Fund groups face disruptive developments, as advances in financial technology, often called fintech, continue at an ever more rapid pace. Even as new efficiencies and opportunities blossom, regulators have pushed financial firms to recognize the dangers of technological failures. To prepare for the changes ushered in by fintech, it is important for...
We have the answers
Search Results
We have all been the new person at some point or another—the new person on the block, the freshman at the big university, a manager in a new office. In such hard-to-navigate situations, training and communications are integral parts of the on-boarding process. When both employee and employer are informed about one another’s needs, personalities, an...
A chimney fire can be a significant event, in both monetary damages and trauma. The risk is heightened by the fact that chimney fires often begin out of sight, meaning they may not be noticed in time to prevent the flames from spreading to the home or causing serious structural damage. Luckily, a few simple measures can help reduce the damage from ...
Whether your collection of paintings are decorative pieces or appreciative investments (or both), they can hold a tremendous amount of meaning and value. As to the decision regarding how and where to display your fine works of art, it’s important to identify and consider the many factors that could lead to a loss. All paintings—including oils, acry...
Water damage has consistently ranked as the costliest cause of loss year over year. The largest of these losses have all occurred while no one was home. Whether you’re planning to be away for a short vacation or leaving for the season, there are nine steps you can take to help reduce the chances that you will suffer a water loss.
Extreme winter weather has been a major issue throughout much of the U.S. in recent years and can result in high insurance claims accounting for millions in losses—the majority of which were due to ice dams and frozen pipes. An analysis of the winter-weather loss claims yielded four common factors and valuable insights that can help you be more pro...
Statistics show that teenagers are more likely than any other age group to be in an automobile accident. In several tragic incidents, the use of a cell phone was involved. Some accidents, however, simply reflected the teenagers’ lack of driving experience. As a parent, you can help your teenager become a safe and skilled driver by setting a good ex...
Cyber threat is as old as the internet itself. While some attacks are politically motivated, the majority are carried out for financial gain. The potential profit to be made with someone’s personal information, particularly if the individual is of high net worth, is great—in fact, it’s a more lucrative industry than the illegal dr...
Terrorism can take many shapes and involve a vast range of political or ideological agendas. But there are common threads linking all acts of terror: they involve the use of threat of violence, they are random—potentially occurring in any country, against any target, at any time—and their ultimate goal is to generate fear. As terror tac...
Vulnerability and personal security risks can be greatly reduced by following five basic principles of security at all times—awareness, low profile, unpredictable routine, communication, and layers of security. Based on those principles, these guidelines are designed to give practical advice on safety and security to anybody who is living in or tra...
Wealth attracts attention and an increase in personal risk, including the risk of being kidnapped. Why then is there resistance to security among wealthy individuals and families, whether they come from security-savvy hedge fund managers or young parents of families with extensive financial holdings intent upon raising their children “like ot...
While many individuals may have the skills and experience for a private staffing position, it’s the chemistry and having a system in place that makes it work for all parties. With this guide that includes job descriptions and requirements, discover the actionable insights and best practices for optimizing your private staff throughout the hiring pr...
It’s tempting to imagine the computer systems as airtight vaults, impenetrable and immune to cyberattacks. But this would be a risky move. In reality, IT infrastructure is more like a porous sponge with gaping holes where data can leak when things don’t go according to plan: a staff member might lose a laptop, a system might experience ...
Before executing a commercial property lease or sales contract, the parties may prepare a letter of intent or an agreement in principle. The letter of intent or a similar document (the “LOIs”) generally signals that the parties have agreed on the outline of a deal, but not on all of its provisions or details. While LOIs can serve differ...
Each year fraudsters are stealing millions of dollars through sophisticated fraudulent use of Email Compromise Scams targeted at individuals and employees who regularly perform wire transfers. The scam involves a fraudster creating a false email or alternatively, hacking into a real email account of an executive, business partner, employee or finan...