Blog

  • Powering your business: The essential role of a quality UPS

    Powering your business: The essential role of a quality UPS

    Power outages are a constant threat for businesses of all sizes. Imagine the chaos that ensues when operations grind to a halt, computers crash, and valuable data is at risk. This nightmare scenario can be avoided with a simple yet crucial investment: a quality uninterruptible power supply (UPS). Let’s explore why a UPS is not just a safeguard, but a strategic necessity for any business seeking uninterrupted productivity.

    What is a UPS?

    A UPS serves as a backup power source for your devices. When the main power fails, a UPS kicks in seamlessly, ensuring your equipment continues to run without interruption. UPS units come in three primary types — online, line-interactive, and standby — each with unique features designed to handle different levels of power stability.

    Online UPS systems offer continuous power from an inverter, making them ideal for protecting sensitive equipment and ensuring a seamless transition during an outage. Meanwhile, line-interactive UPS systems provide automatic voltage regulation, which is perfect for areas with frequent voltage fluctuations. And finally, standby UPS systems are the most basic type, offering a simple switch-over to battery power when the main power goes out.

    The benefits of a quality UPS for your business

    Safeguarding your data, equipment, and productivity are just a few of the reasons why investing in a quality UPS system is crucial.

    Data protection

    With data being the lifeblood of any modern business, protecting it should be a top priority. A quality UPS system ensures that you never lose crucial information during an unexpected power cut. By providing uninterrupted power, a UPS allows you to save open files and complete data backups without the risk of corruption. This feature is especially crucial for businesses that handle sensitive customer data or rely on real-time data processing.

    But while a UPS is a great start to protecting your data, it’s also essential to have a robust data backup and recovery plan in place. This way, in the event of a more significant disaster, your data is not only safe but also easily recoverable.

    Equipment protection

    Sensitive electronic equipment can be easily damaged by voltage surges and spikes, which often occur during power outages. A UPS system shields your equipment from these electrical anomalies, extending their lifespan and maintaining their performance.

    Consider the potential costs of repairing or replacing damaged equipment. Add to that the cost of downtime and lost productivity, and you’ll see how a quality UPS system is a cost-effective investment for any business.

    Productivity and efficiency

    Power outages not only disrupt your business but also directly impact productivity. Imagine the hours lost as employees wait for power to return, or the revenue lost due to missed sales opportunities. A UPS system prevents such disruptions, keeping your business operational and employees working without interruption.

    Moreover, a UPS also helps maintain efficiency by preventing equipment failures due to power fluctuations. This means fewer service calls and less downtime for maintenance and repairs, allowing you to focus on core business tasks instead.

    UPS or generator? Weighing your options

    When considering backup power solutions, business owners often weigh the choice between a UPS and a generator. While both serve the purpose of keeping your business operational during an outage, they have distinct differences.

    A UPS offers instant, seamless power transfer, making it ideal for protecting sensitive electronics and ensuring immediate continuity. Generators, on the other hand, can provide power for longer durations but may take time to start, leaving a gap in coverage. Additionally, generators require regular maintenance and fuel, which can add to operational costs.

    While generators might be suitable for larger businesses with more extensive power needs, a UPS is often the better choice for small businesses seeking a cost-effective, low-maintenance solution. Ultimately, the right choice depends on your specific business needs, budget, and the critical nature of the equipment you need to protect.

    It’s best to be prepared

    Power outages can strike at any time, and unfortunately, they are often unpredictable. But by investing in a quality UPS system, you can confidently keep your business running without interruption. Don’t wait until the next outage to realize the importance of backup power — make the smart choice now and safeguard your operations from the unexpected.

    If you’re unsure which UPS system is right for your business, contact us and we’ll be happy to help you find a solution that meets your needs.

     

    Published with permission from TechAdvisory.org. Source.

  • Unmasking fileless malware: How hackers attack without a trace

    Unmasking fileless malware: How hackers attack without a trace

    The techniques cybercriminals use to hack into systems are not any simpler. Today, there’s a glut of malware types that don’t rely on traditional methods for infiltration. Fileless malware, in particular, is an incredibly elusive and dangerous threat that can bypass even the most sophisticated security measures.

     

    What is fileless malware?

    Fileless malware is a type of malicious program that operates without using executable files to infect a computer like how traditional malware does. Instead, it operates within the system’s memory (RAM) or uses legitimate programs already running on your machine to covertly infect your systems.

    The initial exploit, or intrusion point, can vary, but the most common method used by cybercriminals is through phishing emails containing malicious links or attachments. Once clicked or opened, the malware will execute its code and spread quickly by escalating its privileges and exploiting vulnerabilities in the operating system or applications. It typically leverages built-in system tools such as PowerShell and WMI (Windows Management Instrumentation) to carry out its malicious activities without ever leaving a single file or detectable footprint on the hard drive.

    Although fileless malware doesn’t install itself permanently on a system, it can establish a persistent foothold by modifying system configurations or scheduling tasks to run malicious scripts every time the system boots up. Its ability to adapt and mimic legitimate processes means it can avoid detection for longer periods, leading to greater damage over time.

     

    How to mitigate fileless malware threats

    To protect against fileless malware, businesses need to take a proactive approach and implement multiple layers of security measures. Here are key strategies for mitigating the risk of fileless malware attacks:

    Implement advanced endpoint protection
    Rather than relying solely on basic antivirus software, which may not detect fileless threats, it’s crucial to deploy advanced endpoint protection solutions that can monitor system behavior. These tools can identify suspicious activity in real time, even if no files are involved, by recognizing patterns of abnormal memory usage or unexpected behaviors in trusted programs.

    Utilize application whitelisting
    Application whitelisting is the practice of allowing only approved programs to run on a system. It can be accessed through the operating system’s security settings or through third-party software, where you can determine which applications and scripts are allowed to run based on their digital signatures, publisher, or file paths. By implementing a strict whitelist, businesses can prevent unauthorized programs from running and stop fileless malware in its tracks.

    Regularly update software
    Exploiting software vulnerabilities is a common entry point for fileless malware. To prevent this, it’s critical to ensure that all your software, operating systems, and third-party applications are up to date with the latest patches. Regular patching closes known vulnerabilities that attackers could use to compromise your system.

    Train employees on phishing awareness
    Many fileless malware attacks begin with a phishing email that tricks the user into clicking a malicious link or opening an infected document. Providing regular cybersecurity training to your employees on how to recognize phishing attempts, suspicious links, and unexpected attachments can significantly reduce the chances of malware gaining initial access to your network.

    Segment networks
    If a fileless malware attack successfully infiltrates one part of your network, segmentation can contain the threat, prevent it from spreading, and reduce the overall impact of fileless malware. To segment your network, you can create separate subnets or VLANs and implement strict access control policies that prevent unauthorized communication between different parts of the network.

    Monitor and analyze network traffic
    Network traffic monitoring can identify anomalies or unusual communication patterns that might indicate a fileless malware infection. For instance, if a system suddenly starts communicating with unknown or suspicious IP addresses, it could be a sign of malware activity. Early detection of any unusual network behavior can help organizations respond quickly and mitigate potential damage.

    Fileless malware is incredibly sophisticated, and your technical expertise must match its stealthy and evasive nature. If you don’t have cybersecurity experts on your team, working with a managed IT services provider like us can help you implement the necessary security measures and continuously monitor your systems for any signs of fileless malware. Contact us today to protect your business from this growing threat.

     

    Published with permission from TechAdvisory.org. Source.

  • MFA fatigue attacks – SCAM OF THE MONTH

    MFA fatigue attacks – SCAM OF THE MONTH

    Miguel is a dedicated employee in the corporate offices of a department store chain. As part of his daily routine, he uses multi-factor authentication (MFA) to access his work applications. One morning, while he was focusing on a crucial project, his phone buzzed with a push notification asking him to approve an MFA request. Distracted, he declined the request, thinking it was a mistake. But the notifications kept coming—buzz after buzz, interrupting his workflow.

    Frustrated by the barrage of alerts, Miguel approved one of the notifications, hoping it would stop the interruptions. The alerts did stop, but this was exactly what the attacker was counting on. A cybercriminal had obtained Miguel’s login credentials through a phishing scam and was now using an MFA fatigue attack to gain access to his company’s system. By the time Miguel realized his mistake, the attacker had already infiltrated the network, leading to a significant security breach.

     

    Did you spot the red flags?

    • Miguel should have discussed the issue with a manager or IT worker before approving the verification attempt.
    • Miguel should not have approved the MFA request since he did not try to log into his account in the first place.

     

    What you should know about this scam

    If you receive multiple unexpected MFA requests, do not approve them. Immediately report the incident to your IT department and change the related account’s password.

    Instead of using push notifications, try other types of MFA. Consider using biometric authentication (like face scans or fingerprints) or authenticator apps, which are less susceptible to MFA fatigue attacks.

  • Citrix ShareFile or Microsoft SharePoint? What your RIA firm needs to know

    Citrix ShareFile or Microsoft SharePoint? What your RIA firm needs to know

    For a long time, Citrix ShareFile was the go-to choice for many registered investment advisors (RIAs) when it came to securely storing and sharing confidential client information. However, with the rise of cloud-based collaboration tools, Microsoft SharePoint has stepped forward as a popular alternative for managing documents and data within RIA and financial advisory firms.

    This article explores both platforms, comparing their features and advantages, to help you determine which document storage solution is best for your practice.

    Understanding Citrix ShareFile and its limitations

    Citrix ShareFile is known for its extensive file sharing and storage capabilities. It offers features such as secure file transfer, client portals, and electronic signatures. For RIAs and financial advisors, these features are essential for sharing sensitive data with clients and internal collaboration.

    However, ShareFile isn’t without its drawbacks. One of the main complaints is the cost. While the platform offers a range of features, these come at a price that might be prohibitive for smaller firms. Additionally, ShareFile can be complex to set up and manage, particularly for those who are not tech-savvy. Integrating ShareFile with other business applications can also be challenging and may require additional IT resources.

    How Microsoft SharePoint stacks up

    Microsoft SharePoint, initially launched as a document management and storage system, has evolved significantly over the years. If you haven’t used it recently, you may be surprised by the user-friendly interface. It is not the SharePoint of old. Today, it’s a comprehensive platform for file sharing, collaboration, and project management. Its integration with Office 365 and other Microsoft tools makes it a convenient choice for most businesses, including RIAs and financial advisory firms.

