The hallmark of the Visory experience, our dedicated team of professionals provides a high degree of support for all your IT needs
Leading edge solutions that are always working to maintain the integrity of your firm’s IT backbone
Best in class security to protect your firm’s data and technology
Tips, advice, and industry insight from our team of accountants and business owners to yours.
Bypass the wait time and access Visory’s Obsessive Client Support®
Take your business to new heights with Visory’s flexible QuickBooks hosting solutions
The same Sage you work in every day, only better
An affordable CRM for small- and medium-sized businesses, built to support your sales, marketing and customer service needs
Revolutionize your next tax season with added efficiency and mobility
Access critical applications that are integrated seamlessly into your workflow, conveniently hosted on the same server
Access affordable enterprise-grade hosting solutions with none of the IT burden
We’ll help you develop and implement the right cybersecurity policies and protocols to keep your firm secure and in compliance with regulatory guidance
We’re here to manage your firm’s IT activity, safeguarding the integrity of your infrastructure and devices, so you don’t have to
Our dedicated professionals can be your outsourced IT team, so your internal resources don’t have to bear the burden of uptime alone.
We’ll manage your cybersecurity policies and protocols to keep your firm secure and in compliance
Security that ensures everyone granted access is who they claim to be
Educate and train your most important last line of defense – your people
Protection where people and their machines intersect
Secure access to your data. Reduce the risk of compromise, prevent cyberthreats.
A different approach to protecting emails
Secure single sign-on access for a connected world
Backup your data for business continuity and compliance
Keep everyone on the same page. Any user, every device.
Secure connections for all your users, devices and networks
Get started on a robust security plan with a WISP for your business
Protect your organization with the expertise of our Chief Information Security Officers (CISO) without having to hire a full-time resource
IRS 4557 and the FTC Safeguards Rule
Complying with state and federal privacy regulations and more
Get started on a robust security plan with a WISP for your business
Educate and train your most important last line of defense — your people.
Protect your organization with the expertise of our Chief Information Security Officers (CISO) without having to hire a full-time resource
Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy
Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy
Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy
Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy
Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy
When hackers accessed the personal information of 57 million riders and drivers—media outlets went wild. Everyone was taking about how Uber covered up the hack. And over here at RightSize Solutions, all we could think was: Really?! That’s what you’re paying attention to?
Yes, Uber tried to sweep the breach under the rug. Yes, this is outrageous—but the focus on the cover up has detracted from the scariest part of this story.
Here’s what should really be shaking the world about this breach:
The breach began when the attackers accessed the information on GitHub.
GitHub is a site where software engineers and developers share code (often when more than one programmer is working on the same project)—and in this case, one of the developers of Uber left the login credentials for the Amazon Web Services account which housed the personal details that were accessed.
It was that simple. A developer left login information somewhere. It was found by hackers. And it was used to perpetrate a massive breach.
We were glad to see this angle addressed by Bloomberg Technology: Uber Hack Shows Vulnerability of Software Code-Sharing Services, which notes, “Hackers hunting for vulnerabilities routinely scan code posted publicly to Github for passwords and private encryption keys that developers have left visible.”
So even if your website is up…
Even if it’s running smoothly…
Even if it’s completely secure…
You have to ask the question: What happened before all that?
Who made the site? Are login credentials floating around somewhere online? Has private information been shared during the development process—by accident or on purpose—that you don’t even know about?
The real issue isn’t that Uber got hacked.
Or that they covered it up.
It’s this: Where was management to maintain security during the development process?
At RSS, we will keep your information secure every step of the way. Let’s talk about how.