|
Call Today (888) 252-2990
IT Support Services
View All
Obsessive Support®

The hallmark of the Visory experience, our dedicated team of professionals provides a high degree of support for all your IT needs

Managed Infrastructure

Leading edge solutions that are always working to maintain the integrity of your firm’s IT backbone

Managed Security

Best in class security to protect your firm’s data and technology

Microsoft Resource Center

Tips, advice, and industry insight from our team of accountants and business owners to yours.

We’re here to help. Contact us for a consultation.
Application Hosting
View All
QuickBooks Online

Bypass the wait time and access Visory’s Obsessive Client Support®

Quickbooks

Take your business to new heights with Visory’s flexible QuickBooks hosting solutions

Sage

The same Sage you work in every day, only better

GoldMine

An affordable CRM for small- and medium-sized businesses, built to support your sales, marketing and customer service needs

Tax

Revolutionize your next tax season with added efficiency and mobility

3rd Party Applications

Access critical applications that are integrated seamlessly into your workflow, conveniently hosted on the same server

Cloud Platforms

Access affordable enterprise-grade hosting solutions with none of the IT burden

Watch your firm grow with the ultimate ease of access, security and flexibility.
Managed Services
View All
Managed Security

We’ll help you develop and implement the right cybersecurity policies and protocols to keep your firm secure and in compliance with regulatory guidance

Managed Infrastructure

We’re here to manage your firm’s IT activity, safeguarding the integrity of your infrastructure and devices, so you don’t have to

Obsessive Support®

Our dedicated professionals can be your outsourced IT team, so your internal resources don’t have to bear the burden of uptime alone.

Let’s talk about keeping your business and your data secure.
Cybersecurity
View All
Managed Security

We’ll manage your cybersecurity policies and protocols to keep your firm secure and in compliance

Zero Trust

Security that ensures everyone granted access is who they claim to be

Awareness Training & Testing

Educate and train your most important last line of defense – your people

End Device Protection

Protection where people and their machines intersect

Multifactor Authentication

Secure access to your data. Reduce the risk of compromise, prevent cyberthreats.

Email Filter

A different approach to protecting emails

Single Sign-on

Secure single sign-on access for a connected world

Backup

Backup your data for business continuity and compliance

SecureCloudDrive

Keep everyone on the same page. Any user, every device.

SASE

Secure connections for all your users, devices and networks

Written Information Security Plan (WISP)

Get started on a robust security plan with a WISP for your business

Virtual CISO

Protect your organization with the expertise of our Chief Information Security Officers (CISO) without having to hire a full-time resource

No firm is too big or too small for a data breach or a cyberattack. Let’s talk about your security.
Compliance
View All
Tax & Accounting

IRS 4557 and the FTC Safeguards Rule

Other Businesses

Complying with state and federal privacy regulations and more

Written information Security Plan (WISP)

Get started on a robust security plan with a WISP for your business

Awareness Training & Testing

Educate and train your most important last line of defense — your people.

Virtual CISO

Protect your organization with the expertise of our Chief Information Security Officers (CISO) without having to hire a full-time resource

Contact us to learn more about how we keep your business safe and in compliance
QB Desktop, QBO

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy

O365

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy

Liscio

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy

Knowbe4

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy

Sentinel One

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy

Lorem Ispum Dolor Software CTA

RIAs are increasingly aware that electronic communication with clients, custodians and vendors needs to be locked down. Whether they are taking the right steps to encrypt data is another story.

Other Articles: Cybersecurity For Small RIAs • Securities America Advisors Now Able To Text Clients
Trending Articles: Red Flags That Can Trigger An IRS Audit Of Client Tax Returns • Giant Recruiting Loans By LPL, Others Questioned By Consultants
Advisors and their clients communicate electronically in at least one of the following ways: through e-mail, portals or, increasingly, via text. After considering the options for securing these communications, advisors may be surprised to learn what actually offers the most protection.

Texting

Texting appeals to many for convenient and instant communication, but texts between RIAs and clients have many cybersecurity downsides. Texts are difficult to monitor, and though they can be encrypted, it’s challenging. Any files shared and uploaded in texts are unsecure and may be vulnerable.

Advisors who thrive on texting, then, should consider doing it through a platform such as Skype’s that offers more secure communications (as long as both parties use its service). But the current lack of security options is just one of a host of reasons RIAs should forgo texting with clients altogether.

One of the biggest reasons is the Securities and Exchange Commission’s Office of Compliance Inspections and Examinations (OCIE), which focuses on communications, including texts. If an advisor is going to respond to inbound texts, all sides of those exchanges must be encrypted and archived and should have data loss prevention enforcement applied. An encrypted texting service may be able to handle this, but the archiving costs can be expensive.

Client Portals

It is quite common for RIAs to use secure portals for sharing personal information that can be used to identify clients and other sensitive data. Client portals have been in existence for a while, and many offer good encryption methodologies while the information is both at rest and in transit.