    One of the main advantages of SharePoint is its pricing. The software is included in most Microsoft subscription packages, making it more cost-effective than ShareFile. SharePoint also offers a wide variety of features and customizable options, meaning it can be tailored to meet different business needs. For example, you can create different permission levels for accessing documents and data, set up workflows for document approval processes, and automate tasks to streamline operations.

    Comparing Citrix ShareFile and Microsoft SharePoint

    Let’s take a closer look at how ShareFile and SharePoint compare in various aspects:

    FeatureShareFileSharePoint
    CostHigher, with feature-rich plansMore cost-effective, especially for firms already using Microsoft 365
    SecurityStrong encryption and compliance featuresEqually strong, with additional Microsoft security protocols
    ScalabilitySuitable for firms of all sizesHighly scalable, ideal for growing firms
    IntegrationLimited integration optionsSeamless integration with Microsoft systems and software
    User experienceCan be complex for nontechnical usersEasy to use, particularly for users who are already familiar with Microsoft products
    CollaborationGood, with secure client portalsExcellent, with real-time co-authoring and Teams integration

    Why RIAs and financial advisors should consider switching to SharePoint

    If you’re currently using ShareFile, you might wonder why you should consider switching to SharePoint. Here are some compelling reasons:

    • Cost effectiveness – SharePoint is generally more affordable, especially if your firm already subscribes to Microsoft 365, allowing you to leverage existing resources without incurring additional costs.
    • User-friendly interface – The platform is designed to be intuitive for employees who are used to working with Microsoft products, reducing the learning curve and enhancing productivity across your team.
    • Enhanced collaboration tools – With features such as real-time co-authoring and integration with Teams, SharePoint offers a more comprehensive collaboration experience compared to ShareFile.
    • Robust security features – SharePoint provides strong encryption and compliance features, with the added security of being part of the trusted Microsoft ecosystem.
    • Flexibility and customization – Packed with a suite of features and customization options, SharePoint touts a more flexible and tailored approach to document sharing and management than ShareFile.
    Related reading: Top RIA solutions for secure file sharing: A detailed comparison

    Both ShareFile and SharePoint have their strengths and can be suitable for different types of RIA firms. However, SharePoint’s cost effectiveness, security features, and Microsoft integration capabilities tip the scales in its favor.

    If you’re interested in exploring SharePoint as a file sharing solution for your RIA or financial advisory firm, reach out to our experts at RIA WorkSpace. We can help you understand how SharePoint can meet your specific needs and guide you through the transition process. Contact us today to learn more.

  • Intrusion detection and prevention for RIAs and financial advisors

    Intrusion detection and prevention for RIAs and financial advisors

    Time and again, hackers have proven their ability to penetrate even the most sophisticated firewalls and security systems. This is particularly concerning for registered investment advisors (RIAs) and financial advisors like you, who handle sensitive client information on a daily basis. What’s more, the jargon surrounding cybersecurity can make it challenging to understand the available options. Terms like EDR, XDR, and MDR often swirl around, which may leave you wondering about their exact meaning and whether they offer adequate protection.

    This guide aims to clarify these concepts and empower your firm to make informed decisions about intrusion detection and prevention systems.

    What is intrusion detection and prevention?

    Intrusion detection and prevention refers to a set of tools and procedures designed to protect computer networks, systems, and data from unauthorized access or misuse. It involves actively monitoring network traffic, identifying potential attacks, and taking steps to prevent them from being successful.

    Understanding the basics: EDR, XDR, and MDR

    There are several kinds of intrusion detection and prevention systems, and each has a distinct function. Some of the most common ones include endpoint detection and response (EDR), extended detection and response (XDR), and managed detection and response (MDR) systems.

    Endpoint detection and response

    As the name suggests, EDR focuses on detecting threats at the endpoint level, which includes individual devices such as laptops, desktops, and mobile phones. EDR systems collect data from these endpoints to identify any suspicious activity and provide real-time alerts to security teams so they can take action.

    Related reading: The best endpoint security for your RIA: Gartner’s top 6 solutions reviewed

    Extended detection and response

    Similar to EDR, XDR focuses on endpoint detection but goes a step further by also monitoring network and cloud environments. This allows for a more comprehensive view of potential threats and helps in faster detection and response.

    Managed detection and response

    Unlike EDR and XDR, MDR is a fully managed service where an external team monitors your network for potential threats. It uses advanced tools and techniques to detect suspicious activities, conduct investigations, and offer remediation suggestions. This type of intrusion detection and prevention system is ideal for smaller firms that may not have the resources to manage one themselves.

    Leveraging Microsoft Defender for intrusion detection and prevention

    If you have a Microsoft 365 subscription, you already have access to a powerful intrusion detection and prevention system: Microsoft Defender. This integrated security suite offers advanced threat protection for all endpoints, email, collaboration tools, and cloud services.

    With features such as real-time monitoring, behavioral analysis, and automated response capabilities, Microsoft Defender can effectively detect and prevent intrusions before they cause any harm. It also provides detailed reports and insights on potential threats, helping you stay on top of your network security.

    Microsoft Defender for Endpoint

    Defender for Endpoint is the EDR component of Microsoft Defender. It’s an ideal choice for RIAs and financial advisors because it offers a range of features that are highly suitable for them, including:

    • Real-time threat detection – continuously monitors endpoints and uses machine learning algorithms to identify patterns of suspicious activity
    • Automated response – takes immediate action to stop and remediate threats, reducing the need for manual intervention
    • Threat intelligence – leverages global threat data from Microsoft and other sources to stay ahead of emerging threats

    Microsoft Defender XDR

    Formerly called Microsoft 365 Defender, Microsoft Defender XDR is a security operations platform that provides unified security and visibility across your endpoints, platforms, and cloud environments. Some of the features that make it a powerful intrusion detection and prevention system include:

    • Centralized monitoring – provides a single dashboard to monitor and manage security across all endpoints, platforms, and clouds
    • Streamlined investigation and response – uses AI-powered analytics to identify and prioritize threats, making it easier for security teams to take action
    • Improved SOC productivity – automates routine tasks and provides advanced threat hunting capabilities, freeing up time for the security operations center (SOC) to focus on more critical issues

    MDR with Microsoft Defender

    While Microsoft Defender is not a standalone MDR solution, it can serve as the foundation for MDR services. Managed IT services providers (MSPs) can leverage the capabilities of this powerful security suite to fully service their clients’ intrusion detection and prevention needs. With the added benefit of 24/7 monitoring and response by a team of experts, MDR with Microsoft Defender offers a comprehensive solution for RIAs and financial advisors.

    Easing compliance with intrusion detection and prevention

    The Securities and Exchange Commission (SEC) and the Financial Industry Regulatory Authority (FINRA) have strict guidelines for RIAs and financial advisors when it comes to protecting client information. Failure to comply with these can result in hefty fines and reputational damage.

    For this reason, it’s crucial to have a strong intrusion detection and prevention system in place to remain compliant. The details of your intrusion detection system and intrusion prevention system should be clearly documented in your security policies and procedures, as these demonstrate your efforts to maintain a secure environment for your clients’ data. Your IT team or MSP can ensure your systems are up to date and meet compliance standards.


    For more information on how to protect your RIA or financial advisory firm from intrusions, contact RIA WorkSpace today. We can help you leverage Microsoft Defender and implement other security measures to keep your digital assets safe.

  • Spyware infiltration and Dropbox deception: Beware of these RIA phishing tactics we’ve seen in the wild

    Spyware infiltration and Dropbox deception: Beware of these RIA phishing tactics we’ve seen in the wild

    If you’re a registered investment advisor (RIA) or financial advisor, chances are you’ve already heard of phishing and the dangers it poses to firms like yours. But do you know that phishing today is no longer just a random email asking for your password? It’s a carefully orchestrated attack designed to exploit your trust and professionalism.

    Below, we’ll explore two advanced phishing campaigns we’ve recently seen targeting RIA and financial advisory firms. We’ll give you a peek behind the curtain and show you how these scams work. Most importantly, we’ll provide actionable steps to protect yourself and your clients, and keep your assets safe and sound.

    Why RIAs and financial advisors are a target

    RIAs and financial advisors are prime targets for cybercriminals due to the large amounts of sensitive financial information they hold. This includes the personal and financial data of their clients, making them a lucrative target for identity theft and financial fraud.

    Notably, from 2019 to 2023, data compromise incidents affecting financial institutions surged by over 330%, highlighting the growing risks in this sector.

    High-value transactions

    RIAs handle significant financial transactions daily. Scammers know this and seek to redirect these funds into their own accounts. It’s like having a treasure chest in plain sight — something too tempting for fraudsters to resist.

    Trusted relationships

    Advisors build close, trusted relationships with their clients. Cybercriminals exploit this trust by mimicking communication styles and timing their attacks when clients are most likely to comply without suspicion.

    Complex data

    The complexity of investment data provides a fertile ground for phishing attacks. With so much information exchanged, it’s easy for a cleverly disguised scam email to slip through unnoticed, especially when it blends seamlessly with legitimate correspondence.

    Common phishing campaigns targeting RIAs and financial advisors

    Let’s dive into the two types of phishing scams that are making the rounds in the RIA and financial advisory space.

    Scam no. 1: The spyware infiltration

    Spyware can lurk on your device, silently monitoring your communications. Scammers use this tactic to learn your communication habits before launching their attack. Here’s how it unfolds:

    The reconnaissance

    Once the spyware is active, scammers observe your emails. They look for ongoing discussions about new opportunities or changes in account details, anticipating when you’ll need to ask clients for money transfers.

    The fake email assault

    When the time is right, scammers strike by sending an email from an address that looks eerily similar to yours. They alter the spelling just enough to go unnoticed at first glance. For example, if your email is johndoe@example.com, the scammer may use john.doe@example.com or johnd0e@example.com. The email asks clients to wire money to a new account, leveraging the context they’ve gathered from monitoring your conversations.

    The waiting game

    Patience is key for these criminals. They wait until trust is established and the client is expecting communication. This calculated waiting game increases their chances of success.

    The aftermath

    By the time you and your client realize what’s happened, it’s too late. The money has been transferred to an untraceable account, and your reputation may be irreparably damaged.

    Scam no. 2: The Dropbox deception

    The second type of phishing attack involves a combination of legitimate and deceptive emails. Let’s break down this scam:

    The initial email scam

    Cybercriminals begin by sending an email to your client containing new banking details. The kicker? It comes from a seemingly reputable email address associated with Dropbox or another cloud storage service. The message prompts recipients to add information to a file in Dropbox.

