Ransomware is a dynamically evolving risk, impacting organizations around the world with rapidly increasing loss frequency and severity. The insights on this risk are intended to focus conversations around loss preparation and risk management, and help guide well-informed cybersecurity investments.
Resource Search
If you’ve decided to purchase a home, whether you are a first-time homebuyer or you’ve purchased before, you need to familiarize yourself with the homebuying process. Once you understand the steps and know what to ask, buying a home can be a seamless and rewarding experience.
The COVID pandemic has changed much about the business environment and operations, and anti-fraud programs must evolve along with them. To assess how organizations are preparing for the “next” normal, this research study surveyed anti-fraud professionals around the globe for their views on the current and expected effect of COVID-19 on the fraud landscape, including the lessons learned that will help move anti-fraud programs forward in a post-pandemic environment.
The risk landscape has shifted, and one thing is clear: Organizations must be resilient. Whether an organization faces a sudden event that strikes with little warning, or a risk that emerges over time, the preparation needed to achieve resilience is the same. Four key steps and behaviors are provided to help businesses become more resilient while balancing risk with reward.
While marijuana is still illegal under federal law, what was previously considered a forbidden substance is now part of the mainstream. As public policy evolves, risk professionals must stay abreast of legal and political developments, review and update existing workplace policies, and carefully handle any workers’ compensation, employment practices liability, and other insurance claims in which marijuana use may play a role.
S corporation shareholder agreements should be carefully crafted by legal counsel in order to avoid certain events that can imperil the company’s S election. One important consideration is the language in the shareholder agreement related to nonvoting stock transfer restrictions. Learn how to address this issue—and avoid costly pitfalls—before it arises in the course of estate planning or a private company sale. See how nonvoting shares are needed.
Family offices are a key target for cybersecurity breaches and, with many organizations requiring their employees to work remotely due to the COVID-19 pandemic, the risks have only increased. With cyberattacks on the rise, many family offices are focusing their attention on how to protect themselves. Here’s a look at some of the most common types of cybersecurity breaches and what family offices can do to stay safe.
Although the events of 2020 were unexpected and hard to prepare for, having conversations about processes, assessing risks, and learning to practice decision-making with your family can help when crisis strikes. On this episode of Tolleson Insights, Richard Joyner shares his observations and the lessons learned over the last 18 months from working with families of wealth. He also shares the top three steps families can take to start their preparation process.
Russia has long been designated as a technologically hostile nation. In the leadup to the conflict with Ukraine, Russia launched unprecedented, but predictable, cyber warfare operations against the Ukrainian government and civilian infrastructure. With the situation on high alert and Russia’s aggressive cyber attacks that go beyond Ukraine, a cybersecurity firm provides digital protection recommendations to help high-profile individuals and families protect themselves from the cyber warfare.
Facing more frequent and intense cyber threats, it’s vital that businesses are prepared for the attacks. In this episode of Marsh’s Risk in Context podcast, learn how organizations can build effective cyber incident and ransomware management plans and the actions they can take before, during, and after an attack. An important piece of your plan should include having a go-to list of reliable resources—such as law firms, forensics firms, and various extortion service providers—to act on your behalf in the event of a cyber incident.