When guiding how your organization drives value through tax efficiencies and financial reporting, don't be surprised if the C-suite is looking for tax leaders to be technology experts. The key is to be proactive in discussions with business leadership. Here are some things to watch out for as you approach those conversations and techn...
We have the answers
Search Results
As anticipated at the onset of the COVID-19 pandemic, there has been a significant uptick in cyber fraud. Cyber criminals are opportunistic and taking advantage of companies at their most vulnerable. This is a result of unique risk factors that have been heightened with the rapid shift to remote working arrangements. In this webinar with accom...
With growing amount of data breaches and stepped-up cybersecurity concerns related to COVID-19, along with increasing data privacy regulations, companies must drive awareness throughout their organizations and take advantage of benchmarking opportunities to properly deploy generally limited resources. To help strengthen your data security and priva...
If there were any lingering doubts about the necessity of digital transformation to business longevity, the coronavirus has silenced them. With rare exception, operating digitally is the only way to stay in business through mandated shutdowns and restricted activity. It’s go digital, or go dark. With the right approach, businesses can come ou...
Identity theft occurs when personal information about an individual is stolen and used typically for financial gain. Criminals can obtain personal information electronically through hacking or illegally purchasing information from the Deep Web/Dark Web. They can also obtain information through paper records that are not properly disposed of or secu...
Even when there's social distancing, family meetings are still important, maybe even more so to maintain family connectedness and sense of purpose. While connecting through technology can’t fully replace the experience of meeting in person as a family, you can make the experience more intimate. This report will help you organize and conduct a virtu...
A confluence of factors is conspiring to lay the groundwork for conditions increasingly threatening an end to the current business cycle. In this issue of The Real Economy, we present a number of easy-to-use metrics and data visualizations for middle market businesses to formulate judgments related to economic outlook risks. These include an array ...
Cryptocurrency is experiencing a surge in interest from mainstream investors and corporations worldwide. In this cryptocurrency series, we focus on the evolution of bitcoin moving from fad to mainstream; the role of virtual currencies in the global markets and the impact on the regulatory environment; the crime in the world of virtual currency, inc...
Widespread political volatility and rapid technological advances are spurring companies to question not just their resilience, but also their fitness for purpose in the new world order. In this report, we show how firms can move from generalized concerns to analysis, discussions, and actions in response to specific threats that may most disrupt the...
In this webcast, experts from Marsh’s Cyber Practices take a closer look at how changing cyber risk exposures, regulations, and best practices will change the cyber risk management landscape in 2019. Download and view the Cyber Landscape 2019 slides as you listen to the discussion that includes:The impact of new regulations and laws on the wa...
Profound political, economic, societal, technological, and environmental transformations are occurring at an unprecedented scale and have become a part of day-to-day business life. In this 14th edition of the World Economic Forum's Global Risks Report, undertaken with Marsh & McLennan Companies and other partners, we examine the evolving ma...
The 5G network puts us at the precipice of another change in technology with the potential to unlock brand new applications, many of which are still nestled deep in entrepreneurial minds. As the introduction of 5G networks looms over the horizon and continues its evolution of innovation, so do new technological possibilities, challenges, and opport...
Prevention matters, and knowledge is the key to prevention. By understanding exactly what identity theft is, how it happens, and how it affects you, you will be better able to prevent and, if necessary, resolve identity theft. Learn more about identity protection and some simple steps you can take to further reduce your susceptibility.
While cyber liability losses and privacy claims continue to rise, a new exposure has arisen. Hackers have determined that due to the increased sophistication in computer security, it may be easier to manipulate an individual rather than a machine. With enough policies and procedures in place, Social Engineering Fraud (SEF) is preventable. However, ...
According to the 2018 Global Risks Report, cybercrime is the top risk for business leaders in advanced economies, as well as the risk most likely to intensify. In fact, with the rising frequency of data breaches, cyber risk is now a common exposure for individuals, families, family offices, and their related enterprises. To help you assess your cyb...