    The follow-up from “you”

    Next, the scammers hack your email to send a follow-up message saying the file is too large to be attached to the email and must be accessed through Dropbox instead. This follow-up directs your client back to the original email with the fake link, luring them into their trap.

    The stealth tactics

    By directing clients to Dropbox, scammers avoid further communication in the hacked inbox, making it harder for you to detect the breach. This clever maneuver keeps their activities under the radar.

    The aftermath

    Once your client adds the information to the Dropbox file, it’s game over. The scammers have all they need to access sensitive data or redirect funds. And because a lot of the communication is happening in Dropbox and not your actual email, it’s challenging for you and your client to realize what has happened until it’s too late.

    Protecting your RIA or financial advisory firm from phishing attacks

    Now that you understand how these phishing scams work, here are some practical steps to protect yourself and your clients.

    Secure your email systems

    Invest in robust email security systems that include firewalls, anti-spam filters, and advanced threat protection features. These protect against both inbound and outbound threats, reducing the likelihood of falling victim to phishing attacks. Additionally, you should regularly update your email software to ensure you have the latest security patches.

    Conduct security awareness training

    Educate your team on recognizing phishing attempts, emphasizing the importance of cautiousness with email communications. Training should cover identifying suspicious emails, verifying the sender’s legitimacy, and avoiding clicking on unknown links.

    By instilling a culture of vigilance, you empower your staff to become a strong first line of defense against potential threats.

    Implement simulated phishing exercises

    Simulated phishing exercises allow you to test your team’s awareness and vulnerability to phishing attacks without putting your business at risk. These exercises mimic real-life scenarios, giving you valuable insights into how effective your security measures are and areas where you can improve.

    Through practice, your team becomes more adept at identifying and handling phishing attempts.

    8 Security Protections Your RIA Needs to Have in Place Now(especially if you’re using Microsoft email)

    Sophisticated phishing attacks continue to evolve, so it’s critical to stay vigilant and regularly update your security protocols. By implementing these recommendations, you can safeguard your RIA or financial advisory firm from the devastating effects of phishing attacks.


    Contact RIA WorkSpace today for more information and resources on cybersecurity for RIAs and financial advisors.

  • Hybrid Work and RIAs: Choosing the Best Endpoint Protection Solutions – RIA Tech Talk Episode #15

    Hybrid Work and RIAs: Choosing the Best Endpoint Protection Solutions – RIA Tech Talk Episode #15

    In the latest episode of the RIA Tech Talk podcast, Todd and David talk about how more and more RIAs are embracing hybrid work and why endpoint protection is crucial. 

    Whether your firm is fully remote, hybrid, or predominantly office-based, securing your workforce wherever they operate is essential. Hybrid work offers flexibility and employee benefits, but it also brings unique security challenges that firms must address.



    Listen To The Audio


    Read The Transcript

    Importance of Endpoint Protection

    RIAs must prioritize endpoint protection to secure devices such as laptops, smartphones, and tablets used by employees working remotely. Endpoint protection ensures that these devices are safeguarded from cyber threats, even when not behind the company’s firewall. It’s not just about protecting computers but also securing smartphones and tablets employees use to access work resources on the go.

    The Top Endpoint Protection Solutions

    David and Todd highlight six top endpoint protection solutions recognized by Gartner’s Magic Quadrant: Microsoft, SentinelOne, CrowdStrike, Trend Micro, Palo Alto Networks, and Sophos. Among these, Microsoft and SentinelOne stand out as leaders due to their comprehensive capabilities and integration with other security tools.

    Microsoft Defender for Endpoint

    This solution offers robust protection with advanced AI capabilities and seamlessly integrating with other Microsoft security tools. It provides real-time threat detection and response, helping firms identify and mitigate potential threats effectively.

    SentinelOne

    Known for its strong presence in the financial services space, SentinelOne offers a comprehensive security platform with features like endpoint detection and response and extended detection and response. These solutions provide enhanced visibility and protection across various endpoints.

    Understanding the Acronyms: EDR, XDR, and MDR

    EDR (Endpoint Detection and Response)

    Focuses on detecting and responding to threats at the endpoint level, providing visibility into device activities.

    XDR (Extended Detection and Response)

    Expands protection beyond endpoints to include networks and cloud services, offering a holistic security approach.

    MDR (Managed Detection and Response)

    Adds a layer of human expertise, with a security operations center actively monitoring and responding to threats.

    Implementing Security Solutions

    For RIAs with five or more employees, investing in robust endpoint protection is critical. While smaller firms might assume they’re not targets, the reality is that cyber threats are real and can cause significant harm. By implementing solutions like Microsoft Defender for Endpoint or SentinelOne, firms can secure their remote workforce effectively.

    Privacy Considerations

    Endpoint protection solutions, particularly on personal devices like smartphones, separate work and personal data. This ensures that companies can monitor and secure work-related activities while maintaining user privacy for personal activities.

    Related reading

    What is endpoint security and is your RIA on top of it?

    The best endpoint security for your RIA: Gartner’s top 6 solutions reviewed

    Gartner Magic Quadrant for Endpoint Protection Platforms

    Microsoft is named a leader in the Forrester Wave for XDR

    Listen To The Audio:

    Read The Transcript:

    Todd Darroca

    Hello, hello, hello, and welcome to the RIA Tech TikTok podcast, brought to you by RIA Workspace. David Kish and myself, Todd Darroca are here. And together we’re on a mission to simplify the complex world of technology for RIAs just like yours. Now in the podcast, we’ll be your tech guides breaking down those often confusing tech topics into plain, old and practical English terms. So we hope you join us every single episode as we dive into the latest tech trends, share our expert insights and help you navigate the ever-changing world of our IA technology. David, hello. How are you, sir?

    David Kakish

    Fantastic. I am doing fantastic, Todd. How are you, sir?

    Todd Darroca (00:50):

    I’m great. I’m great. If you’re listening to this, we’re celebrating the 4th of July, about last week. But no, it’s been good. Got some good time with family and all that stuff. And so yeah, it’s great to be back. And so today we’re talking about hybrid work and RIAs and choosing that best endpoint protection solutions. So David, why should the RIAs care, but also even the management business side of the house, care about this stuff? Yeah,

    David Kakish

    Yeah, absolutely. So again, we tend to focus our thank you, by the way, Todd, I want to welcome you. I want to welcome the listener. The really big challenge for RIAs, especially now, is you’ve got remote work, whether you like it or not. So some RIAs are a hundred percent remote. Some RIAs, it’s a hybrid, two or three days working from home and then two or three days in the office. And then some RIAs are still very old school like, Hey, we want to do it all in the office. And so there’s that entire range. But even if you’re the more of like, Hey, we work in the office all the time, and then occasionally from home, you still want to think about, Hey, how do I protect my employees when they’re working from home on the road in a hotel at the airport, and so on?

    And that’s kind of a really, really big concern because it’s really changed for everybody. And so yes, we work in a hybrid environment. Now I want to secure my remote workforce, but I don’t want to have a detailed technical discussion because I’m not an IT manager. I’m not an IT director. So our discussions are really focused on the managing partner, the office manager, the chief compliance officer, and so on. So we don’t get into a lot of the, even though as much as I would love to get into the technical weeds, I really avoid that because I know that our audience is a 15 person RIA with a chief compliance officer or a VP of operations that doesn’t have an IT background. And so we’re going to talk about that. But really what’s really interesting is, hey, when we talk about securing the employee, when they’re working remotely, people immediately think about the laptop or the computer that they’re working on.

    And yes, you want to secure that, but what about their iPhone and their iPad and Android and so on? And so we’re going to talk about, we’ll bring up the six best endpoint protection solutions, the two that I really like and why I like that, and then what you can do about that. And so my hope is by the end of this call, you’re like, okay, here are the top six that we should look at. Here are the top two. Let me go back, talk to whoever’s managing my IT and say, Hey, do we have something like this in place? And if they do, great, and if they don’t, you can give ’em some pointers or they can tell you ’em to listen to Todd and David.

     

    Todd Darroca

    Yeah, I think on this topic with hybrid work just in general, it’s not going away. I know a lot of companies, even small businesses are like, oh, now we’re back to getting everybody back in the office. And now it’s sometimes mandated. But I think what we’re seeing in the data shows it from Gartner, Forrester, wall Street Journal, all these that you’re going to lose out on talent if you are not playing in the game by allowing this remote from work. So I think to help decrease your liability and increase your security, obviously these will help you do that. But again, hybrid work is not going anywhere. Actually. I know that there is definitely a push more for employees to come back in. What I found out about that is the only reason companies are really doing that is because of the taxes and because of they have to have that building filled for so many days of the week in order to get certain tax breaks. So that’s kind of why you’re seeing larger corporations like Dell and Microsoft requiring people to come back in. But again, those are the big, big, big ones. But for everybody else, this is definitely here to stay. So let’s talk about the first endpoint solution, David, that you recommend for those of this hybrid work world.

    David Kakish

    Yeah, and actually Todd, before we even do that, so here in Chicago, what’s really interesting, so I live in the suburbs and I work in the suburbs, or I call it the suburbs, but it’s just outside of O’Hare. And it’s really interesting. I have friends that work downtown, and these big companies are basically, I’ll use the word essentially mandating that you’re in the office two or three days a week. And it depends on the company because the city of Chicago is basically saying, Hey, we need people spending money on their lunches here and taking the transportation and stuff like that. I think there’s been in these big companies, as much as they would love to get people back, a hundred percent people are basically saying, we’re just going to leave. It’s fine. So I’m going to talk about what we see with RIAs here in a couple of minutes, but it’s really interesting to see the dynamics at some of these bigger companies where it’s like they almost want to force everybody to come back and work in.

    And my brother had worked for Google for quite a while and there was that even Google, they wanted to bring all their employees back in almost full-time, five days a week. And the employees essentially said, well, we’re just going to leave. And so there’s that tension that’s sort of talking in general terms with RIAs. What I noticed is, again, there are those that are built, so they’re a hundred percent remote. They’ve built their model around that. That makes a lot of sense. So people are working from their homes all the time, and that makes a lot of sense. And on the flip side of that is there are companies where they say, Hey, listen, we just prefer to come and work in the office. Everybody lives five, 10 minutes away and there’s that separation of home and office. I’m the same way. I mean, I could easily work from home or at the office.

