Welcome to Visory

RightSize Solutions is now part of Visory

We have joined forces with True North Networks to bring enterprise-level technology solutions and support to RIAs, accounting firms and others.

Welcome to Visory

True North Networks is now part of Visory

We have joined forces with RightSize Solutions to bring enterprise-level technology solutions and support to RIAs, accounting firms and others.  

Welcome to Visory

Swizznet is now Visory

Our parent company name has changed, but our hosting services, solutions and Obsessive Support® have not. 

Call Today (913) 396-4600
IT Support Services
View All
Obsessive Support®

The hallmark of the Visory experience, our dedicated team of professionals provides a high degree of support for all your IT needs

Managed Infrastructure

Leading edge solutions that are always working to maintain the integrity of your firm’s IT backbone

Managed Security

Best in class security to protect your firm’s data and technology

We’re here to help. Contact us for a consultation.
Application Hosting
View All

Take your business to new heights with Visory’s flexible QuickBooks hosting solutions


The same Sage you work in every day, only better


An affordable CRM for small- and medium-sized businesses, built to support your sales, marketing and customer service needs


Revolutionize your next tax season with added efficiency and mobility

3rd Party Applications

Access critical applications that are integrated seamlessly into your workflow, conveniently hosted on the same server

Cloud Platforms

Access affordable enterprise-grade hosting solutions with none of the IT burden

Watch your firm grow with the ultimate ease of access, security and flexibility.
Managed Services
View All
Managed Security

We’ll help you develop and implement the right cybersecurity policies and protocols to keep your firm secure and in compliance with regulatory guidance

Managed Infrastructure

We’re here to manage your firm’s IT activity, safeguarding the integrity of your infrastructure and devices, so you don’t have to

Let’s talk about keeping your business and your data secure.
View All
Managed Security

We’ll help you develop and implement the right cybersecurity policies and protocols to keep your firm secure and in compliance with regulatory guidance

Zero Trust

Security that ensures everyone granted access is who they claim to be

Awareness Training & Testing

Educate and train your most important last line of defense – your people

End Device Protection

Protection where people and their machines intersect

Multifactor Authentication

Secure access to your data with multiple verification checks on identity, reduce the risk of compromise, prevent cyberthreats

No firm is too big or too small for a data breach or a cyberattack. Let’s talk about your security.
View All
Tax & Accounting

IRS 4557

Other Businesses

Complying with state and federal privacy regulations and more

Contact us to learn more about how we keep your business safe and in compliance
QB Desktop, QBO

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy


Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy


Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy


Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy

Sentinel One

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy

Lorem Ispum Dolor Software CTA

Based on what we see happening in the RIA industry, we expect 20% of financial advisory firms will have some type of security breach from an outsider this year. With investor protections as their foremost concern, no wonder regulators are asking independent registered investment advisors (RIAs): how ready are you for a security breach?

Cybersecurity readiness encompasses a firm’s plan for prevention, investor protection and breach management. At its best, cybersecurity management is a three-legged stool, with equal attention and care given to technology, policies and people for optimal results.
Technology: The Starting Point

Cybersecurity management starts with having the right technology in place to prevent or sidestep disaster. Regulators want to see the kinds of firewall protections RIAs have in place, the usage of passwords and encryption, and whether advisors are using tools like multifactor authentification.
Technologies like firewall hardware and software, antivirus, anti-spam, content filtering, malware software and the like are foundational and mandatory. They identify issues based on what is already known about cybercrime and hacks — including ransomware — and have a huge role to play in prevention.

RIAs should minimize the number of passwords that employees need and consider using password vaults to help them do so. There should be encryption technology in place for email communications and file access. Firms that use cloud-based document vaults for file sharing with clients should take a multi-factor approach by encrypting files prior to putting them in a cloud vault.
Mobile devices used for business purposes, including phones, laptops and tablets, need to be secure and “dumbed down” with limited access points into the firm in the event the device is lost or stolen. The alternative — an older, but nevertheless well-tested option — is to have a policy requiring users to have separate devices for their own personal use, and not for the business of the firm or its clients.

Policies: Managing What You’ve Got

With the right technologies in place, regulators want to know how RIAs monitor and manage them. Firms need enforceable policies and procedures that reduce the frequency of system issues and improve resiliency when issues do happen.

Good security protocol means backing up the firm’s data frequently, and knowing what the data back up to. It means running and reviewing reports and periodically testing backups to ensure they will work in a crisis.

Technology management and oversight also extends to the firm’s external technology providers. According to regulators, RIAs are responsible for knowing what their technology vendors do with their data, and whether their procedures would pass an audit. This includes doing due diligence on the vendor’s procedures for keeping the firm’s data safe from external breaches and for protecting it from internal sources. For example, what if a vendor encrypts viruses? If the vendor or application provider is doing backups, advisors need to know when the backups are done, who has access and how to get data back should they decide to switch providers.

