For many affluent families, risk management has become less a matter of how much insurance premiums will cost and more an issue of how much financial risk they are willing and able to accept. In an ever-shifting risk environment where families are assuming higher levels of exposure, families will need to be increasingly cognizant of potential risks...
We have the answers
Search Results
No one is immune from cybersecurity threats. And responsibility for protecting your data doesn’t rest with one person or provider. So it’s essential every organization follows at least some basic cybersecurity best practices. A great step toward ensuring your data is safe is to maintain good cyber hygiene. We recommend hiring a third party to co...
Risk Management at FOX is focused on all aspects of risk for its membership including families, family offices, operating companies, and advisor organizations. FOX hosts a quarterly meeting comprised of different vendors and thought leader specialists whose focus is in the areas of Cybersecurity, Physical Security, Personal Security, Insurance, Gov...
This annual cybersecurity update covers the leading threats you need to be aware of to keep your clients and your firm protected. 2021 cybersecurity trends and best practices will be shared.
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Going on the internet can put your devices and personal details at risk from unexpected online threats like malware and ransomware. Learn about the threats and see some internet safety tips to help keep your devices and data safe when you browse online.
Families of wealth and business-owning families face security risks in their everyday lives, where personal and business risks are often blended and are typically managed by different people and processes. This creates a gap in identifying risks and solutions that can be addressed through a holistic and collaborative risk management approach. With ...
Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
The internet and specifically e-commerce has grown exponentially over the last 30 years, incorporating nearly every aspect of trade. As a result, industries and governmental agencies have blossomed to ensure cybersecurity, expending over $150 billion annually to combat this persistent threat. As this market segment continues to expand, crippling cy...
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
Lawsuit awards can be incredibly high, and individuals known to have substantial assets are particularly vulnerable. In some cases, the high-stake lawsuits can cause devastating reputational damage. Given the risks and exposure, the need for holistic liability protection is an important issue. Learn the different types of liability i...
Statistics show that teenagers are more likely than any other age group to be in an automobile accident. In several tragic incidents, the use of a cell phone was involved. Some accidents, however, simply reflected the teenagers’ lack of driving experience. As a parent, you can help your teenager become a safe and skilled driver by setting a good ex...
Vulnerability and personal security risks can be greatly reduced by following five basic principles of security at all times—awareness, low profile, unpredictable routine, communication, and layers of security. Based on those principles, these guidelines are designed to give practical advice on safety and security to anybody who is living in or tra...
Fraud is happening at your organization; you just don’t know it. Then again, maybe you do, but you are not sure how pervasive the problem is, where to begin your anti-fraud journey, or how to enhance your current fraud risk management practices. This playbook—which includes templates, checklists, and tools—draws from best practices and leading guid...
Get ready to comply with the five new data privacy laws that will come into effect in January 2025 in Delaware, Nebraska, Iowa, New Hampshire, and New Jersey. With the active enforcement by several states’ Attorneys General and a trend toward broader applicability, data privacy compliance is becoming increasingly important and complex. Companies sh...