    I prefer to physically be in the office. And so that’s typically my preference, but it’s just mentally I feel like I’m much more productive and I don’t like to work from home. I guess when I go home, I like to spend time with my wife and my kids out. A lot of distractions, right? Oh yeah. Completely get it. Yeah, completely get it. And then, yeah, I would say most RIAs are probably some kind of a hybrid. I mean, 80% of RIAs now are some kind of a hybrid where you’re working from home 1, 2, 3 days a week, and then in the office again, 1, 2, 3 days a week. And even the ones that if your RIA is a hundred percent where you’re working in the office all the time, we all know that, hey, you know what? There’s a snow day, somebody’s sick, whatever, or you’re traveling.

    So in theory, I mean technically that’s even a hybrid, even though you’re in the office all the time, the key there is the old days of you working in a physical space and you’re protected behind a network firewall and the physical, those days are kind of gone. Yes. Even if you’re there all the time, you’re still working remotely on a computer or you’re accessing your email on your iPhone, your Android, different things like that. So it’s an era where that’s it. It’s here to stay even when you’re in the office, I’d say 90 or even a hundred percent of the time. Right. Alright, so just a little bit of context and then what we seize, and again, just to kind of zoom in on the challenge is your RIA, you’ve got 5, 10, 25 people. You don’t have an IT team. You’re typically dependent on somebody else and you’re like, all right, well, what do we have for endpoint protection?

    What are we doing to secure that laptop or that iPhone when Todd’s working from home? So you have to depend on somebody else to do that. And there are some great solutions and best practices out there, and there are ones that I’m not necessarily a big fan of, but I want to share that with the listener so that you go back and you talk to your IT provider, or if you’re the CCO, you say, Hey, what do we have in place? And not only do we have it, but hey, is it implemented? Do we have that implemented or not? So anyways, sometimes I feel like I’m preaching to the choir that I know that the listener knows that, but I want to get into the specific ones. So there’s a link that we’re going to go ahead and include in the show notes. It’s from Gartner.

    And Gartner releases these wonderful reports. It’s called the Magic Quadrant for Endpoint Protection Platforms. Basically, it’s Gartner saying, Hey, who are all the major players in this space? And then we’re going to put them in different categories, and they really base ’em on two pieces of criteria. Number one is the ability to execute, and then number two is the vision, the completeness of a vision. And so if you are able, as a company, if you’re able to execute and you’ve got a complete vision, you’re in what’s called the Magic Quadrant or in the Leader Quadrant. And there are six different companies that are in this space, and there’s two that I really like. Todd, I guess before I talk about, and just to make it quick, Microsoft and Sentinel One are probably the two big ones in this space that we’re very familiar with. And then the other four would be CrowdStrike, trend Micro, Palo Alto, and then Sophos. Those are the, again, that just mentioned the six. There are 10 others that are mentioned in this report. I’m not really going to touch upon that because those are very niche players in specific spaces. But the six are that, and then the two that I’m really going to focus on are Microsoft and Sentinel One. But I’m a big fan of Gartner, but Todd, I know not all of our listeners are familiar with Gartner, and I know you’ve got a lot of background there. So maybe you talk a little bit about that and we’ll talk

    Todd Darroca

    About that. Yeah, look, from a marketer standpoint and a small business, if you are in that magic quadrant at the top of that square, that’s where you want to be. So people and companies will tout that as Gartner, you said, we’re in the top quadrant. And so that’s all it really is. It’s kind of like the blue ribbon of your space. So yeah, I mean, when I worked with tech professionals and business owners, when we looked at different IT tools or this security software, we would always look at the quadrant. Now I think what’s important is it’s not a black and white thing here. It’s not, well, it’s in that quadrant, so we have to go with it. And it depends on the size of your company, how many people are in that company, what kind of protection you want, and how much you want to spend ultimately. So I think as David goes through these things, keep that in mind that yes, we’re going to focus on those top six that are in there, achieving the top big companies in that top quadrant, but always just keep in mind, see what the other ones are just to make sure if they fit your bill for where you’re at today. Yeah,

    David Kakish

    Yeah, absolutely. Thanks Todd. And again, as a reminder, we’re basically saying, Todd’s working from home. How do I secure Todd’s computer and how do I secure Todd’s iPhone at a very, very simple level. That’s basically what it comes down to. What if he’s getting attacked because there’s not a network firewall or he’s accessing a public wifi or his whole internet and so on. And there’s a lot of misconceptions that people have to go in and Todd’s working from home, so I need to manage his home router and all the internet access and this, I mean, you could do that, but it gets really complicated. It gets, yeah, good luck. Yeah, exactly. Yeah. And then your son or your spouse or whoever might come in and just change everything for all by just unplugging a cable or something like that. So at a really basic level, what we talk about is, look, and I’ll use Microsoft as an example, but this could be Google or Amazon or anything.

    You’ve got your private network at Microsoft, and then you’ve got the endpoints and that endpoint or that computer, you could be working in the office or you could be working at home. So for us, it’s like, all right, we want to make sure we’re securing your Microsoft tenants or your Microsoft private network for your RIA. We want to make sure we’re securing your office, and then we want to make sure we’re securing that endpoint, that computer, that laptop, that iPhone, when you’re working from home when you’re traveling. And what’s really nice about that is you no longer need to manage home networks and all that fun stuff for a while. You got to go back a number of years, you had to do some other things. And the technology has really evolved. And I think another way for you to think about endpoint protection, and this is the analogy that I typically use, is Todd has, I don’t know whether it’s a MacBook, actually, your MacBook?

    I am, yeah. Okay. All right. Big Mac guy. Todd’s got a MacBook, I have a think pad. There’s a security wrap around that MacBook, or there’s a security wrap around that laptop so that when again, in the office or out of the office that it’s completely secure and it’s preventing any attacks from happening. And then you’re encrypting the entire communication from endpoint to the Microsoft data center. And again, I apologize if I’m getting a little bit too technical, I don’t want to get too much in the weeds, but just enough to kind of paint the picture for you as a listener so you can wrap your head around that. So you’ve got, there’s four that are good, that are really good, but then there are two that are really great. Sophos, Palo Alto, trend Micro CrowdStrike. Those are really good. And those, if you recognize the names, they tend to be antivirus companies that have sort of evolved into, okay, we’re going to provide antivirus, we’re going to provide anti spyware, and now you know what? We’re going to go ahead and we’re going to provide endpoint protection on this computer that I’m a big fan of, and the two that are really big players in the financial services space, not just RIAs, but in financial services space. Sentinel One is a really big one, and then Microsoft’s a really big one, and I want to go on the record and say, nobody’s paying us to talk about, we’re not getting Todd, you me, we’re not getting from Microsoft and Sentinel.

    Todd Darroca

    No, we get nothing from this folks that don’t think we’re rolling in the dough from these big companies. We are vendor agnostic.

    David Kakish

    Exactly. Thank you. And I am a big fan of the Microsoft solution because I feel like there are some other things that Microsoft does on top of this that compliment each other really well. So Microsoft has something called Defender for Endpoint, which is fantastic, and that solves this problem, but they also have Defender for Identity, and then they also have Defender for Office. And what I love about the Microsoft solution is it combines many other things, and you’re using their AI to quickly detect something, prevent that from happening and stop that attack. And so for example, with a Microsoft solution, it kind of goes above and beyond. It says, hang on, it’s not just an endpoint protection, it’s saying, Todd, you logged in Austin and in Chicago, within two minutes, something seems off, I’m going to force a multi-factor authentication or maybe even a lockout. And it does that. And so the Defender for Endpoint is sort of looking at that computer and the logs and stuff like that, but the Defender for Identity is looking at your identity and logins and other things. So it compliments each other really well. So the big plus for Microsoft is, yes, you’ve got this endpoint protection, which is fantastic, but then there are other pieces that compliment that and they do that really, really, really well. And actually Sentinel One does the same thing, and that’s kind of why I like these two big solutions.

    Todd Darroca

    It sounds kind of like a fraud protection for credit cards, almost like the credit card companies can know your pattern of how you’re spending and where you’re going. And it sounds like Microsoft Identity is doing the same thing of it, kind of knows your patterns and seeing where you’re at. And so if it sees something erroneous, it’ll flag it right away.

    David Kakish

    That is a great analogy, Todd, and I never use that analogy. I’m actually going to start using that. Thank you. Exactly right. The only problem with that is when you’re traveling, and I don’t know, I forget, forget where I was. I think I was traveling internationally or something and it wasn’t part of my normal pattern.

    David Kakish

    Yeah, credit card has declined, like, oh, son of my gun. But I’d rather that than not. And usually when I travel, I have cash and then you’re able to talk to the bank. But funny enough, I started communicating with the bank now that, Hey, I’m going to be traveling, because I would rather if that happened than the other way around, like, oh yeah, somebody’s traveling Ally on your credit card.

    Todd Darroca

    Yeah, for sure.

    David Kakish

    Sure. But yeah, that’s actually a great way to think about that, where the credit card companies have become so good at understanding the patterns and saying, Hey, again, I forget, I was traveling and somebody got ahold of my credit card and I don’t know what it was, but they were buying Dunking Donuts, coffee and Alcohol, dunking Donuts, coffee and alcohol.

    Todd Darroca

    Oh, those poor people. It’s been a rough day or something. Getting some Dunking Donuts and alcohol.

    David Kakish

    Exactly, exactly. Let me get drunk and I’m sober up.

    Todd Darroca

    Yeah.

    David Kakish

    So my bag quickly detected that it was just, anyways, it was kind of interesting. But yeah, that’s exactly right. So those are the two really big solutions that I would look at. Again, if you’re using Sophos as your antivirus and anti spyware, it might make a lot of sense and say, Hey, I’m already using this. Let’s go ahead and upgrade that. So I use endpoint protection. Same thing with Trend Micro, and again, I’m a big fan of the four others that I mentioned, CrowdStrike, trend Micro, Palo Alto and Sophos. I like those companies a lot where those make sense. If you’re already using that solution, it’s just an upgrade. You’re using that antivirus upgrade your Trend Micro so that you go ahead and you use that upgraded version of protecting all of your endpoints. But if you were to ask me for your RIA, I would look at Microsoft number one, and I would look at Sentinel one as number two, and I try to keep it as simple as possible. This is going to lead me into something else, but Todd, it looks like you’ve got something to say.

