The hallmark of the Visory experience, our dedicated team of professionals provides a high degree of support for all your IT needs
Leading edge solutions that are always working to maintain the integrity of your firm’s IT backbone
Best in class security to protect your firm’s data and technology
Tips, advice, and industry insight from our team of accountants and business owners to yours.
Bypass the wait time and access Visory’s Obsessive Client Support®
Take your business to new heights with Visory’s flexible QuickBooks hosting solutions
The same Sage you work in every day, only better
An affordable CRM for small- and medium-sized businesses, built to support your sales, marketing and customer service needs
Revolutionize your next tax season with added efficiency and mobility
Access critical applications that are integrated seamlessly into your workflow, conveniently hosted on the same server
Access affordable enterprise-grade hosting solutions with none of the IT burden
We’ll help you develop and implement the right cybersecurity policies and protocols to keep your firm secure and in compliance with regulatory guidance
We’re here to manage your firm’s IT activity, safeguarding the integrity of your infrastructure and devices, so you don’t have to
Our dedicated professionals can be your outsourced IT team, so your internal resources don’t have to bear the burden of uptime alone.
We’ll manage your cybersecurity policies and protocols to keep your firm secure and in compliance
Security that ensures everyone granted access is who they claim to be
Educate and train your most important last line of defense – your people
Protection where people and their machines intersect
Secure access to your data. Reduce the risk of compromise, prevent cyberthreats.
A different approach to protecting emails
Secure single sign-on access for a connected world
Backup your data for business continuity and compliance
Keep everyone on the same page. Any user, every device.
Secure connections for all your users, devices and networks
Get started on a robust security plan with a WISP for your business
Protect your organization with the expertise of our Chief Information Security Officers (CISO) without having to hire a full-time resource
IRS 4557 and the FTC Safeguards Rule
Complying with state and federal privacy regulations and more
Get started on a robust security plan with a WISP for your business
Educate and train your most important last line of defense — your people.
Protect your organization with the expertise of our Chief Information Security Officers (CISO) without having to hire a full-time resource
Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy
Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy
Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy
Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy
Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy
The internet is filled with both opportunities and dangers. While we navigate social media, conduct business, and enjoy the convenience of online services, cyber threats continue to evolve, leaving individuals, families, and businesses vulnerable to attacks. In a panel discussion hosted by Carey Pena at the Center for Positive Media, three cybersecurity experts—Brett Helgeson, CEO of Adopt Technologies; Victoria Saylor, Senior Manager of Education and Community Partnerships for Common Sense Media; and Ashley Richards, Founder of E-Squared Marketing—came together to discuss how to create a threat awareness plan and protect your digital footprint.
Here are some key takeaways from the conversation.
Brett Helgeson, CEO of Adopt Technologies, shared a critical perspective on threat awareness. “Cyber street smarts,” as Brett calls it, are all about being mindful of how we interact with the digital world. He explained that creating a culture of security begins with educating yourself and others about online threats. One of the most common mistakes individuals and businesses make is not paying enough attention to how they share personal information on platforms like Instagram or Facebook.
Brett emphasized, “A lot of the vulnerability comes from the data we willingly put out online.” For example, personal details such as birthdays, schools attended, or favorite pet names—all commonly used for password recovery—are easily accessible through social media profiles. He advises being cautious about what you share and always considering the potential consequences of oversharing.
Brett’s top tips for online safety include using strong passwords, enabling two-factor authentication, and avoiding untrusted websites. He highlighted how having long and complex passwords—rather than short ones with symbols—is more effective for security. While sometimes inconvenient, two-factor authentication is a crucial defense against unauthorized access.
Ashley Richards from E-Squared Marketing echoed this sentiment, adding that two-factor authentication should always be used with clear communication between those managing your accounts. For example, receiving a request for a two-factor code and not expecting it could be a sign that your account is compromised. Ashley recommends changing your password immediately in such cases and educating any team members or third-party collaborators about how to handle these requests securely.
For influencers, businesses, and individuals alike, social media accounts have become key targets for hackers. Ashley shared real-world examples of public figures losing access to their Instagram accounts, resulting in a personal and professional crisis. She warned of fraudulent emails that appear to be from legitimate sources like Facebook, which trick users into entering codes to reset passwords.
To minimize these risks, Ashley advises:
She also noted that if an account is no longer in use, it should be disabled or deleted to prevent hackers from exploiting it.
Victoria Saylor of Common Sense Media focused on how families can protect their children online. She urged parents to stay actively involved in their children’s digital lives and to have open conversations about media use. Victoria shared that, often, parents feel overwhelmed because children seem more tech-savvy, but it’s important to develop family media plans that set boundaries for online behavior.
Her advice includes:
Victoria also mentioned the importance of modeling responsible digital behavior, as kids will often follow their parents’ lead. “Our kids’ digital footprint begins the moment we post a picture or anything about them online,” she pointed out. Parents should also be cautious about seemingly fun online quizzes or games, which often collect personal data.
All three experts stressed the importance of staying vigilant at home or in business. Cybercriminals are becoming more sophisticated, constantly devising new ways to exploit vulnerabilities. Cyber threats can severely impact individuals and organizations, from phishing scams and fraudulent emails to social media hacks.
Brett emphasized that verifying any unexpected communications, such as password reset requests or account notifications, is essential by directly visiting the website rather than clicking on links in the email. “Pick up the phone and call if you’re unsure,” Brett added, explaining how a simple phone call can prevent a cyber disaster.
The panel agreed that creating a security culture within businesses and homes is vital. Whether educating employees on safe practices, helping kids navigate the online world, or using two-factor authentication, the key to staying safe is awareness, vigilance, and open communication.
Victoria said best: “Be a good media mentor for your kids. Talk to them early, often, and in a positive way. It’s not about scaring them but empowering them to make smart decisions online.”
In a world where we rely so heavily on the internet for work, communication, and entertainment, we must stay aware of the threats lurking in the digital space. By following the practical advice these cybersecurity experts share, individuals, families, and businesses can take proactive steps to protect their online presence and reduce the risk of cyberattacks. To hear the panel’s full conversation, check out the full podcast episode.
#onlinesecurity #cloudservices #cybersecurity #onlinehackers #inspiredmedia360 #centerforpositivemedia