Since 2022, there has been a significant increase in cyberattack attempts targeting email accounts. Taking a closer look, BPM’s Cybersecurity Assessment Partner, David Trepp, explains how attacks are launched against employees, business email systems, and their authentication mechanisms. He also outlines the threat scenarios, shows examples fr...
We have the answers
Search Results
The new cyber risk paradigm requires organizations to become more comfortable with the reality that the connective tissue of modern business is digital. Given this landscape and the increasing cyber threat, organizations are recommended to implement twelve cyber hygiene controls that are key to achieving cyber resilience and insurability. ...
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
Being a fiduciary for your organization’s retirement plan doesn’t have to be complicated or overwhelming. However, it does require careful oversight to mitigate risk and help participants meet their retirement goals. With the use of this checklist that should be reviewed on an annual basis, employers can better manage their retirement plan responsi...
With artificial intelligence’s (AI) prevalence, companies must consider developing not only an AI strategy but also a robust internal AI policy. Download this checklist for a step-by-step guidance on how to create an internal AI policy for your organization. For the in-depth insights on developing an internal AI policy, explore the Comprehensive Gu...
Artificial Intelligence (AI) is rapidly becoming an integral part of our daily lives and workplaces. With AI’s growing prevalence, organizations must consider developing not only an AI strategy but also a robust internal AI policy. This guide outlines the reasons for establishing an internal AI policy, the stakeholders involved, essential policy co...
No one is immune from cybersecurity threats. And responsibility for protecting your data doesn’t rest with one person or provider. So it’s essential every organization follows at least some basic cybersecurity best practices. A great step toward ensuring your data is safe is to maintain good cyber hygiene. We recommend hiring a third party to co...
Given how significant accounting processes and applications are prime targets for top business risks, it’s important to take control and start your risk management analysis. Take an important step toward that end by using this fillable and interactive segregation of duties form. After answering the questions, you’ll have a high-level view of functi...
This annual cybersecurity update covers the leading threats you need to be aware of to keep your clients and your firm protected. 2021 cybersecurity trends and best practices will be shared.
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
While there are many items family offices should look for in technology solutions, one vital component is reporting capabilities. For family offices considering a move to Sage Intacct, there are five reporting advantages you can count on to help deliver the data and transparency that are important to the family members.
Third-party vendors can range from custodial companies, to IT services, to professional service firms. Whatever their contracted function, they have access to your physical premises and/or your network data. So how can you make sure that when you’re signing a contract with an outside vendor, you’re not exposing yourself and your clients to excessiv...
Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
A new era of family wealth has driven an explosive growth opportunity for providers and placed far greater demand on their resources. This webcast will cover our perspectives on the changing nature of demand among families of wealth, check-in on the health of the UHNW business and discuss how firms balance growth and demand in this new era. Thom...
The internet and specifically e-commerce has grown exponentially over the last 30 years, incorporating nearly every aspect of trade. As a result, industries and governmental agencies have blossomed to ensure cybersecurity, expending over $150 billion annually to combat this persistent threat. As this market segment continues to expand, crippling cy...