Portals rely on one of two kinds of security: authentication and obscurity (when secrecy is built into the design). Think of it as the difference between being given a link and logging on to a website. Authentication uses encryption keys, or passwords, which are given to clients for their documents only, and it offers more protection and is preferred over obscurity, which relies on complicated URLs that can be hacked more easily.

A portal can also be used as a permanent storage vault for important documents. And though a portal requires clients to maintain another set of log-on credentials, RIAs tend to find them relatively easy to use.

While client portals offer more security than texting, they have several drawbacks. The lack of security on the client’s side can leave the portal vulnerable to breaches. In fact, portals typically leave copies of files on individual computers, which may be unencrypted, meaning the data can potentially be accessed by intruders.

Also, most portals store files without scanning them, which means they could download viruses. Meanwhile, auto syncing tools, which automatically synchronize files to a vault as well as to a client’s own computer and vice versa, bypass the security measures in place on the devices and servers. This means that they directly send and receive files, including those with viruses or malware.

RIAs can work around this by also using a vault that scans uploaded documents for viruses.

Simply storing identifying client personal information on a public vault can also expose that information to a hack. But by adding an additional level of encryption to the file, the level of security increases at the file level, as well as at the vault level and on the client’s personal computing devices.

Though the cost of portals is fairly inexpensive, most do not offer the full archiving capabilities necessary to show adherence with the OCIE’s archiving and data loss prevention recommendations. Very few portals offer users the ability to back up to previous versions, so RIAs still need some type of archiving solution that allows them to retrieve earlier versions of files.

E-mail

E-mail is the most commonly used form of client communication, so it is also the most exposed to hacks and data breaches. But with the right data encryption tools in place, it is actually e-mail that can be the most secure way to transmit and archive data and a client’s personal information.

Surprised? Don’t be. A cottage industry has grown up around securing e-mail, which means that encrypting, sending, receiving and archiving it are at least as secure as using a client portal, and maybe more so.

Some RIAs have said it can be difficult to know when to send encrypted e-mails, and the process has historically been cumbersome and inconvenient. But things have changed for the better. Today, some software can scan e-mail contents before sending them to determine whether encryption is even necessary. Users could also simply encrypt all their e-mails.

There are also seamless solutions offered by firms that allow encrypted e-mail to land directly in a client’s inbox, while others require clients to access encrypted e-mails through a portal. Either way, clients can view the e-mail securely, even on mobile devices. RIAs can also add a level of security to encrypted e-mails and attachments so they can be in “view only” mode—in other words, the e-mail cannot be forwarded, copied, saved or printed.

E-mail archiving is also relatively inexpensive next to texting and client portals. The cost can vary widely, though, landing anywhere from $20 to $6 to archive a mailbox, so it pays for RIAs to shop around.

Other Articles: Cybersecurity For Small RIAs • Securities America Advisors Now Able To Text Clients
Trending Articles: Red Flags That Can Trigger An IRS Audit Of Client Tax Returns • Giant Recruiting Loans By LPL, Others Questioned By Consultants
When it comes to data encryption, the hard part for most advisors is making the leap from convenience to security. Since the OCIE has made data encryption a necessity, for RIAs it is not a question of “if” but “how” to best protect a client’s personal data and other sensitive information. Advisors who dismiss the real possibility of client and firm data hacks are making a misstep that could have significant ramifications.

Wes Stillman is the chief executive officer of RightSize Solutions, a provider of cybersecurity and technology management services for wealth management firms. He can be reached at wn********@ri*****************.com.

INSIGHTS
What We’re Saying
Dec 12th, 2024
Protect Your Firm’s Future: E-Guide on Cybersecurity and Managed IT for RIAs
Cybersecurity and managed IT are no longer optional — they’re critical to the stability and success of Registered Investment Advisors (RIAs). Our latest e-guide offers
Dec 12th, 2024
Year-End Housekeeping for Accountants
Think your firm is safe from cyber threats? Think again. As we approach the year-end, cybercriminals are ramping up their attacks on firms just like
Dec 4th, 2024
IRS WISP Compliance Resource Hub
Navigating the complexities of IRS Written Information Security Plan (WISP) compliance can feel overwhelming. That’s why we’ve compiled all our top resources in one place—your
Nov 20th, 2024
Tax Season Readiness: Implementing the Security Six for CPA Firms
As tax season approaches, safeguarding sensitive client information should be a top priority for every CPA firm. The IRS recommends the Security 6, a set
Nov 19th, 2024
How CPA Firms Can Prepare for the Busy Tax Season
Tax season is always a hectic time for CPA firms, with tight deadlines, heavy workloads and strict compliance rules. To make this year smoother, focus
Nov 12th, 2024
Navigating the IRS WISP and Global Cybersecurity
Cybersecurity can feel overwhelming, especially with the growing number of regulations like the IRS Written Information Security Plan (WISP). But don’t worry—you’re not alone. Join
Copyright ©2024 Visory. All rights reserved.