Cyber threats and fraud schemes are designed to infiltrate and compromise your business. By using this cybersecurity resource guide and taking proactive actions to prevent cyber threats, you can strengthen your defensive strategy. This guide includes: Cyber Fraud Overview Recommendations and Resources Quick Reference Guide f...
We have the answers
Search Results
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...
On September 30, 2022, the Department of the Treasury issued final rules addressing the scope of the reporting requirements for beneficial ownership and control of entities provided under the Corporate Transparency Act (CTA), which creates more clarity for families looking to understand their reporting requirements and potential exceptions. While t...
After a turbulent 2022, the technology industry is facing another busy year ahead amid a shifting M&A environment, widespread layoffs, and an increased focus on corporate governance. We analyze the trends that shaped the past year and look at the top seven bold predictions that will impact the technology industry. Be prepared for new prior...
Since 2022, there has been a significant increase in cyberattack attempts targeting email accounts. Taking a closer look, BPM’s Cybersecurity Assessment Partner, David Trepp, explains how attacks are launched against employees, business email systems, and their authentication mechanisms. He also outlines the threat scenarios, shows examples fr...
The new cyber risk paradigm requires organizations to become more comfortable with the reality that the connective tissue of modern business is digital. Given this landscape and the increasing cyber threat, organizations are recommended to implement twelve cyber hygiene controls that are key to achieving cyber resilience and insurability. ...
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
With artificial intelligence’s (AI) prevalence, companies must consider developing not only an AI strategy but also a robust internal AI policy. Download this checklist for a step-by-step guidance on how to create an internal AI policy for your organization. For the in-depth insights on developing an internal AI policy, explore the Comprehensive Gu...
Artificial Intelligence (AI) is rapidly becoming an integral part of our daily lives and workplaces. With AI’s growing prevalence, organizations must consider developing not only an AI strategy but also a robust internal AI policy. This guide outlines the reasons for establishing an internal AI policy, the stakeholders involved, essential policy co...
While business continuity planning and good crisis management are important, organizational resilience encompasses much more. An integrated approach to resilience provides organizations a competitive advantage over less-prepared peers, as well as the ability to adapt to constantly changing external circumstances. Organizations would be well-served ...
No one is immune from cybersecurity threats. And responsibility for protecting your data doesn’t rest with one person or provider. So it’s essential every organization follows at least some basic cybersecurity best practices. A great step toward ensuring your data is safe is to maintain good cyber hygiene. We recommend hiring a third party to co...
This annual cybersecurity update covers the leading threats you need to be aware of to keep your clients and your firm protected. 2021 cybersecurity trends and best practices will be shared.
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Lawmakers have passed the Corporate Transparency Act (CTA) to help in the ongoing fight against fraud, corruption, terrorism financing, and money laundering. The CTA contains significant new federal reporting obligations, and it may have an especially onerous impact on estate planning for those who accomplish their planning goals through the u...
Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...