Seven Microsoft Gems: Empowering Your RIA For Security & Compliance
Release Date: 02/06/2024
The RIA Tech Talk Podcast
In this episode of RIA Tech Talk, we tackle a question that’s been popping up more and more: Can an RIA run successfully on Macs? While many RIAs default to Windows for compatibility with financial software, there’s a growing interest in using Macs for their security features, user-friendly experience, and overall longevity. Here are the highlights of this podcast episode: 1. Why Some RIAs Hesitate to Use Macs Common concerns include compatibility with financial software and misconceptions about Macs’ security and functionality. 2. Productivity and Software Compatibility For many...
info_outlineThe RIA Tech Talk Podcast
In this episode, Todd Darroca and David Kakish explore the often-overlooked financial benefits of owning your IT hardware. Understanding the difference between owning and renting IT hardware can significantly impact your bottom line. Join us as we break down the pros and cons, help you avoid common pitfalls, and provide you with actionable insights on why owning your IT hardware could be the smartest move for your RIA. In this episode, we explore: The Concept of Hardware as a Service (HaaS) What is it, and why some IT providers promote it? The Real Cost and Downsides of Renting Hardware...
info_outlineThe RIA Tech Talk Podcast
In this episode of RIA Tech Talk, David and Todd are again joined by Christopher Johnson of TrigaByte Technologies, to discuss the ideal technology stack for new RIA firms with a small team. About the Guest: Christopher Johnson: Founder of Byte Technologies with over 30 years of experience in financial services, specializing in operations, technology, and compliance. He offers unique expertise in helping RIAs optimize their technology choices and implementation. Key Takeaways from Christopher: 1. Choosing the Right Platform: Microsoft vs. Google · ...
info_outlineThe RIA Tech Talk Podcast
In this episode of RIA Tech Talk, we welcome Christopher Johnson of TrigaByte Technologies to the show. He brings insights into CRM options for RIAs and answers some of our FAQs for each. We cover some of the top CRMs used by RIAs including: · · · · · · Christopher answers our top questions to help you make the best decision...
info_outlineThe RIA Tech Talk Podcast
In the latest episode of the RIA Tech Talk podcast, Todd and David talk about how more and more RIAs are embracing hybrid work and why endpoint protection is crucial. Whether your firm is fully remote, hybrid, or predominantly office-based, securing your workforce wherever they operate is essential. Hybrid work offers flexibility and employee benefits, but it also brings unique security challenges that firms must address. Importance of Endpoint Protection RIAs must prioritize endpoint protection to secure devices such as laptops, smartphones, and tablets used by employees working...
info_outlineThe RIA Tech Talk Podcast
In this episode of RIA Tech Talk, we talk about how most RIAs with between 5 and 25 employees are not fully utilizing their Microsoft 365 subscription. These firms are often paying for 3rd party tools that are not as good as those provided by Microsoft and, worse yet, work in silos. Tune in to hear how you can run your entire business on Microsoft: Maximizing Microsoft 365: Overcoming Underutilization There is a common issue among RIAs: the underutilization of Microsoft 365. Many RIAs continue to pay for third-party tools that offer similar or inferior capabilities to those included in...
info_outlineThe RIA Tech Talk Podcast
In this episode of the RIA Tech Talk podcast, David and Todd discuss the challenges of a current RIA WorkSpace client who had similar IT issues to many RIAs out there. This company went from a frustrating, time-demanding experience with their previous IT provider, to a trouble free one with RIA WorkSpace. Background on the RIA · 13 employees all working remotely · Based in Dallas, TX with offices in San Diego, Minneapolis and Denver. · The 4 office locations were in shared...
info_outlineThe RIA Tech Talk Podcast
This episode of the RIA Tech Talk Podcast take a closer look at the confusion and best practices around Bring Your Own Device (BYOD) and what works best for RIA firms. In this episode, we cover: Smart phones and handheld devices It’s pretty standard for RIAs to use personal smartphones. We can create a separate and secure “container” for work applications on that device so work-related activities are secured. This is most common with email, but it is also done for other work applications. Desktop or laptops (Windows or Mac) It’s very rare that employees...
info_outlineThe RIA Tech Talk Podcast
In this episode of the RIA Tech Talk Podcast, we answer some of the questions we get from RIAs about the need for onsite IT support. The answers we give are for RIAs with between 5 and 25 employees. These are the firms we work with most often and for smaller or very large firms, the answers might be different. Here are the questions we answer in this podcast. 1. Does my RIA need on-site support? 2. Does on-site support offer something that remote support can’t? 3. ...
info_outlineThe RIA Tech Talk Podcast
In this episode of the RIA Tech Talk Podcast, David talks about onsite servers and even though many RIAs still have them, they’re unnecessary and better solutions are out there. What does your onsite server in your office do today? Servers today are largely used for files only. Most of today’s email is “hosted email” and is commonly hosted with Microsoft 365. Most applications RIAs and financial advisors use are web based so an onsite server isn’t required for them. There is less and less that needs to be hosted onsite in...
info_outlineThe RIA Tech podcast, presented by RIA WorkSpace, is on a mission to simplify the complex world of technology for Registered Investment Advisors (RIAs).
In this episode, hosts Todd de Rocha and David Kakish discuss seven key Microsoft features that can empower RIAs in terms of security and compliance. These features are often underutilized by RIAs and implementing them can enhance cybersecurity and ensure regulatory compliance.
Here’s the list we cover in this podcast:
1. Multi-Factor Authentication (MFA). MFA adds an extra layer of security by requiring users to provide two or more forms of authentication before granting access. It's a fundamental security measure that every RIA should implement.
2. Email Encryption. Microsoft offers a user-friendly email encryption feature that enables users to easily encrypt sensitive emails on demand, ensuring the secure transmission of confidential information.
3. Email Archiving. Many RIAs are already paying for third-party tools like Smarsh or Global Relay for email archiving, but Microsoft's email archiving option can save money and provide a seamless solution that meets SEC compliance requirements.
4. Microsoft Teams Archiving. RIAs using Microsoft Teams for communication can efficiently archive their Teams chats and conversations without the need for third-party tools.
5. File Archiving. For RIAs using OneDrive or SharePoint, Microsoft offers file archiving options that meet SEC compliance requirements. This feature allows you to keep records of previous document versions.
6. Data Loss Prevention (DLP). DLP helps prevent accidental data leaks by automatically detecting and protecting sensitive data, such as social security numbers or client information in emails.
7. Secure Single Sign-On for web-based applications. This feature enhances productivity and security by allowing employees to access various web applications with a single sign-on tied to their Microsoft Active Directory account.
These Microsoft features are fundamental to improve security and compliance, particularly in the context of remote work. These features are user-friendly and accessible, making it easy for RIAs to safeguard their sensitive data and ensure the security of their operations. RIAs are encouraged to take action, whether by configuring these features themselves, reaching out to their technology provider, or contacting RIA WorkSpace for assistance.
Don't be a sitting duck; take action to protect your business and client information.