|
Call Today (888) 252-2990
IT Support Services
View All
Obsessive Support®

The hallmark of the Visory experience, our dedicated team of professionals provides a high degree of support for all your IT needs

Managed Infrastructure

Leading edge solutions that are always working to maintain the integrity of your firm’s IT backbone

Managed Security

Best in class security to protect your firm’s data and technology

Microsoft Resource Center

Tips, advice, and industry insight from our team of accountants and business owners to yours.

We’re here to help. Contact us for a consultation.
Application Hosting
View All
Quickbooks

Take your business to new heights with Visory’s flexible QuickBooks hosting solutions

Sage

The same Sage you work in every day, only better

GoldMine

An affordable CRM for small- and medium-sized businesses, built to support your sales, marketing and customer service needs

Tax

Revolutionize your next tax season with added efficiency and mobility

Liscio Client Communication

Liscio mobile app streamlines client communications and makes security automatic.

3rd Party Applications

Access critical applications that are integrated seamlessly into your workflow, conveniently hosted on the same server

Cloud Platforms

Access affordable enterprise-grade hosting solutions with none of the IT burden

Watch your firm grow with the ultimate ease of access, security and flexibility.
Managed Services
View All
Managed Security

We’ll help you develop and implement the right cybersecurity policies and protocols to keep your firm secure and in compliance with regulatory guidance

Managed Infrastructure

We’re here to manage your firm’s IT activity, safeguarding the integrity of your infrastructure and devices, so you don’t have to

Let’s talk about keeping your business and your data secure.
Cybersecurity
View All
Managed Security

We’ll help you develop and implement the right cybersecurity policies and protocols to keep your firm secure and in compliance with regulatory guidance

Zero Trust

Security that ensures everyone granted access is who they claim to be

Awareness Training & Testing

Educate and train your most important last line of defense – your people with Visory and industry-leading KnowBe4.

End Device Protection

Protection where people and their machines intersect

Multifactor Authentication

Secure access to your data with multiple verification checks on identity, reduce the risk of compromise, prevent cyberthreats

Written Information Security Plan (WISP)

Get started on a robust security plan with a WISP for your business

No firm is too big or too small for a data breach or a cyberattack. Let’s talk about your security.
Compliance
View All
Tax & Accounting

IRS 4557

Other Businesses

Complying with state and federal privacy regulations and more

Contact us to learn more about how we keep your business safe and in compliance
QB Desktop, QBO

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy

O365

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy

Liscio

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy

Knowbe4

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy

Sentinel One

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy

Lorem Ispum Dolor Software CTA

There are five key guidelines for RIAs to follow while working remotely from home during the coronavirus pandemic, according to Wes Stillman, CEO of RightSize Solutions, a provider of cloud-based cybersecurity and IT management solutions for the RIA industry.

“During difficult times, it’s easy for us to maybe abandon what we believe for the short term,” he said during the recent webcast “Cybersecurity: What You Need to Know When Working from Home.”
Despite the name of the webcast, he and two other industry executives covered best practices in what they called the big “three Cs” that RIAs working from home must concentrate on: cybersecurity, communications and continuity.

The “RSS Five”

  1. “At the very least, make sure you’re using multi-factor authentication” and be “extremely careful about phishing emails,” Stillman said.
  2. Adhere to your compliance policies.
  3. “Keep communicating” with your team and clients.
  4. Execute on your disaster recovery plans.
  5. Repeat what is working, document it, refine it and fix what’s not working.

Cybersecurity Best Practices
“We are… seeing a huge increase in cyberattacks that are trying to take advantage of maybe some vulnerabilities presented by our employees trying to work from home,” Stillman said, adding: “Phishing attacks still remain today as the No. 1 attack vector out there.”
Citing FBI findings, he said there has been a rise in fraud schemes around COVID-19, including charitable contributions, general financial relief, airline carrier refunds, fake vaccines and fake testing kits.

“We have seen a huge rise in cases where advisor clients are being hacked first,” he told listeners, warning them that, unless you are expecting an email, “do not enter information or open those files” you receive in those emails because they are probably phishing attacks. Email systems are under attack and bad actors can have full use of RIA clients’ emails if those clients have been hacked, so it is best to follow protocols, he said.
Using multi-factor authentication is “your first line of defense and will help tremendously,” he said.

Meanwhile, virtual private networks provide an extra layer of security. However, advisors should definitely look at their privacy statements because many VPNs will sell your information, he warned. “RightSize has tested several of them,” he said, adding there is another negative to them: “They will slow your internet connection down and may prevent access to some sites that you need to access.” When that happens, however, you can just turn them off while accessing the sites you need, he noted.

