The CEO Forum – July 2019

By Trilogy Financial
July 1, 2019
Share on:

10 CEOs Transforming Business Through Innovation

Click the “DOWNLOAD” button for Jeff Motske's feature.

You may also like:

By
Rebecca DeSoto, CDFA®
September 18, 2017

Generally, people purchase life insurance because they have a spouse or child they want to protect financially in case they pass away. But, there are several other reasons to buy life insurance that can benefit more than just those who need to protect their family. One of those benefits is accumulating tax-deferred, tax-free, cash value.  Just like a Roth IRA, the cash value in a permanent life insurance policy can grow on a tax-deferred status and be accessed tax-free, but without the consequence of incurring a 10% penalty if accessed before attaining age 59.5. “Living Benefits”, also known as “Accelerated Benefit Riders” are another advantage of life insurance other than the death benefit. As the name suggests, “living benefits” can be utilized in certain circumstances by the policy holder without passing away.

Common living benefits allow the policy holder to access all or some of the death benefit of their policy to help provide managed care if they are diagnosed with a critical or chronic illness. ABRs originated in the 80s and 90s when companies called “viaticals” found a market for purchasing life insurance policies from people that were very sick who realized they needed money now to help pay their medical bills more than their beneficiaries needed the death benefit. The insurance industry realized what was happening and started adapting policies to include Accelerated Benefit Riders to help their consumers get access to expensive medical care, outside of what health care would cover, while they were sick.

Living Benefits that are common today are terminal, chronic and critical illness or critical injury riders. It is important to talk to your advisor and read the fine print when considering different insurance policies because riders can differ significantly between insurance companies and policies. Terminal illness riders will allow the insured to accelerate a portion of their death benefit, tax-free if they are diagnosed with a terminal illness. Some companies require a diagnosis of 24 months or less to live while others require 12 months or less to live. A chronic illness rider is generally triggered when the insured has a long-term illness in which they are unable to perform two of the six “Activities of Daily Living” including eating, dressing, toileting, transferring, bathing, and maintaining continence. Some companies structure these riders to pay a large benefit upfront and some will provide a much smaller amount but spread over a long period of time. Lastly, critical illness/injury can include many things – heart attacks, stroke, cancer, brain trauma, severe burns etc. and the amount of benefit that is paid out depends on how critical the injury/illness is and how much it will affect the insured’s life span.

Because medicine and medical technology have advanced so rapidly, people are living much longer lives than they used to live. The US Census Bureau reports that at least 70% of people over age 65 will require some long-term care at some point in their lives . In 2014, the annual rate for a skilled nursing facility was $95,707 .  Because traditional, stand-alone Long-Term Care policies can be incredibly expensive, utilizing life insurance can be a great way to build assets throughout your income-earning years that are earmarked for advanced medical costs later on and can protect yourself and your loved ones from unknown health scares.

Riders are additional guarantee options that are available to an annuity or life insurance contract holder. While some riders are part of an existing contract, many others may carry additional fees, charges and restrictions, and the policy holder should review their contract carefully before purchasing. Guarantees are based on the claims paying ability of the issuing insurance company. Withdrawals from the policy may result in the reduction of the death benefit.

  1. US Census Bureau, American Community Survey 2013
  2. Univita Cost of Care Survey, Feb 2014
By
June Adams
May 10, 2021

Weak passwords can compromise the best security tools and controls. With a never-ending list of applications and services that users and consumers access, people may have dozens of passwords to maintain at any given time. Often, the temptation to use familiar terms such as pet names, favorite teams or the names of children or friends can cause risk since much of those details can be discovered by a simple examination of social media.

Creating strong passwords offers greater security for minimal effort. Weak passwords can compromise the best security tools and controls. With a never-ending list of applications and services that users and consumers access, people may have dozens of passwords to maintain at any given time. Often, the temptation to use familiar terms such as pet names, favorite teams or the names of children or friends can
cause risk since much of those details can be discovered by a simple examination of social media.

Under Lock and Key
You can buy a small padlock for less than a dollar—but you should not count on it to protect anything of value. A thief could probably pick a cheap lock without much effort, or simply break it. And yet, many people use similarly flimsy passwords to “lock up” their most valuable assets, including money and confidential information. Fortunately, everyone can learn how to make and manage stronger passwords. It is an easy way to strengthen security both at work and at home.

What Makes a Password ‘Strong’?
Let’s say you need to create a new password that’s at least 12 characters long, and includes numerals, symbols, and upper- and lowercase letters. You think of a word you can remember, capitalize the first
letter, add a digit, and end with an exclamation point. The result: Strawberry1!

Unfortunately, hackers have sophisticated password-breaking tools that can easily defeat passwords based on dictionary words (like “strawberry”) and common patterns, such as capitalizing the first letter.
Increasing a password’s complexity, randomness, and length can make it more resistant to hackers’ tools. For example, an eight-character password could be guessed by an attacker in less than a day, but a 12-character password would take two weeks. A 20-character password would take 21 centuries. You can learn more about creating strong passwords in your organization’s security awareness training. Your organization may also have guidelines or a password policy in place.

Why Uniqueness Matters
Many people reuse passwords across multiple accounts, and attackers take advantage of this risky behavior. If an attacker obtains one password—even a strong one—they can often use it to access other valuable accounts.

Here is a real-life example: Ten years ago, Alice joined an online gardening forum. She also created an online payment account and used the same password. She soon forgot about the gardening forum, but someone accessed her payments account years later and stole a large sum of money.

Alice did not realize the gardening forum had been hacked, and that users’ login credentials had been
leaked online. An attacker probably tried reusing Alice’s leaked password on popular sites—and
eventually got lucky.

Guarding Your Passwords & PINS. Passwords and PINS protect sensitive data and it's critical to keep them safe. Try these best practices to stay protected.

1. Do not write them down – Many make the mistake of writing passwords on post-it notes and
leaving them in plain sight. Even if you hide your password, someone could still find it. Similarly, do
not store your login information in a file on your computer, even if you encrypt that file.
2. Do not share passwords – You cannot be sure someone else will keep your credentials safe. At
work, you could be held responsible for anything that happens when someone is logged in as you.
3. Do not save login details in your browser – Some browsers store this information in unsafe
ways, and another person could access your accounts if they get your device.
4. Use a password manager – These tools can securely store and manage your passwords and
generate strong new passwords. Some can also alert you if a password may have been
compromised.
5. Never reuse passwords – Create a unique, strong password for each account or device. This
way, a single hacked account does not endanger other accounts.
6. Create complex, long passwords – Passwords based on dictionary words, pets’ names, or other
personal information can be guessed by attackers.

 

 

 

Get Started on Your Financial Life Plan Today