reduce regulatory risk.
This guidebook takes a critical look at significant challenges and opportunities in family office operations and offers comprehensive guidance with a future-focused lens. Gain expert insight, strategies, and best practices on the top-of-mind issues that include strengthening your cybersecurity, leveraging your technology, the role of the chief investment officer, starting a direct investment function, and choosing an appropriate trustee.
As the world becomes more digitally connected, cybersecurity risks will keep rising. The larger your digital footprint, the greater your cyber risk. With this self-defense guide and best practices by William Blair & Company, you can safeguard your online identity and protect yourself against the loss of personal data and assets.
Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existing threats, so that you can ensure your family office is truly doing enough to protect and secure your private client data. Dave Detweiler, Managing Director of Sales, SEI
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on managing your family office’s risk against a ransomware attack. He will discuss the impacts and trends of ransomware attacks, how ransomware attacks are executed and leading practices to minimize your ransomware risk.
By implementing proactive controls, organizations can minimize the chance of falling victim to a ransomware attack. This guide explores these eight leading cybersecurity practices, with critical steps to take and tips to incorporate into your approach: Know your environment Keep your data backups safe Implement a patch management program Build a security-aware culture Assess control and authentication Monitor, detect and respond Implement a ransomware recovery strategy Consider ransomware insurance
As family offices expand their technology footprint, cyberattacks are rising. Hackers continue to refine their approaches, but security controls and proactive planning can strengthen your family office cybersecurity defenses. Initially, focus on the key action items to validate your existing security setup and inform your plans to address any shortcomings you identify within your family office 5.0 model.