People: The Weakest Link
The reality is that having technology and corresponding security policies in place is not enough. It is critical that the RIA’s people articulate, embrace and practice them. Human awareness is typically the weakest leg of the cybersecurity management stool, and it can cripple the other two legs.

The financial advisory industry generally has a naive attitude about cybersecurity, unaware of the far-reaching impact of its actions. They want to use personal mobile devices for work and vice versa, and can view mandatory passwords, firewalls and the like as obstacles, instead of protections in place for their own benefit. And why not? Anytime, anywhere on-demand access is expected in our society. Without the right training, advisors cannot expect their staff to think differently than anyone else.

RIAs need to provide their staff with awareness training and regularly update and review the firm’s security policies. Firms need to bring their technology protocols to life, and monitor to ensure all users comply. Staff also needs to understand the firm’s contingency plan in the event of a cybersecurity event or other business disruption, and how this plan is executed.

Advisors may not have the ability or inclination to do all of this internally, so finding a trusted partner (or partners) who understands industry regulations and how they translate into appropriate policies and solutions is key. For example, RIAs may want the help of a compliance officer to develop key documents. They may want objective advice about their technology options, and what makes the most sense for them. The Threat Is Nearer Than You Think

Hackers are looking for big payoffs for little effort, and the financial advisory industry seems to deliver. RIAs in particular can be slower to embrace new technology, have relatively lax cybersecurity policies, and control or have access to large amounts of assets, approaching or passing the billion-dollar mark in many cases.

But security breaches do not always originate from the outside, nor are they always intentional. The U.S. Federal Deposit Insurance Corp. (FDIC) breach happened in 2015 when an employee downloaded 44,000 files on its bank clients’ bankruptcy plans onto a USB thumb drive and then quit. Phishing emails have gotten more sophisticated, and following directives or clicking on links from suspicious emails is still commonplace.

Any simple, unexpected event has the potential to disrupt a firm’s business. Human error, a network or computer failure — the internet goes down — can trigger a business disruption that requires a well-thought contingency or security plan to kick into place.

Act Now

It is time for advisors to act against cybersecurity threats for the sake of their clients and for their firms. Wealth management firms are in the crosshairs for cyberthieves, and it is a question of when, not if, firms get hit.

The best approach combines the latest preventive and predictive technologies; well thought, enforced security policies and protocol; and awareness training to foster a sustainable cybersecurity culture in the firm.

RIAs that do nothing — or do not try — will be penalized by regulators. These firms are also leaving doors wide open with welcome mats for hackers and cyberthieves seeking access to client data and assets.

View this Article as a PDF
What We’re Saying
Nov 11th, 2022
10 Tips to Improve the Security of your Firm
1) Survey your technology environment 2) Update your cybersecurity policies 3) Emphasize cybersecurity training 4) Encourage active participation & awareness 5) Use encryption 6) Set
Nov 11th, 2022
Visory Named 2022 Corporate Partner of the Year by Financial Planning Association -Dallas/Fort Worth Chapter
Chesterfield, MO – Nov. 11, 2022 – Visory, a provider of technology management, cybersecurity and hosting solutions for the wealth management, accounting and construction industries,
Oct 26th, 2022
Cybersecurity Risk Survey
Take stock of your firm’s current security posture, identify key areas of risk, and assess your appetite for exposure. Swizznet’s Cybersecurity Risk Survey helps to
Oct 26th, 2022
RightSize Cyber-Chats, cybersecurity and technology issues facing financial advisors.
Welcome to RightSize Cyber-Chats, a new series of candid conversations about the most pressing cybersecurity and technology issues facing financial advisors. On each episode of
Oct 26th, 2022
RIA Spending to Rise with SEC’s Cybersecurity Proposed Rule’.
The Securities and Exchange Commission may soon have a heavier hand in registered investment advisor firms’ cybersecurity policies. The SEC voted last month to propose
Sep 28th, 2022
Why did we Build SwizzStack, and What is it?
At the beginning of 2022, Swizznet rolled out a new offering called SwizzStack (you see what we did there?) and we wanted to give you
Sep 27th, 2022
Three Steps for Mitigating Accounting Cyber Threats to Prevent Tax Season Attacks
If you think the middle of tax season “is not the time” to proactively improve your firm’s cyber security protocols, you may be playing right
Sep 19th, 2022
Four Steps to Lock Down Your Firm’s Security and Compliance Priorities
We’re coming up on almost six months since the last Scaling New Heights conference, but I still vividly remember the moment at that event when
Sep 11th, 2022
Swizznet Prevents Ransomware Attack Against Construction Company
It started out as a quiet Tuesday. Then, halfway into his second cup of coffee, Swizznet’s Security Engineer was alerted to suspicious activity occurring inside
Copyright ©2022 Visory. All rights reserved.