When it comes to preparing their people for the future, U.S. CEOs know there’s work to do. They’re increasingly concerned about finding the right skills for growth. And workers are worried about the effects of automation and other technologies on their jobs. Key findings from the 21st CEO Survey show that while leaders are making some strides in pr...
We have the answers
Search Results
Workplace harassment costs employers millions of dollars every year through poor employee morale, higher absenteeism, reduced productivity and costly settlements and lawsuits. Employers need to create the right culture, supported by appropriate policies and training. With the recent stunning revelations from Hollywood, the Media and Washington have...
The Tax Reform Act contains sweeping changes and impacts all taxpayers, from individuals to businesses, and the rules for each category are different. Generally, the changes made for individual taxpayers, including the pass-through rules for business entities, are effective from January 1, 2018 to December 31, 2025. If no changes are made by Decemb...
Now that the Tax Cuts and Jobs Act is law, it is helpful to have a checklist for determining how tax reform changes your employee benefit programs and a chart outlining the key benefit plan limits for 2018. Also in this issue of HR Focus, we revisit what sexual harassment is and what employers should be doing to prevent it, address it and help prot...
At the heart of risk management is a gloomy truth: You can never achieve zero risk. In a world of limited resources there are always tradeoffs to be made: how much to invest here and how much there, how much risk to tolerate and how much to mitigate or insure against. To answer those questions, risk quantification is necessary—to estimate how...
The Tax Cuts and Jobs Act of 2017 and the recent taxpayer victory in the U.S. Tax Court’s Lender Management, LLC decision have created important planning opportunities for closely held and family-controlled entities in 2018. In particular, with respect to: (1) navigating the elimination of the various deductions and the expansion of “bo...
A family office is more than a cost-effective solution to managing great wealth. When done properly, it provides customized services and support that fosters a shared experience of wealth stewardship. Establishing a family office should be approached the same way as creating any other successful business: start with a good plan.
Now that The Tax Cuts and Jobs Act (the Act) has been signed into law, you may be wondering what this means for you and your family. The Act is broad in scope and will change the tax rules for individuals and businesses in 2018 and beyond. When thinking about the impact of the Act on you, your family, and your business, it’s important to reme...
Due diligence often focuses heavily on financial and operational issues. Often the new or combined organization’s cybersecurity does not receive the attention it deserves. As a result it places the company at risk from a cyber incident, which can detrimentally impact the organization’s reputation and financial security. The risk is high...
Cyber risk has moved from the IT department to a full-fledged enterprise risk. Unfortunately, a cyberattack can hit a company at any time. There are, however, practical, actionable steps to ensure that when a cyberattack hits, your company and board will be both ready to address the threat and resilient enough to recover from it. Leveraging a flexi...
Financial reports and other real-time operational data are often lagging indicators of performance. These metrics, although perhaps lacking precision, may have been sufficiently effective in the past; however, they are less so now because they lag the current cadence of information dissemination and business volatility today. The challenge for many...
For American companies who do business in Europe or who process the personal data of EU residents, the world of data privacy and security is about to get much more complicated. While U.S. privacy law is unsettled, with rapidly proliferating state and federal laws and regulations and uncertainty as to how strictly they will be enforced, the rules in...
Vulnerability assessments and penetration testing may uncover areas where hackers can break in, but what if they are already there? Cyber Hunting is a proactive strategy to identify if anyone is already on your network versus waiting for an actual breach to occur. Most breaches occur weeks or even months after the attacker gets a foothold on the ne...
Bring Your Own Device (BYOD) policies are becoming more and more popular, and with good reason. As the capabilities of tablets and smartphones continue to rapidly expand, the mobility revolution has been a boon for businesses and employees alike, enabling greater productivity and more flexibility. BYOD amplifies those efficiency gains, reducing adm...
In the last few years, hackers and cyber criminals have become much more sophisticated in how they steal private information, which has led to massive data breaches. These data breaches not only cost an organization hundreds of thousands of dollars in fixes and possible fines, they can ruin a long-established reputation in a matter of hours. Puttin...