    Todd Darroca

    I just want to make sure that the listener and the watcher understands how, I guess for lack of better phrase, fearful should these leaders be about endpoint protection and securing the information with their employees. I mean, there are those, again, people, 15 people in their company who are like, ah, it’s not a big deal. They’re all local. We can have the basic stuff. But is there kind of from a one to 10, and I guess it probably depends on the size, but of how, again, fearful or aware should leaders and business owners be about this type of endpoint security for their company in today’s world?

    David Kakish

    Yeah, so you ask a great question. We typically work with RIAs that have five plus employees. And it’s really interesting because I think when you’ve got one, two or three people, you’re concerned about that, but the answer’s like, ah, we’re not big enough for anybody to really be interested in us. It’s kind of interesting. Once you hit four or five employees, I see a shift in their mindset. And luckily for us, we work with typically, again, five plus employees. There’s a shift in that mindset to say, yeah, we got to really get serious about this, especially those that tend to grow fast. They started their new RIA and they’ve experienced a lot of success, and I was like, I don’t have a network. I’ve got people that are working all remote and I’m really concerned about that. So I would say, if you’re listening to us and you’ve got five plus employees, it’s probably on your radar.

    You’re like, yeah, I need to be really careful with that. And just so you know, that is a big threat. That’s how a lot of it’s very difficult for somebody to attack you behind your network firewall in your office. It’s a lot easier for them to know, Hey, Todd’s working from home or on the road, I’m going to go ahead and access his device while he’s working remotely. I don’t have to get through a company that worked firewall and stuff like that. So yeah, most of our listeners look at this. I mean, if you’re listening to us, you’re looking at this threat and you’re taking it seriously. So if you’re a listener that, Hey, endpoint protection, great, I’m protecting my computer, I’m protecting my iPhone. But that’s just one component of many other things. So I’m going to talk a little bit, and I apologize for these acronyms, something called E-D-R-X-D-R and MDR. And the reason I bring that up is this has just become common practice and the SEC is beginning to talk about that, and a lot of people in the financial services space are beginning to talk about that. So EDR, I’m going to also include a matrix here. We’ll include a matrix here. Lemme see if I can, it really does a great job of explaining the difference between what’s called E-D-R-X-D-R-M-D-R, and again, I apologize for the acronyms, but it is coming up a lot. Right?

    So EDR stands for endpoint Detection and Response. So this is really what we’ve been focusing on. XDR stands for extended detection and response. And then MDR stands for managed detection and Response. So what we’ve really talked about today is EDR think of that as sort of level one, and then extended is level two, and then managed is sort of level three. And I think, Todd, there’s a matrix here in one of the links that I sent you, and I think we’ll include that in the show notes, but one of the really nice things about XDR is it’s not limited to the endpoint. So with an XDR solution, extended detection and response, it’s also looking at your physical network and it’s looking at the cloud services. So let’s talk into Microsoft world, but again, that applies to anything else in the endpoint protection solution. You’re looking at that MacBook or you’re looking at that laptop and you’re looking at the iPhone, which is great.

    You want to have that. What’s nice with the XDR, the extended detection and response, now it’s looking at your physical network environment and it’s looking at your private network over at Microsoft or what’s called a Microsoft tenant. So it’s actually looking at one, two, and three and kind of looking at all that, and it’s doing that now with the MDR, which is the managed detection and response. It’s just taking it a step above and beyond and saying, Hey, we’re not just using AI and automation to protect you. We have what’s called a security operations center. We have people that are actually physically looking at these alerts and actually doing something about that. And so those are kind of tie all these things together and we probably need to have a separate podcast where we talk about that in a little bit more detail. But at a really high level, what I love about the Microsoft solution is if you use that out of the box, it’s essentially what’s called an XDR solution.

    So it goes beyond even an MDR with some of the other ones. It’s an MDR or it’s an endpoint detection and response. Sophos is great. What I like about Microsoft is out of the box, if you’re using the different features that they have, now you’ve got an XDR solution. And then if you want to upgrade that, right, you could pay more and you could have a company that does what’s called Security Operations Center that’s looking at that right there. Again, I apologize for the acronyms, but I wanted to bring that up because in our space and the SEC, and if you talk to other people, they’re beginning to talk about some of these things, and I just wanted to paint the picture for the listener.

    Todd Darroca

    Got it. Great. Yeah, man. Talk about a brain fart right now. One of the things that I always look at is the adoption of how easy is this thing going to be able to implement or to get employees on board? So within an EDR, how much work or what is required of the endpoint user? So again, back to me and my iPhone and my iPad, what do I have to do? Is there anything that I have to do that’s going to take time or is this literally like, Hey, you’re just going to start working on it and that’s all you need to do because things are mostly,

    David Kakish

    Yeah, that is a great question. So if you’re working with a managed service provider or an IT provider, and most of the RIAs listen to us, you probably are, this is something that they can push out and it doesn’t require Todd on his laptop to do anything, right? This is you having a strategic discussion, a strategic conversation with your IT provider and saying, Hey, do we have an endpoint protection solution or an extended, or I’m sorry, endpoint detection and response, right? EDR. So that’s kind of at a base level saying, yes, if you have that, fantastic. If you don’t, you want to have that in place, and that could be pushed out to all the computers, all the iPhones and so on. And so you would definitely want to have that. I would say challenge them and say, Hey, we want to have what’s called an extended detection and response.

    We want to have an XDR solution because now it’s looking at beyond just the endpoints for that computer. It’s looking on that computer, it’s looking at your physical network in your office, and it’s looking at your private network at the data center or your Microsoft tenant. And so if you’re listening to us, endpoint protection is fantastic, and the Gartner report that we’re sharing with you is fantastic, but a step above that that doesn’t really add a lot of complexity is an XDR extended detection in a response. And that’s again, if you have the right Microsoft subscription, you probably already have it. It just needs to be configured and managed for you and doing it that way. And then where it gets a little bit more complicated is the managed detection and response because you actually have to pay extra for a company for a human eye to have a 24 7 security operation center that’s looking at that and doing that. I will tell you, we love the XDR solution by Microsoft because you’re leveraging a lot of automation and a lot of AI from Microsoft, and your credit card analogy is fantastic. Realistically for me, I can’t remember the last time that somebody used my credit card and I wasn’t alerted by my credit card company.

    I don’t ever remember that happening where I go in and I don’t know what that was. Now, on a side note, on a funny note, my daughter used my wife’s credit card, buy some tickets or something, right? My wife asked me, do you know what this is? And I have no idea. And so there was a little bit of miscommunication between my daughter and my wife. My daughter had, I forget it, it was like some concert tickets or something like that, but we didn’t recognize the platform. So my wife calls the bank and says, yeah, and so anyways, but yeah, I’m trying to think in the last five years, I don’t think my credit card company once there was a fraud and they did not detect that. And that’s the way for you to think about endpoint protection or EDR endpoint detection and response or even XDR extended endpoint protection and response. So again, I apologize for the acronyms. We will include a couple of links there, and I’m a visual guy, so sometimes seeing really helps me. But yeah, so Todd, let me kind of go back to you. Does this kind of make sense or did I confuse a

    Todd Darroca

    Couple? No, no, it makes sense. My other question, I know we’re on time here, but the user, so me, if you tell me you’re going to push something to my phone and you’re going to be monitoring me, big brother, what is the privacy issue? Is there anything that if a user, you’re going to pick up on whatever you’re doing in your private life, what is that privacy? How much information are you collecting from my personal stuff, or is it really nil?

    David Kakish

    Yeah, that is a great question. So I’m going to talk about the computers and then I’ll talk about iPhones. And again, iPhones, a Androids, whatever, it doesn’t really matter. So the computers, generally speaking, it’s a company computer where it’s a laptop that you take home and you work in the office or you have a work computer at home and a work computer at the office. I would say that’s 95% of the time. Occasionally people are using a personal computer to access company resources or something like that. And that’s fine. I don’t want to get too much into it, but on a computer that is a company owned asset and we have full visibility, right? So for example, on that company computer, if you are going to facebook.com, you are RIA, probably knows that you’re on facebook.com or on a porn website or violence or whatever, and hopefully you have that block in the first place. And so a work computer, there’s complete control over that. Now, when it comes to iPhones, most companies, most companies are saying, okay, you’re going to use your personal iPhone and then access company resources. I would say 5% of RIAs are basically saying, Hey, we’re just going to give you a work iPhone or work Android smartphone, and we’re going to have full control of that, right? That’s very rare. I don’t know about you, but I don’t want carry two phones. Most people don’t want to carry two phones.

    Todd Darroca

    Right.

     

    David Kakish

    So the way that works on a personal iPhone, again, Android, whatever, it’s the same concept, but iPhone is very popular, so I’ll talk about that is actually it. It’s a fantastic solution. The way that we do that, and this is a Microsoft solution by the way, and this is what I would recommend that your IT provider does. What we can do is we can say, okay, most people want to access email on their iPhone for work related. Some people want to access more than that, but basically the way we do that is like, Hey, we push an agent to that iPhone. It allows us to put everything that’s work related in a separate logical container, and then everything that’s personal is in a separate logical container. So Todd, when you’re working, you don’t tell any difference. This is a work app that’s Outlook that you can access.

    You can do whatever you want. These are your Apple, whatever, apple notes, your Apple email, whatever. You can click on any of that and you can use that. What’s really nice is we’ve created that separate logical container for work, and what that allows us to do is to control everything and monitor everything that’s work related, but we have no visibility on what you’re doing on your personal Chrome or any of that right there, or Safari or whatever. So we have zero visibility on the personal container. We have a hundred percent visibility on everything that’s work related. The one that comes up is if you have a simple password on that iPhone, like one, two, three, four, you’re not going to be able to access company resources. So we set it up so that there needs to be password complexity or if you don’t even have a password, right?

    Well, that’s a liability for the RIA. And so that’s how it works. And what’s really nice is it’s completely locked down too, so that you taught as a user, you can’t go in and access company email, do a copy, and then put that in your Apple Notes. It’s completely locked down, and then three years you decide you’re going to go work someplace else. We’re going to disable your Microsoft account to do a remote wipe. That’s everything that’s work related, and then anything that is personal stays on that. But everything that’s work related, there’s just a remote wipe on that. So that’s how we do that, and that’s a really good question. I can’t speak for other IT providers, how they do that, but that’s how we approach that. That’s how we do that for our clients and works really well.

    Todd Darroca

    Yeah, so it’s kind of like two separate rooms, two separate doors. One door is your own bedroom and I get to lock it. Nobody gets in. The other door is for the living room where everybody’s at, and that’s where the company can see stuff.

