Having a good cyber risk management program in place might help a company prevent some breaches. But more importantly, when a breach does happen, it can help companies get back on their feet faster and mitigate financial and reputational damage. How do you know whether your company is doing what it should to address the risk and become cyber resili...
We have the answers
Search Results
With the passage of the Tax Cuts and Jobs Act at the end of 2017, more family businesses are examining their corporate structure and considering the tax implications. Specifically, companies that are currently structured as “pass-through” entities (e.g., an S corporation, partnership, or LLC taxed as an S corporation or partnership) are...
The ability to attract, retain, and reward a superior workforce is fundamental to every organization’s long-term growth. One way to achieve it is to offer stock options to employees, giving them a stake in the company’s value as part of their compensation package. In general, there are two forms of stock options: nonqualified stock opti...
Both New York State and New York City have recently passed a series of laws that significantly increased the protections against sexual harassment in the workplace. These laws outline additional and specific requirements—including the adoption of anti-sexual harassment policies and training—that employers must comply with over the next ...
In order to sustain their businesses for the long term, successful business owners tend to be thoughtful in their investments. They act like chess masters, deciding their next five moves in order to maintain a competitive edge and stay in the game. Yet throughout this business cycle, the RSM US Middle Market Business Index has shown that middle mar...
As the office of the controller becomes ever more strategic—creating higher levels of financial visibility to help drive growth and profitability—the financial organization’s relationship to the controller role must evolve as well. Specifically, today’s CFO needs to work closely with the controller to ensure that, one, the o...
Wealth may be structured to either protect assets or make them harder to reach by creditors. While fraudulent conveyance with respect to existing claims is an unavoidable risk, steps should be taken sooner rather than later. Understanding the various asset protection techniques that are typically used and the “fraudulent transfer” rules...
Transactions for the purchase and sale of businesses are rarely all cash deals. No matter the transaction structure, the use of financing to consummate the purchase creates a new dimension and layers of complexity requiring additional scrutiny and analysis by a discerning seller (or its principals). When financing the purchase of your business, the...
Employers are facing workplace retention challenges with increasing regularity. Whether this is the result of a shift in generational norms or a strong economy, employees seem to be more mobile than ever before. Looking at costs alone, recent studies have shown that the cost of recruiting a new employee can be as high as 200% of the former employee...
It is often thought that financial success comes with a certain level of financial freedom: the freedom to pursue passions, to take risks, to give back, and to make an even bigger impact. In the 2018 U.S. Trust Insights on Wealth and Worth® survey, the results revealed that only half of high-net-worth individuals have a plan to optimize the opportu...
Massive data breaches, constant collection of personal data—it may seem like privacy is dead in the digital age. But privacy, security, and trust are increasingly vital and intertwined in a data-driven society. For CEOs and boards, the existential question is less about the future of privacy and more about the future of their own organization...
How can risk executives embrace innovation while preparing for unknown risks such as a self-driving car commandeered by hackers, data analytics software that unintentionally reflects biases, or autonomous weapons that cause accidental casualties? This challenge was explored in the Risk in Review Study of more than 1,500 senior risk executives globa...
Are you maximizing protection when it comes to your online activity? Or do you open yourself to cyberattacks by clicking on links in promotional emails and allowing third-party applications to access your contacts and other personal information? To help identify areas where you might be at risk, follow the experts’ checklist of best practices...
With the passage of the Tax Cuts and Jobs Act in late 2017, virtually all areas of federal tax law saw sweeping changes. As a business owner, it’s particularly important to understand how these changes can work to your advantage as you consider your tax planning under today’s new laws. Five strategies—including restructuring your ...
Many employers and family offices find performance reviews can be a challenging task. But with a new take—one that turns a performance review into a career conversation—it can become an opportunity to establish a healthy dialogue that provides space to exchange feedback, assess performance, and “take the temperature” of the ...