In the wake of the COVID-19 pandemic, cybercrime syndicates and hackers have been busy: the FBI estimates there’s been an 400% spike in cybercrimes since the onset of the pandemic. In this infographic, learn what’s at stake for affluent and high-net-worth individuals—and how to build protection from the surge in cybercrime.
We have the answers
Search Results
Crafting the right message can be tricky at the best of times—add a global pandemic and new vaccine to the mix and the process can be downright terrifying. Depending on the needs and culture of your organization, you may use one or a combination of these communication approaches when deciding on whether to roll out a vaccination awareness cam...
The more we use social media to share updates, pictures and videos with friends and family, the easier it can be for cybercriminals to steal our information. See how you can use social media safely to protect yourself and your private information from cybercriminals.
Going on the internet can put your devices and personal details at risk from unexpected online threats like malware and ransomware. Learn about the threats and see some internet safety tips to help keep your devices and data safe when you browse online.
Organizations across the wealth management landscape face an array of technology risks that are growing more prominent in a post-COVID environment. While keeping an eye on the future and building resiliency, learn how to turn five tech risks—including the rise of disruptive technologies—into an opportunity that goes beyond adopting...
The COVID-19 pandemic has led to an acceleration of adoption of cloud solutions and other remote access tools. However, hasty adoption of any new technology that is not combined with robust security frameworks, policies, and controls can leave businesses vulnerable. A formal vendor management process and having specific controls in place can mean t...
Third-party vendors can range from custodial companies, to IT services, to professional service firms. Whatever their contracted function, they have access to your physical premises and/or your network data. So how can you make sure that when you’re signing a contract with an outside vendor, you’re not exposing yourself and your clients to excessiv...
More than ever before, families and individuals are creating trusts and limited liability companies and transferring legal ownership of one or more of their properties to these entities. Very often these arrangements are an important component of a family’s overall financial and wealth management strategy. But without an insurance program tha...
In reaction to the volatility in the current financial markets and economic recession, FOX is exploring ways in which ultra-wealthy individuals and their advisors are adjusting their financial strategies and re-evaluating known and emerging risks. This 2009 FOX Financial Executives Forum presentation examines how investor thinking has changed and w...
In this 2009 Financial Executives Forum presentation, Paul Viollis, CEO of Risk Control Strategies, leads a discussion of new and old threats to our personal safety. From terrorism to cyber security, Dr. Viollis weaves actual experiences into best practices for keeping you and your family secure.
Have we felt the impact of the economic crisis on the professional liability market? In this 2009 Financial Executives Forum, hear from Jim Kane, President, HUB Personal Insurance, and Tom Handler, Partner of Handler Thayer, LLP on trends, errors and omissions in professional liability coverage for directors, officers and trustees.
Anyone who has participated in the acquisition or sale of a company will recognize the typical path of a deal: from flirting to tough questions to hard bargaining to—finally—handshake. Inevitably, however, the road detours from the exhilaration of accord to the anxiety of suspicion. The buyer wants assurance that all the seller's pr...
In this 2009 FOX Wealth Advisor Forum presentation, hear from an accomplished branding and marketing expert who will discuss insights from his quantitative analysis of high-net-worth and ultra-high-net-worth behaviors. Dr. Taylor will address the way that the economic downturn and market volatility are affecting the investment strategies of ultra-w...
Affluent individuals and families are increasingly becoming targets of criminal activity, such as stalking, kidnapping, theft, harm and vandalism. Does your family use any wireless communication devices? Do you regularly check for spyware on your computers? How do you dispose of sensitive information? These are just some of the potential vulnerabil...
On September 7, Equifax, one of the three major credit agencies, announced that it had suffered a major data breach. Unidentified hackers exploited a vulnerability in the company’s website software to gain unauthorized access to company data from May through July, impacting as many as 143 million consumers. The incident is yet anoth...