Continuity planning ensures critical products and services are delivered to clients while a business recovers from a catastrophic event.

Staying competitive doesn’t just mean seeking efficiencies and opportunities for profit. Reducing the impact of a critical incident to ensure existing business operations continue in a time of crisis can be a key to competing successfully. 

The Technology and Risk Advisory group focuses on helping clients reduce the effects of catastrophic events through:

  • Risk analysis, business impact, and requirements analysis
  • Framing strategy, governance, and policy
  • Designing, building, implementing and testing business continuity procedures including technological recovery design, software selection, plan development, and lifecycle management
  • Generating awareness, training, conducting systems and process health-checks and reviews

Technology and Risk Advisory Contacts:

Paul Schmidt

Partner,
CPA, CA, CITP, Information Technology


Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881


Vaclav Vincalek

Managing Director,
Technology & Advisory Services


Email: vvincalek@wm.ca

Phone: 778-945-2996

 

Barbara Corcoran Lost Nearly $400000 and It Shows the Real Risk of Email Phishing Scams

Barbara Corcoran Lost Nearly $400,000 and It Shows the Real Risk of Email … That means it’s worth considering whether …
Read More
/ Cyber Security News

Michigan Healthcare Group Hack Went Undetected for Six Months

A data breach that exposed patients’ personal health information (PHI) for almost three months went undetected for half a year …
Read More
/ Cyber Security News

The Rise of Data Privacy Regulations Offers New Opportunities for CPA Firms

At this time, approximately 41 U.S. states have laws mandating data breach notification, which is among the central focuses of …
Read More
/ Cyber Security News

Exploitation, Phishing Top Worries for Mobile Users

The majority of companies suffered downtime or loss of data in a breach, but many also found that other devices …
Read More
/ Cyber Security News

TQL cyber breach is latest example of the industry’s vulnerability to hacking

The breach was “an information/data phishing attempt,” according to an announcement on the company’s website. “Our IT security teams identified …
Read More
/ Cyber Security News

South Carolina’s firewall faces billions of breach attempts

South Carolina’s firewall faces billions of breach attempts … The state also employs measures of cybersecurity to ensure tabulated results …
Read More
/ Cyber Security News