    David Kakish

    That’s good would, yeah, separate logical rooms, right? Room number one is a work office, right? Room number two is my bedroom. I have no visibility in the bedroom, but until your work office, there’s complete visibility and it’s separate, separated logically. So it’s not two different logins on the iPhone or anything like that, it’s just you’re logging in, but it’s two separate logical containers. So yeah, the two room analogy is actually fantastic. Yep.

    Todd Darroca

    Got it. Alright, cool. Well, David, as we wrap up here, let’s go talk about talk the endpoints, the six best endpoint solutions. We talked about a bunch of acronyms, abbreviations, so give us a quick high level recap of what we talked about today and what the listener should be I guess doing today, they can start to do today with all this info. Yeah,

     

    David Kakish

    I’ll keep it really simple. I feel like this was one of these podcasts where I jumped around a lot and I apologize. As you can tell, I get excited about this.

    Todd Darroca

    I’ll get you on track. Don’t worry, don’t worry, David.

    David Kakish

    I get excited. It’s easy for me to get off on tangent here. So, hey, listen, I think the key thing is, look, you’ve got people that are working, employees that are working remotely. How do you secure them when they’re working remotely because they’re not physically in your office. The two really great solutions in this space is Microsoft and then Sentinel One. So look at those two. If you’re using any of the other vendors that we had talked about, that would be an easy upgrade. But look at Microsoft and look at Sentinel One. Those are the two really great ones that are in this space. I use the term endpoint protection a lot. If you talk to people that are in this space, they might use the acronyms of EDR and XDR, all that EDR is endpoint detection and response, which Sentinel One and Microsoft do.

    And then XDR is just extended detection and response, which again, Microsoft and SentinelOne does. And yeah, I would definitely start the conversation and talking, looking at Microsoft Sentinel one for endpoint protection. I’ll leave it at that because we can have more detailed discussions and stuff like that, but both of those provide an EDR and an XDR solution, and that is a great way to go ahead and protect your employees when they’re working remotely. And maybe another way of me saying it is if you don’t have Sentinel One or Microsoft as an endpoint protection solution, go back to your IT provider and say, what do we have?

    Todd Darroca

    Right? Yeah. Yeah. Well, great. And David went through a bunch of, we talked about the Gartner Magic Quadrant with a lot of different vocabulary that may be new to you, but those are going to be in the show notes underneath in the podcast description and on our video. So make sure you download those, A couple of good blog posts that David and team have also written. So make sure to visit those. Again, everything’s going to be in the show notes, and you can always go to ria workspace.com and check out the Learning Center. That’s where this podcast along with our other episodes will be and the resources there. So again, we covered a lot today and we want to say thanks for taking the time out of your busy day to listen to us. And so again, this is the RIA Tech Talk podcast. We’re always happy to be here and we’re brought to you by RIA Workspace. And so feel free to reach out to us with any questions or topics you’d like us to cover. We will look at those things, and I know we are going to have some special guests on here soon, so stay tuned for all of that. So hopefully you’ll like and subscribe to us and in our next episode we’ll cover some more RIA Tech insights. So for David and myself, thanks so much everybody for listening and have a great rest of your day.

  • Running Your Entire RIA Business on Microsoft 365: Eliminating Silos and Third-Party Tools – RIA Tech Talk Episode #14

    Running Your Entire RIA Business on Microsoft 365: Eliminating Silos and Third-Party Tools – RIA Tech Talk Episode #14

    In this episode of RIA Tech Talk, we talk about how most RIAs with between 5 and 25 employees are not fully utilizing their Microsoft 365 subscription.  These firms are often paying for 3rd party tools that are not as good as those provided by Microsoft and, worse yet, work in silos.

    Tune in to hear how you can run your entire business on Microsoft:



    Listen To The Audio


    Read The Transcript

    Maximizing Microsoft 365: Overcoming Underutilization

    There is a common issue among RIAs: the underutilization of Microsoft 365. Many RIAs continue to pay for third-party tools that offer similar or inferior capabilities to those included in their Microsoft 365 subscriptions. In this podcast, we encourage RIAs to explore and fully utilize the features available in Microsoft 365, which can handle 80-90% of your business needs. This includes tools for communication, file management, security, and more, all integrated into a single ecosystem.

    Email Management

    Most RIAs already use Microsoft 365 for email. By hosting their emails with Microsoft instead of third-party services, RIAs can enjoy better integration and security.

    File and Folder Organization

    Using SharePoint for file management eliminates the need for separate services like Dropbox, offering seamless integration and security within the Microsoft ecosystem.

    Instant Messaging with Teams

    Microsoft Teams is recommended for internal communication, providing a robust alternative to Slack and other messaging apps.

    Phone System Integration

    While Teams can replace traditional VoIP systems, David advises caution as it currently lacks texting capabilities, an essential feature for some RIAs.

    Securing System Access

    Microsoft’s Entra (formerly Azure Active Directory) offers tools for securing access to systems, ensuring both physical and identity security.

    Endpoint Security

    Microsoft Defender provides comprehensive endpoint security, outperforming many third-party solutions in protecting laptops and other devices.

    Single Sign-On (SSO)

    This feature simplifies access to web-based applications like RedTail, eMoney, and Orion, streamlining operations and enhancing security.

    Advanced Email Features

    Microsoft 365 offers advanced email functionalities, including encryption, data loss prevention, and eDiscovery, often eliminating the need for additional third-party tools.

     

    Related links:

    Magic Quadrant for Endpoint Protection Platforms

    Microsoft Azure Active Directory again a “Leader” in Gartner Magic Quadrant for Access Management

    Listen To The Audio:

    Read The Transcript:

    Todd W. Darroca
    Hello, hello, and welcome to the RIA Tech Talk podcast brought to you by RIA Workspace.
    I’m Todd Darroca, and alongside me is my partner in crime, Mr. David Kakish, and together we’re on a mission to simplify the complex world of technology for RIAS like yours.

    Now in the podcast, we’ll be your tech guides, breaking down those often-confusing tech topics in the plain old practical terms.

    So we hope you join us for each episode as we dive into the latest tech trends, share our expert insights, and help you navigate the ever changing world of RIA technology.

    So we’re gonna dive right in.Let’s get started. David, we’re gonna be talking about running your entire RIA business on Microsoft 365 and how you can eliminate a lot of those third party silos that we’re seeing out there.

    David Kakish
    Sounds good. Well, Todd, thank you for introducing me and I want to thank the listener. And here’s, you know, it’s, it’s really amazing because I feel like I’m a broken record and I’m repeating the same message.

    But, but it’s happens all the time where Rias are not fully utilizing the Microsoft 365 subscription and paying for 3rd party tools that are not as good as what Microsoft provides.

    And I mean, prior to our recall right now, I had one of those calls where it’s like, Oh my goodness, it’s just amazing.The same, same thing. So I’m, I’m repeating it and I’m gonna keep repeating it.

    And I feel like I’m repeating the same message, but I’m trying to get the point across that, oh my goodness, so many of you are not doing this and that’s why I’m repeating it. But I will be talking about, you know, I here, I guess, I guess what I’m going to say is you can run your entire business on Microsoft 365.

    There are pieces that you may not because there’s something better that’s out there, but I would say, you know, 80%-90% of what Microsoft has for you works really, really, really well.

    And I’m going to, I’m going to say this, and I say this with a high level of confidence that if you’re listening to us, I’m going to share eight different things.

    But I can tell you there’s at least one that’s going to a very actionable insight that you can take and you can apply in your business and it’s going to make a difference. I’m pretty sure there’s three or more that you can walk away and apply in your business.

    But let’s just say, even if you walk away with one actionable item that you can apply in your RIA, it’s going to have a really big impact. And what you can do is with these things that we share with you, you can either do it yourself, you can go to your current IT provider to help you say, hey, I heard David and Todd talk about this thing. We want to go ahead and you know, roll this out for us or reach out to us and we’re happy to help.

    Todd W. Darroca
    No, so you’re, you say you were a broken record, but I will tell you I finally heard your message because even me, I, I switched to Microsoft 365 just about a month ago, 365 Office and all that because as a small business owner, I was, I, and I’m not kidding you, I didn’t plan this because you told me they were going to have silos, all this stuff.

    But I literally was, I was using so many different things, Slack, you know, different e-mail servers, all of this stuff. And, and so I was like, all right, you know what, we’re going to try this.

    And so actually there is a friendlier pricing version for Microsoft 365 business for small business owners like myself. And I was astonished by it. But I will say that now I have all my chats in one place.
    It all connects into the e-mail. And I figured out that Microsoft has Microsoft Stream and so I can take audio recordings of meetings or whatever and they get transcribed. So no longer do I have to use the third party to transcribe some of my meetings and, you know, talks and all that stuff.

    So I will say, David, after 14 episodes, I have heard your message and I have decided to take the plunge into Microsoft.

    So, yeah. So there you go.There’s there’s one proof point for you.

    David Kakish
    Yeah. And, and you’re not even in RIA.

    Todd W. Darroca
    And that’s what’s I’m not. Yeah, that’s that’s that’s the thing.

    David Kakish
    So all right. Well, I’m glad, I’m glad to, I’m glad to see that that’s rubbing off on the.

    So, OK, now that we’ve chuckled a little bit again, the title of the session today is, hey, the podcast is running your entire RIA business on Microsoft 365 and, and how to eliminate silos and 3rd party tools.

    And, and the question that we’re going to answer for you is can I run my entire bid, my entire RIA business on a Microsoft 365 and not have all these different silos?

    So I’m going to cover, I’m going to cover. Let me take a look here. 8 different things. Don’t worry, it’s not overwhelming.

    These are kind of like 8 things that are relevant for your business and I’ll start with the easy one like e-mail, right?

    You know if if you have most, most Rias now are running Microsoft 365 for e-mail. Some, very few have an on site e-mail server. That used to be a thing. It’s no longer a lot of there’s a good amount of Rias that are still using like a different third party to holster e-mail like maybe Red Tail or Appriver or Rackspace. That’s a good solution, but I’m telling you, if you host it with Microsoft, it’s a much better solution because you can take advantage of the latest technology that Microsoft has.

    And I don’t want to get too much into it, but you know, like a big concern that we sometimes get is people that are using Red Tail as a CRM, Red Tail can also host their e-mail. And the big fear is like, hey, if I host my e-mail at Microsoft, am I going to lose all the e-mail history with Red Tail and things like that?

