Terrorism can take many shapes and involve a vast range of political or ideological agendas. But there are common threads linking all acts of terror: they involve the use of threat of violence, they are random—potentially occurring in any country, against any target, at any time—and their ultimate goal is to generate fear. As terror tac...
We have the answers
Search Results
Vulnerability and personal security risks can be greatly reduced by following five basic principles of security at all times—awareness, low profile, unpredictable routine, communication, and layers of security. Based on those principles, these guidelines are designed to give practical advice on safety and security to anybody who is living in or tra...
Wealth attracts attention and an increase in personal risk, including the risk of being kidnapped. Why then is there resistance to security among wealthy individuals and families, whether they come from security-savvy hedge fund managers or young parents of families with extensive financial holdings intent upon raising their children “like ot...
While many individuals may have the skills and experience for a private staffing position, it’s the chemistry and having a system in place that makes it work for all parties. With this guide that includes job descriptions and requirements, discover the actionable insights and best practices for optimizing your private staff throughout the hiring pr...
It’s tempting to imagine the computer systems as airtight vaults, impenetrable and immune to cyberattacks. But this would be a risky move. In reality, IT infrastructure is more like a porous sponge with gaping holes where data can leak when things don’t go according to plan: a staff member might lose a laptop, a system might experience ...
Before executing a commercial property lease or sales contract, the parties may prepare a letter of intent or an agreement in principle. The letter of intent or a similar document (the “LOIs”) generally signals that the parties have agreed on the outline of a deal, but not on all of its provisions or details. While LOIs can serve differ...
Each year fraudsters are stealing millions of dollars through sophisticated fraudulent use of Email Compromise Scams targeted at individuals and employees who regularly perform wire transfers. The scam involves a fraudster creating a false email or alternatively, hacking into a real email account of an executive, business partner, employee or finan...
All businesses face cyber threats. Almost every company has some kind of network, database or online presence that puts it at risk for a cyber breach. Smaller businesses can be more vulnerable than larger ones as they often use third-party hosting and information processing that can be an entry point for cyber attacks. By following various proactiv...
Identity theft is a risk that continues to grow and change daily. Due to the many forms identity theft can take, including medical, credit, and financial, the threat remains prevalent and affects millions of people every year. Keeping up-to-date with the latest prevention methods is the surest way to protect the assets and identity. There are a num...
Ample capacity and insurer competition generally put downward pressure on rates in most coverage lines in 2015, a trend expected to continue in 2016, barring unforeseen changes in condition. Other significant developments that bear watching throughout 2016 include demand for cybersecurity coverage across all industries, large-scale mergers and acqu...
Overall, the insurance market in Asia remained competitive in 2015, with rates remaining stable or decreasing in most lines of insurance. However, certain lines did experience rate increases and these were generally driven by loss experience, as in the case of the Tianjin explosion in August and its impact on property catastrophe-exposed coverage, ...
Cybersecurity continues to heat up alongside consumer’s growing dependence on devices and the growth of the Internet of Things. Hacking has evolved from the teenager attempting to modify a high school report card to a highly profitable business run by sophisticated groups. As a result, more and more cybersecurity companies are being founded a...
Successful family offices combine financial, philanthropic, legal, and administrative operations and help ensure that family objectives are achieved from generation to generation. These responsibilities create a range of liability risks for the family office entity and its executive and professional staff. With these risks, it is important for fami...
The term “passion investments” has gained currency within the wealth management arena to describe high-end collectibles and other luxury possessions that hold emotional as well as financial value for their owners. When considering that this new asset class has generated noticeable returns, it’s no surprise that owners want to protect their high-val...
Indexed universal life insurance provides a crediting rate tied to the growth of an equity index. With the potential for an enhanced yield and a guaranteed minimum crediting rate, indexed universal life may be an attractive life insurance option, particularly in the current low interest rate environment.