Since 2022, there has been a significant increase in cyberattack attempts targeting email accounts. Taking a closer look, BPM’s Cybersecurity Assessment Partner, David Trepp, explains how attacks are launched against employees, business email systems, and their authentication mechanisms. He also outlines the threat scenarios, shows examples fr...
We have the answers
Search Results
The new cyber risk paradigm requires organizations to become more comfortable with the reality that the connective tissue of modern business is digital. Given this landscape and the increasing cyber threat, organizations are recommended to implement twelve cyber hygiene controls that are key to achieving cyber resilience and insurability. ...
How can an organization be confident it is agile enough to react to the unknown and the evolving risk landscape? One of the best ways is by establishing a strong risk culture. In this e-book, Baker Tilly practitioners take a closer look at some of the critical risks that organizations are dealing with now, how those risks have evolved in recent yea...
The key to success of any risk management plan is the development of an “all risk” approach that takes the entire family enterprise into account. Through a survey of more than 200 family office executives at single and multi-family offices, an uncovering of some worrying approaches has surfaced around the risks that family offices face, particularl...
Adding dual factor authentication to your social media helps make sure that you, and only you, can access your account. Instead of only entering a password to log in, an extra security key will be required to access your account. Step by step, learn how easy it is to configure for your Facebook, Instagram, LinkedIn, SnapChat, WhatsApp, and Twitter ...
The wealthy today are more optimistic about their financial opportunities—but they are also more worried about the risks they face, recognizing that their wealth could be lost in an instant in the face of threats like catastrophic weather events, cybercrime, theft, and liability settlements. To further gauge their concerns (and changing aspirations...
After several years of rapid innovation in areas like 5G connectivity, artificial intelligence (AI), health tech, and more, 2025 will be the year when these strides start to bear fruit and new technology goes from potential to proven. To prepare for meeting the tech challenges ahead and claim new opportunities amid the digital disruptions, here are...
Cybercrime has become more advanced over the years, but the level of sophistication could take a quantum leap forward with the explosive growth of generative artificial intelligence (AI) that can easily mimic a real person’s voice or create a scam website that looks exactly like a real one. The threat is keeping security professionals up at night. ...
The Global Risks Report is a comprehensive analysis of the most significant risks facing the world today. Designed to help understand the top risks for 2025 and over the next decade, this report provides insight into challenges and opportunities for risk leaders across industries. Developed by the World Economic Forum with support from strategic pa...
Capturing the insights from over 900 experts worldwide, this executive summary of the 2025 Global Risks Report highlights the key findings to support decision-makers in balancing present crises and longer-term priorities. The report also considers the survey findings and the range of implications, plus it provides six in-depth analysis of...
Family capital delineations, exchange mechanisms, and family office sophistication are crucial as the UHNW family demands of their family offices rise. Peter and Amjed will walk through Trove’s insights from creating and managing over 100 unique family offices. Learn about various forms of family capital and how to facilitate seamless transfer mech...
FOX has recently taken a closer look at the various types of capital available to families and the offices that serve them. One category not yet discussed at our forums is TIME CAPITAL. Given the limited nature of time, it is essential to allocate, invest, spend, and cherish the time we have. Time, as we experience it, is not linear, yet why do ...
The past year challenged families to react to adverse trends to protect their enterprise and build capabilities to achieve their vision. The journey from uncertainty to impact requires an elevated enterprise mindset and determination to persevere throughout the four-stage evolution to position the family enterprise for long-term success and positiv...
Generating positive impact has emerged as a key trend within the Family and Wealth Management space. Investors, families, and society show growing interest in measuring the effects of their actions—and non-actions— with an emphasis on the impact of their investments. We explore current views and provide practical ways families can move forward to b...
No one is immune from cybersecurity threats. And responsibility for protecting your data doesn’t rest with one person or provider. So it’s essential every organization follows at least some basic cybersecurity best practices. A great step toward ensuring your data is safe is to maintain good cyber hygiene. We recommend hiring a third party to co...