    Then the reality is, look, Red Tails a great CRM, but they’re not really an e-mail hosted provider. If you host your e-mail with Microsoft and you’re using, you continue to use Red Tail as a CRM, all the client history still going to be there, you’re really not going to lose anything. And there’s a direct integration and it works really well.

    So #1 and I’m not going to spend too much time on it is e-mail that’s, I think, pretty straightforward. OK, got it, got it.

    Any questions on that? Are we good?

    Todd W. Darroca
    No, no, let’s go on number 2 with the files.

    David Kakish
    All right #2 your files and folders.

    If you have your files on your server in your office or if you have your files hosted on a server with your IT provider, don’t do it. You don’t need to do that anymore. Use SharePoint and I’ll explain it a little bit. If you’re using dropboxorbox.com or Ignite or some other online folder system, you don’t need it. Get rid of it.  Use SharePoint.

    The reason we say that is SharePoint is fully integrated within the Microsoft ecosystem. Don’t use OneDrive, use SharePoint, right? And, and with SharePoint, what’s really nice is if I’m sort of an average user, I just click on that file folder structure or what’s called File Explorer on my computer and I can work and I can be fully productive.

    So if you’re listening to us and you hate SharePoint because of the old SharePoint, it’s not the old SharePoint that you know, like that’s so, you know, I, I had that problem and I wish Microsoft changed its name to something else. But basically you can have your file folder structure by using SharePoint.

    And the way that it works, OK, I click on my computer, I’ll go to that, you know, I click on File Explorer, I’ll open up that specific file folder. It’s indexed locally on my computer, but it’s saved at the Microsoft Data center. It’s saved in my private environment for my RIA at Microsoft’s data center. That’s why I click on that.

    I work, the speed is phenomenal, the performance is phenomenal. And then if my computer is lost or stolen or corrupted or, you know, whatever, that’s OK because that data is not sitting on my computer.

    1. So I would definitely recommend that. And for those of you that are Mac users that are out there, the, the you would use Finder, right? And this works really well.

      So what’s really nice and, and this whole Microsoft ecosystem works really well with Macbooks incredibly well, actually. You’re using Office for Mac, you’re using Finder, you’re using all of that.

    And so for the, you know, for a typical RIA, let’s just say 10 employees, they typically have like two people that are power Mac users, right? Hey, those guys can use that and you know, they’ll be really happy.

    So I wanted to talk a little bit about the files. So that’s something that if you’re, if you’re not using SharePoint, you definitely want to use that. So I just wanted to put that out there.

    Todd W. Darroca
    And I’m a power Mac user folks. And I will say very hesitant at first, but after using it, it is, as David says, it’s pretty easy and it’s very compatible.

    David Kakish
    So well, and, and just to kind of get off the topic a little bit on the Mac users, what’s really interesting is, you know, a lot of people will say, Oh yeah, it works really well on a Mac. And they’ll have a solution that’s like a, a like, you know, a cloud computer or, you know, you’re using, you essentially use your MacBook as a dumb terminal, right? And not using it as a MacBook.

    I go, if that’s, or Parallels, right, nothing and nothing wrong with that. If you want to use it that way, that’s great. But I wanted the MacBook so I can use, you know, the, the, the Mac operating, not to use it as a dumb terminal. So that’s kind of the big thing in the Mac users listening to us will know what that is.

    OK All right, So talk about e-mail.

    We talked about files and #3 it is instant messaging.

    Todd W. Darroca
    Did you ever use AOL Instant Messenger, David? Probably not.

    David Kakish
    Yeah, I don’t think so. I don’t think so anyways. All right, anyway, that’s my AOL, but I don’t, I don’t, I’m trying to remember if I did. It was it was so long.

     

    Todd W. Darroca
    Anyways, back to Teams and their instant messaging.

    David Kakish
    All right, fantastic.

    So Teams, let me talk a little bit about Teams. Teams is a, if you’re using Slack or if you’re using other third-party tools for instant messaging and you want to keep it, that’s great. Teams is available for you. Teams works really great. But again, Microsoft makes some great solutions, but I really hate their terminology and how they use that because it’s confusing.

    And when you’re talking about Microsoft Teams, you can talk about Microsoft Teams as sort of an instant messaging. You can talk about Teams as a phone system. You can talk about Teams as potentially a replacement for Zoom, what I recommend for Teams and it works really well and that’s how we use it and that’s how a lot of our clients use it is an instant messaging tool. It’s phenomenal.

    And then the other thing that I’d recommend is if you’re using something like Zoom, Teams could replace Zoom really well. But but there are some financial advisors because their end clients know Zoom, they continue to use Zoom, right. But for instance, if you’re talking about instant messaging, Teams is phenomenal.

    Now, the fourth thing, this kind of leads into the fourth thing when I talk about your phone system. So really right now what a lot of Rias are using is what’s called what is known as a void phone system, which is voice over IP phone system.

    So you’re probably familiar with like RingCentral 8 by 8 next Eva. You know, these are some of the names that are out there. A lot of people are asking, hey, do you recommend that we use Microsoft Teams as a phone system? And my answer is maybe yes, maybe no. It depends on how you’re using your phone system. More often than not, the answer of using Teams is your phone system.

    As of right now, the answer is I probably would not recommend it for the following reasons.

    Number one is you’re not able to use texting inside of Microsoft Teams. So let me let me pick on.

    Let me pick on, by the way, do you see that thumbs up? That’s a new, I think from I don’t want to say anything about for our watchers on the podcast.

    Todd W. Darroca
    That’s a throwing up on David.

    David Kakish
    So Zoom, you know, we’re, it’s kind of ironic we’re doing this in Zoom and partners can use Zoom is a lot of our clients are very familiar with it, right? And, and, and I like it a lot for podcasts and stuff like that.

    Anyways, one of the recent things I, I move my hands a lot. And then what Zoom does is it automatically detects it and it puts the IT puts the image and it throws me off.

    So sorry about that.

    Todd W. Darroca
    No, you’re good. You’re good.

    David Kakish
    All right, so Teams is a phone system. Yes, you can use it. Yes, it is a good phone system. There’s two things, right?

    Number one is one of the big challenges for a lot of RIAS is how do you do texting, right? Because a lot of times if you are texting clients and stuff like that, you are required to go ahead and archive that.

    And if you’re using something like RingCentral or Zoom as your phone system, it allows you to text directly from Zoom as a phone system. And that is a huge value add for clients because now I can have, I could use Zoom as my phone system, but then it’s an app on my phone and I can text back and forth with clients.

    Now on my personal iPhone, when I’m texting my wife or my daughter or you know, whoever, that doesn’t need to be archived. But when I’m texting a client directly out of the Zoom application on my iPhone, all of that can be archived.

    So as of right now, Microsoft does not have the ability to do texting inside of Microsoft Teams.
    And that’s kind of a big limitation for a lot of our advisors because something like a Zoom or a RingCentral, using it as your phone system really solves the problem of being able to text or do desktop, you know, texting and, and that works really well.

    So, so we, again, from an instant messaging perspective, we really like Teams a lot as a phone system.
    It’s good, but there are things that are better out there.

    And then the other thing is, you know, Microsoft Teams is still in what I call bleeding edge, not necessarily leading edge. So they still have some bugs and kinks to work out, But you know, it’s it’s a good solution if you’re OK with some of the limitations I talked about.

    Todd W. Darroca
    Do you see any, any like future forecasts on when, like are they working toward that or do you have any inclination of what has probably happened like a year or two?

    David Kakish
    Yeah, I don’t, I don’t know. So I don’t know the timeline, but obviously Microsoft’s velocity on when they’re working on new things is really, really fast. And I think I think in the next, you know, one to two years, my answer is going to be different. But as of right now, that’s kind of our position on that.

    And, and again, just I know the texting is such a pain point for a lot of our IAS that something like a Zoom or like a RingCentral or 8 by 8, you know, solves the problem for them. And, and that’s why I’m hesitant to recommend Teams. But otherwise, like, if that’s not critical for you, Teams is actually a pretty good phone system too.

    So OK, nice. All right. And and that’s what’s nice is, you know, we give you like the real deal.

    You know, this is not marketing flaw for like, that’s right. It’s all fantastic, right? We tell you that, you know, the good, the bad and the ugly.

    OK, yeah #5 all right, so #5 is securing access to your systems.

    And if you’ve got a little bit of a technical background you might have heard of like Active Directory or Directory Services or Azure Active Directory, again, Microsoft has recently renamed that to Microsoft Intra ENTRA.

    Remember what I told you Microsoft in the Navy, you know, So but basically intra yeah, if you if you what what this really has to do is securing access to your systems and to your identity. And think about it as secure access to your computer, secure access to your e-mail, secure access to your files, right.

    Setting up multi factor authentication, having all that set up and actually Microsoft really really excels in this space and and they do really well but I think just at a really high level to explain it to the listener you have your own what’s called a Microsoft tenant.

    What that is is that’s your private Microsoft network that’s for your RIA and then you have all the endpoints, the computers, the iPhones and so on to keep it simple.

    You know on the right here I have the Microsoft tenant your your private network for your RIA and then on the other side in your office I have a laptop, you know a company laptop for your RIA.

    So we’re making making sure your tenant is secure, making sure the laptop is secure and then the connection in between is secure.

    So that’s kind of, you know, securing your your private network at Microsoft and also securing your laptop or your iPhone as an example.

    But also when we talk about identity, what that means is Todd, you know, if, if I’m in Chicago and then within minutes I log in and I’m in Austin, it’s going to look at that and say, hang on, you know, there’s a red flag. It’s either going to force a multi factor authentication or it’s going to force a lockout or, you know, do something where it says, hey, you know, there’s a red flag. I’m going to force something to happen.

    And then, you know, with a lot of our clients, by default, we just, you know, limit access outside the US because most of our I as we work with are 100% side inside the US. And so there’s no reason for anybody in France to have access to the systems like that.

    17:13
    So, so when I talk about secure access to your systems, if you think about that, it’s your physical systems, your computer, your laptop and so on, but also it is your Microsoft tenant, your private network at Microsoft, but also it is your identity, it’s your Microsoft account. So that’s something where you don’t need to get a third-party tool to do that. That’s something, you know, that we’re doing for you within the Microsoft ecosystem.

    Todd W. Darroca

    So, OK, well, we’re going to, yeah, let’s stay on security then and go to number six, which is endpoint security.

