Third-party vendors can range from custodial companies, to IT services, to professional service firms. Whatever their contracted function, they have access to your physical premises and/or your network data. So how can you make sure that when you’re signing a contract with an outside vendor, you’re not exposing yourself and your clients to excessive risk? There are four best practices you should follow before signing the dotted line.
Resource Search
The COVID-19 pandemic has led to an acceleration of adoption of cloud solutions and other remote access tools. However, hasty adoption of any new technology that is not combined with robust security frameworks, policies, and controls can leave businesses vulnerable. A formal vendor management process and having specific controls in place can mean the difference between a cloud solution being a huge advantage to agile solutions or leaving the business open to attacks and unauthorized access.
The Corporate Transparency Act (the CTA) is the first significant update to the U.S. anti-money laundering laws in 20 years and gives FinCEN significant authority to adopt necessary regulations to implement the provisions of the CTA. Under this new compliance environment, there will be new burdens—including the filing of “beneficial ownership” information—imposed on many entities operating in the U.S. and will likely to have major implications for foreign and domestic businesses.
With the IRS increasing their funding and enforcement, upper income taxpayers should expect the IRS audit coverage to increase dramatically on them. It’s important to prepare for the tax changes that are coming—and coming quickly. Along with having a team of professionals on your side, there are steps you can take to protect yourself. Now is the time to review and perhaps recalibrate your risk tolerance for tax strategies.To learn more about the coming changes, listen to the podcast recording here with Waller’s Leigh Griffith.
Going on the internet can put your devices and personal details at risk from unexpected online threats like malware and ransomware. Learn about the threats and see some internet safety tips to help keep your devices and data safe when you browse online.
The more we use social media to share updates, pictures and videos with friends and family, the easier it can be for cybercriminals to steal our information. See how you can use social media safely to protect yourself and your private information from cybercriminals.
There’s no doubt that leveraging new technologies and cloud-based solutions offers family offices opportunities to innovate, lower spending, and align their overall technology strategy to current and future-state needs. But the selection and implementation process can be a challenge. Having a structured approach around it will be critical in ensuring a successful outcome.
Crafting the right message can be tricky at the best of times—add a global pandemic and new vaccine to the mix and the process can be downright terrifying. Depending on the needs and culture of your organization, you may use one or a combination of these communication approaches when deciding on whether to roll out a vaccination awareness campaign for your employees.
As many as 20% of family offices have knowingly experienced a cyber security attack prior to the coronavirus pandemic, and it’s likely that number is significantly higher today. Learn how to build cyber protection from the surge in cybercrime, including how to reduce your digital footprint and what to do if you become a victim of a cyber breach. Protection also means having cyber insurance and knowing the essential elements it should cover.
In the wake of the COVID-19 pandemic, cybercrime syndicates and hackers have been busy: the FBI estimates there’s been an 400% spike in cybercrimes since the onset of the pandemic. In this infographic, learn what’s at stake for affluent and high-net-worth individuals—and how to build protection from the surge in cybercrime.