Vulnerability assessments and penetration testing may uncover areas where hackers can break in, but what if they are already there? Cyber Hunting is a proactive strategy to identify if anyone is already on your network versus waiting for an actual breach to occur. Most breaches occur weeks or even months after the attacker gets a foothold on the ne...
We have the answers
Search Results
Bring Your Own Device (BYOD) policies are becoming more and more popular, and with good reason. As the capabilities of tablets and smartphones continue to rapidly expand, the mobility revolution has been a boon for businesses and employees alike, enabling greater productivity and more flexibility. BYOD amplifies those efficiency gains, reducing adm...
In the last few years, hackers and cyber criminals have become much more sophisticated in how they steal private information, which has led to massive data breaches. These data breaches not only cost an organization hundreds of thousands of dollars in fixes and possible fines, they can ruin a long-established reputation in a matter of hours. Puttin...
Lending or transporting your artwork is one of the most vulnerable times when you are susceptible to losses. When it comes to protecting your artwork against those losses, this checklist will help you understand the benefits of working with vendors that have the right level of experience and reputation to help you make an informed decision.
When it comes to placing a value on your fine art collection, it is important to understand and debunk the appraisal myths. It begins with correcting the myth that an appraisal is not needed when in fact it is crucial to establish and protect your valuable collection. Know the facts and guard yourself against the myths that could place your fine ar...
So, you need to hire someone to work at your home—a housekeeper, a chef, or a personal assistant. You have decided not to contract these services to a local company, and your family office does not hire staff for you. It is up to you to fill this position. Before letting a stranger into your home, it is important to understand the domestic em...
Flash drives and laptops may pose a threat to company security as employees take confidential information outside the office, according to a survey from Tower Software. The U.K.-based company found that 55 percent of surveyed employees store work-related e-mails, files and documents in locations other than a secure, shared computer network.
Pre-nuptial agreements and marriage agreements are not binding under English law, leaving the details of divorce settlements largely in the hands of judges. But decisions rendered in the past five years show that judges are now taking pre-nups more seriously. This article from Withers shows how an appeals court has interpreted the importance of a p...
Anti-money laundering investigations have become complex, global efforts that may involve funding for terrorist networks. Navigant Consulting devotes an issue of its IQ quarterly publication to exploring AML compliance technology, the state of AML enforcement in the UK and the impact of money laundering inquiries on financial institutions. Navigant...
The economic turbulence over the past year has expanded the concept of risk from simple volatility to actual, and in some cases, permanent losses. While the impact on most financial vehicles is quite obvious and is presented through the news media on a daily basis, others are much more subtle. One such area is critical to the success of many wealth...
To manage wealth well requires understanding and responding wisely to risk. This white paper seeks to help readers gain insight into the heart of risk. It focuses not on technical measures of risk (beta, volatility, variance, and the like) but rather how successful individuals tolerate and manage risk day-to-day.
Staff recruitment, hiring and retention are challenging and diffi cult processes for any employer. When this task is assumed by a family, many of the standard issues raised are magnifi ed because of the family's limited experience in this job capacity. When you take on the role of employer, risk management changes in many ways. Despite the conc...
This paper will examine ways to lessen six of the greatest risks to preserving and enjoying multigenerational wealth. These six risks are: concentrating your assets, overspending, overusing leverage, poor tax planning, not attending to liabilities, ignoring family governance
Life insurance policyholders are understandably concerned by the collapse of AIG and the ongoing crisis in the financial services industry, but insurance company analysts do not see an insolvency risk among other providers. Indeed, they express confidence in several safeguards designed to protect the interests of policyholders, says this new white ...
A limited liability company may seem like the best way to structure private aircraft ownership, organizing finances while shielding other assets from liability, but think again, says Gary Horowitz of Wiley Rein. Using an LLC can lead to a huge tax liability, potential fines by the Federal Aviation Administration and increased personal liability. Th...