    David Kakish
    Exactly.

     

    So I kind of touched upon that a little bit, but, and we’re going to, we’re going to include a link here in the show notes.

    I know people like to talk smack about Microsoft a lot, but actually if you look at the Gartner reports, you know, Gartner is, is, is a big company that releases a lot of reports on, they, they call it the leader quadrant, like on different tech companies and different things. Microsoft is in the Magic quadrant. They’re in the top right-hand corner, which is where you want to be.

    So for all the smack that people like to talk about Microsoft, actually Microsoft has some great solutions.

    And when we talk about endpoint security, it’s securing that laptop, right? Because or that computer, because the assumption is, especially this day and age at your RIA, you’re working in the office, you’re working at home, you’re working in a hotel when you’re traveling, right? And so how do you, how do you, you know, provide that?

    And, and the way I describe it is kind of like a bubble around the laptop that’s providing security. And Microsoft has something called defender for endpoint, defender for office, defender for identity.

    You don’t need to go out and get Sentinel one or Crowdstrike or any of the other ones. Those are good. But you know, it’s something that we do provide you here. And actually Microsoft beats most of those third party vendors anyways.

     

    So we like down a lot. So that’s that’s what we talk about when we talk about endpoint security.

    Todd W. Darroca
    OK, nice.

    All right, let’s go down to number seven of our list of eight.

    David Kakish
    All right, Single sign on for web-based applications or SSO, not to be confused with the password manager, right, Password managers for managing, you know, passwords. A single sign on is so that you and your employees can securely sign into all of your web-based applications. Think red tail E money, Orion, Tamarack, you know, wealth box and and so on.

    And so, what that does is you hire Mary, right? And once Mary starts, she can come and work.

    Your RIA has a centralized dashboard for all the web-based applications and Mary can go in and securely access that.

    You need to let go of Mary, right? We’re going to disable her main account and now she cannot access any of these other web-based applications. There’s some other really good players in this space like Octa and and and others, but again, you’re paying for this and you’re getting a really great solution. And again, in the Gartner report that Microsoft has Microsoft is again in that, you know, Magic Quadrant.

    Why why look at some other options when you get a go ahead and you can do that. So I’ve kind of single sign on for web-based applications, really fantastic solution for Microsoft and that’s something we set up standard for our clients during the onboarding process.

    Todd W. Darroca
    OK, nice, nice.

    Rounding out our list of eight, we have a #8 which is David Drumroll, please.

    David Kakish
    Sure. It’s it’s advanced features, advanced security features for your e-mail.

    20:37
    And we’ll talk about that is like archiving emails and teams, right?

    20:42
    And so I want to be careful.

    20:44
    I’m going to say archiving e-mail and archiving teams, but does not archive social media websites or texting, right? So I just want to put that out there.

    20:52
    And then e-mail encryption and then data loss prevention for e-mail.

    20:56
    And what that is, is, you know, if I send out an e-mail with a Social Security number or account number, it’ll automatically encrypted, send it out and then notify your CCO if you want that. And then eDiscovery.

    So there’s a lot of these features that people are paying for, you know, third party tools like Smarsh, Global Relay and others.

    This is something that we can do for you within the Microsoft ecosystem and meets the SEC and the Finreck compliance requirements.

    So again, the advanced features for e-mail, e-mail features, archiving of e-mail and Microsoft Teams, e-mail encryption, data loss prevention for e-mail and then ediscovery. And those are like, I could, we could probably talk, we can have a podcast topic on each one of these, but I just kind of wanted to quickly list all these things.

    So yeah, so I kind of, I feel like I went really fast and I covered a lot of things. But my point being is these are eight different things that you can do inside of the Microsoft 365 ecosystem that you don’t need to go out and pay for a third-party tool with the exception of Teams, right?

    In terms of how you want to use Teams, right? That’s kind of my like, I want to be careful with that one, but the other really, really phenomenal solutions. And so hopefully you’ve got less silos.

    You have tools that are better than third party tools, and, you know, you’re saving money. So yeah.

    Todd W. Darroca

    And so at the beginning of the podcast, we said, hey, you know, the question is, can I run my entire RA business on MS365?

    And the answer is yes, you can. And David has walked us through those top eight, you know, areas of how you can, you know, not be so siloed.

    And so David, what what can the person in the RA do or the, you know, the the business owner do after they listen to this podcast?

    What are the top things you want them to do?

    David Kakish
    So let me just recap the eight things really quick.

    22:52
    And as I’m recapping them, if you’re listening to us, take notes and then go to your IT provider and say, hey, David and Todd talked about this. I want to I want to explore this and I want to test it.

    So number one of his e-mail, number two was files on SharePoint #3 was instant messaging using Teams.

    Number four was, you know, a phone system on Teams with the big* #5 was securing access to your systems, which is Microsoft calls Microsoft intra ENTRA.

    Number six is endpoint security.

    Number 7 is single sign on for web-based applications.

    And then #8 the advanced security features for your e-mail.

    Every single one of these that I mentioned, I can, I can assure you, if you’re listening to us, you’re probably paying for 3rd party tools that are part of your Microsoft subscription. Or even if they’re not part of your Microsoft subscription, you can easily upgrade your Microsoft subscription and get these tools.

    And it’s going to be a lot less than a third-party tool. And by the way, like I know you’re saving money, but this is less about saving money.

    It’s more about let’s have less silos and let’s have better security. And so I would take what, you know, jot down one of these things, go to your IT provider and say, hey, we wanna test, you know, one and two.

    And what’s gonna happen is after you test it and you see how easy it is and how it’s not siloed and integrated, you’re going to become addicted and say, all right, let’s keep that feature. Or, you know, let’s get that going. And then obviously, we’re happy to help.

    If you want any of that right there to reach out to us and we’re happy to help. So that’s what I would encourage you to do.

    I cover 8 things. Take at least one and talked with him and ideally 3, you know, three or more, but I can, I can, I can tell you with great confidence, if you’re listening to us, I have over 90% confidence that there is one thing in here that you’re not using.

    And I’d encourage you to do that.

    So, and I can, I can say this, Todd, because I talk to a lot of RIAs every day, every week and so on.

    So I, I know this from being out in the real world, not, you know, not behind your desk in an ivory tower.

    Todd W. Darroca

    Well, hey folks.

    And all the stuff that the Gartner Magic Quadrant and a couple other key resources are inside the show notes below the podcast link or below the video here.

    And so obviously we’re always happy and grateful that you are joining us. And we thank you for letting us into your cars, your house, or wherever you’re at listening to us.

    So again, thanks for listening to the RA Tech Talk podcast brought to you by RIA Workspace. And for more podcasts, again, this is episode 14. So we’ve got thirteen others of them, other of them.

    Is that the right sentence?

    Anyways, there’s thirteen more on the website at RA workspace.com. So check those out under the Learning Center and feel free to reach out to us with any questions or topics you’d like us to cover.

    And of course, stay tuned for more RIA Tech Talk insights in our next episode.

    So for David and myself, thanks so much everybody and have a great day.

  • Enhance your presentations with PowerPoint Presenter Coach

    Enhance your presentations with PowerPoint Presenter Coach

    Simply having well-designed PowerPoint slides is not enough to engage your audience and leave a lasting impression. It’s equally important to deliver your message with confidence, clarity, and enthusiasm. This is where PowerPoint Presenter Coach comes in, providing you with personalized feedback and insightful tips.

     

    What is PowerPoint Presenter Coach?

    PowerPoint Presenter Coach is a feature within Microsoft PowerPoint designed to help users improve their presentation skills. This innovative tool provides real-time feedback on various aspects of your delivery, helping you practice and perfect your presentation before facing an audience. You can access PowerPoint Presenter Coach if you have a Microsoft 365 subscription or a 2019 version of PowerPoint for Windows and Mac.

     

    Prerequisites to use Presenter Coach

    Before you start using PowerPoint Presenter Coach, make sure you have the following:

    • Built-in or external microphone to record your voice
    • Stable internet connection to access real-time feedback
    • Webcam to track your body language and facial expressions
    • Presentation slides with speaker notes (optional)
    • A quiet environment with minimal background noise

     

    How does PowerPoint Presenter Coach help improve presentations?

    PowerPoint Presenter Coach evaluates various aspects of your presentation skills, offering detailed feedback to help you improve. Here are some key areas where it can assist you:

    Pacing

    Maintaining the right pace is crucial for keeping your audience engaged. PowerPoint Presenter Coach monitors the speed of your speech, ensuring you don’t talk too fast, which can overwhelm listeners, or too slow, which can bore them. By providing feedback on your pacing, the tool helps you find a rhythm that is easy to follow and keeps your audience attentive.

    Monotone pitch

    A monotone pitch can make your presentation sound dull and lifeless. Presenter Coach detects variations in your pitch and encourages you to use a more dynamic tone. By varying your pitch, you can emphasize key points, express enthusiasm, and keep your audience interested.

    Speech refinement

    Concise speech is essential for effective communication. Presenter Coach helps you refine your speech by identifying and providing feedback on filler words, repeated words and phrases, informal speech, and culturally sensitive terms.

    Pronunciation

    Clear pronunciation ensures that your audience understands your message. Presenter Coach provides feedback on mispronounced words, helping you practice and improve your articulation.

    Body language

    Nonverbal cues such as body language, facial expressions, and gestures play a significant role in communication. PowerPoint Presenter Coach uses your webcam to analyze your movements and provide feedback on your posture, eye contact, and overall body language, helping you appear more confident and engaging.

     

    How to use PowerPoint Presenter Coach

    To access PowerPoint Presenter Coach, follow these simple steps:

    1. Open your presentation in PowerPoint.
    2. Find the Slide Show menu and select Rehearse with Coach under the Presenter Coach section.
    3. Presenter Coach will open in a new window, and you can click Get Started to start your rehearsal.
    4. Make sure to enable your microphone and allow access for Presenter Coach to use your webcam.
    5. As you present, Presenter Coach will provide real-time feedback on different aspects of your delivery, including speech refinement, body language, and pacing.
    6. After finishing your rehearsal, you’ll receive a detailed report highlighting areas for improvement and suggestions for how to enhance your delivery.

     

    Whether you’re a beginner or an experienced speaker, PowerPoint Presenter Coach offers valuable insights to elevate your presentations to the next level. So why not give it a try? For more tips on getting the most value from your Microsoft productivity apps, call us today.

     

    Published with permission from TechAdvisory.org. Source.