Monday, May 18, 2015

2015 - RIA Mergers, Acquisitions Fueling Growth


Mergers and acquisitions continued to fuel growth in the independent registered investment advisor market last year, according to 2014 year-end data from Schwab Advisor Services.

The activity makes the independent investment advisory model one of the fastest-growing financial services segments and points to a healthy, sustainable industry, says Jonathan Beatty, senior vice president of sales and relationship management at Schwab Advisor Services.

There were 54 completed RIA merger and acquisition transactions in 2014, matching the total deals completed in 2013. Average deal size ticked upward by 9% from the previous year, with total assets under management going from $43.6 billion to $47.4 billion.

See full article here:

Monday, May 4, 2015

2015 - Our RIA-In-View Newsletter - 2nd Quarter

2015 - Our Newest Affiliate Site -

Dear Advisors,

We are pleased to announce the release of our newest affiliate site:*.  An RIA is a business with other functions, such as operations, technology, and trading.  As such, we've put together a collection of products and services for advisors to manage the additional areas in their practices.  Visit here:

All products are either used by Roberson Consults Group and/or its clients.   

Our current site includes:

·         Microsoft (software)
·         Global Relay (Compliance/Archiving)
·         Citrix (Cloud-based solutions)
·         Cal-Insurance (Advisor E & O Insurance)
·         Staples (office supplies)
·         TD Ameritrade (trading/custodian)
·         Website Development (third-party providers)
Our site contains affiliate links for which we may be compensated. 

Stay tuned as we add more companies.

Impact: A portion of profits will go towards our work with Build Ur Impact. 

Sunday, May 3, 2015

2015 - Cyber-Security - Action Item Checklist

Small Firm Cyber-Security Checklist
(Source: Security Industry and Financial Markets Association (SIFMA)

Below are some notes that you can use in updating your firm's cyber-security program. These protocols can be tested at the time of reviewing your firm's Business Continuity program and/or anytime.