You’ve taken great efforts to enhance the technology security at your organization. Unfortunately, security concerns don’t end with a firewall and anti-virus software. Hackers are employing Social Engineering, where your people – not your systems – are the targets. It’s a powerful tool that involves disguise and exploits our natural human desire to be helpful and forthcoming. Learn the signs and what you can do to protect yourself. Attendees of this webinar:
Resource Search
Families of exceptional wealth enjoy abundant resources to achieve family goals, but also face peculiar, idiosyncratic risks not easily managed through traditional means. This session explores a framework for managing those risks while taking advantage of the unique edge which families can have over other investors.
As new social and geopolitical conflicts arise, threats to a family’s security and well-being change. This landscape has materially shifted over the last few years and, as a result, families need to be prepared to address a variety of personal, physical, and cyber risks.
In the not-too-distant past, it would have been unimaginable for health care coverage to be a point of political debate. Today, Health and Welfare (H&W) benefits, while once only a “perk”, are becoming an integral part of an integrated total compensation package.
Collecting art can be a gratifying experience that can take you into an exclusive world of auction houses, galleries and artists’ studios. There’s a lot to learn in the early days of collecting, and most collectors start small. But if you want to elevate your art buying to collecting, it’s necessary to make a mental shift, including seeing how art should fit into your investment portfolio. Being guided by your heart (and your eye) is important, but making the best financial decisions requires you to also think with your head.
For American companies who do business in Europe or who process the personal data of EU residents, the world of data privacy and security is about to get much more complicated. While U.S. privacy law is unsettled, with rapidly proliferating state and federal laws and regulations and uncertainty as to how strictly they will be enforced, the rules in the European Union are tough and about to get much tougher.
The U.S. Department of State estimates that more than 8,000 Americans die in a foreign country each year. While some of those are permanent residents and long-time expatriates, thousands more are tourists or individuals traveling for business. For families and their enterprises receiving that unexpected news, the first inclination may be panic. Having a journey management plan that addresses specific protocols to be followed in the event of death while traveling abroad can help alleviate the stress that is compounded by barriers of foreign language, law and culture.
Vulnerability assessments and penetration testing may uncover areas where hackers can break in, but what if they are already there?
Lending or transporting your artwork is one of the most vulnerable times when you are susceptible to losses. When it comes to protecting your artwork against those losses, this checklist will help you understand the benefits of working with vendors that have the right level of experience and reputation to help you make an informed decision.
In the last few years, hackers and cyber criminals have become much more sophisticated in how they steal private information, which has led to massive data breaches. These data breaches not only cost an organization hundreds of thousands of dollars in fixes and possible fines, they can ruin a long-established reputation in a matter of hours. Putting in place a robust IT security program will help protect the personal information you maintain from being stolen and misused.