“In fact, you may be better off with just using a hotspot right now” while working from home during the pandemic, he said.

While working from home, it is also important to “make sure you have changed the default passwords on your router and your Wi-Fi access points,” he told listeners, adding: “We strongly discourage the use of home-based computers or tablets to access your core business applications right now” because those devices likely lack adequate security protection, he said.

The use of conditional access is also important because it “ensures that only those compliant and known devices can be used to access things like your email, files and applications,” he pointed out. It also helps manage when someone is hit with a phishing attack and accidentally gives away their credentials, he said, adding that when using conditional access, the bad actor cannot get into one’s system because they do not have a compliant device. It also helps a firm’s IT department understand that somebody at the firm has had their credentials compromised and action needs to be taken, he said.
If an advisor is not using a compliant device, “we urge you to use virtual desktops” because they are “much more secure — it puts another layer between you and the bad guys,” he said. However, the “con” with them right now is that the Internet is extremely slow and virtual desktops need good internet connectivity to work best.

The Importance of Communication
It is more important than ever for advisors to make sure they are communicating often with their clients and others at their firms, according to Jeff Groves, president of compliance service provider ComplianceWorks.

It is important to pay attention to the same protocols one uses at the office to communicate with the public, he said on the webcast.

Advisors should avoid using text inappropriately for unapproved, private information, he warned, adding an advisor can get a “five-figure fine” for texting inappropriately.

It is also important to understand the security limitations of clients with whom you are communicating, and their environment should be as secure as yours, he warned.

Five Key Communication Guidelines

  1. Use business email domains for business communications.
  2. Confidentiality should be considered when printing and discarding all documents.
  3. Industry compliance procedures are still in effect while working from home.
  4. Some remote tech platforms, including Zoom, are not appropriate for private/proprietary material.
  5. Understand the limitations of home-based systems and allocate accordingly.

The Keys to Continuity
“From a continuity perspective, you want clients to perceive that you are just as organized when working remotely as when everyone is in the office,” advised consultant Sue Glover, president of Sue Glover & Associates. She also stressed the importance of continuing to hold team meetings of some sort while everybody at a firm is working remotely.

It is important that clients perceive that a firm’s staff is working together as a team to ensure their trust in the firm, she said. Consistent client messaging is one way to send a signal to clients that you are working together as a team, she said.

Another important piece of advice all advisors might want to consider: “Make sure all client communications are entered into your” customer relationship management system “so that everyone knows who said what and when,” she said. And the more information that an RIA enters into the firm’s CRM system the better, she said, suggesting they document as much as possible from all client discussions, including the thoughts the advisor had during the talk and the reasons for that thinking because it is highly possible details from the discussion won’t be remembered otherwise.

She also urged RIAs to repeat practices that are working while working remotely, document it all, refine it and fix what’s not working.

— Check out How Advisors Can Unlock Competitive Advantages While Stuck at Home on ThinkAdvisor.

INSIGHTS
What We’re Saying
Feb 6th, 2024
The What, Why and How of a Cyber Attack
There is so much information out in the world around cyber-attacks and cyber security; much of the advice is unreasonable for small to medium sized
Feb 6th, 2024
Don’t Gamble with SEC Compliance: Assessing Your IT Vendor’s Capabilities
Is your current local IT vendor equipped to handle the rigorous demands of SEC audits for Registered Investment Advisors (RIAs)? In today’s complex regulatory landscape,
Jan 29th, 2024
The Future of AI in Cybersecurity
Artificial intelligence (AI), with its ability to learn, adapt, and predict, has emerged as a powerful tool in the arsenal of both cybersecurity professionals and
Jan 29th, 2024
Cybersecurity Awareness Training for Employees
In the intricate world of digital defense, your employees are the formidable frontline. They can either be the shield that deflects a potential information security
Jan 19th, 2024
Empowering RIAs: The Crucial Role of SOC 2 Type II Certified Cybersecurity Vendors
The dynamic world of financial services mandates robust cybersecurity measures, especially for Registered Investment Advisors (RIAs). Partnering with SOC 2 Type II certified cybersecurity vendors
Jan 8th, 2024
A Secure Start: Why it’s Essential to Review your Cybersecurity Strategies with your Managed Service Provider in the New Year
Reflecting on our cybersecurity strategies is crucial as we usher in a new year filled with possibilities and opportunities. The digital landscape is constantly evolving,
Copyright ©2024 Visory. All rights reserved.