Continuity planning ensures critical products and services are delivered to clients while a business recovers from a catastrophic event.

Staying competitive doesn’t just mean seeking efficiencies and opportunities for profit. Reducing the impact of a critical incident to ensure existing business operations continue in a time of crisis can be a key to competing successfully. 

The Technology and Risk Advisory group focuses on helping clients reduce the effects of catastrophic events through:

  • Risk analysis, business impact, and requirements analysis
  • Framing strategy, governance, and policy
  • Designing, building, implementing and testing business continuity procedures including technological recovery design, software selection, plan development, and lifecycle management
  • Generating awareness, training, conducting systems and process health-checks and reviews

Technology and Risk Advisory Contacts:

Paul Schmidt

Partner,
CPA, CA, CITP, Information Technology


Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881


Vaclav Vincalek

Managing Director,
Technology & Advisory Services


Email: vvincalek@wm.ca

Phone: 778-945-2996

 

MSU: We won’t pay hacker demanding ransom, threatening university over records

Michigan State University said it doesn’t plan to give into a hacker … The cybersecurity breach, known as a ransomware …
Read More
/ Cyber Security News

COVID-19 exposed two big technology gaps that hospitals need to

… of crucial equipment and their vulnerability to cybersecurity breaches. … quite compelling given that healthcare has the highest data …
Read More
/ Cyber Security News

Are Executives Ready to Respond to Today’s Flight to Remote Work?

Recent data showcases that despite confidence in mitigating cybersecurity … What is at stake if there was a breach and …
Read More
/ Cyber Security News

Many Exchange Servers Are Still Vulnerable to Remote Exploit

Two years after Microsoft closed security holes in the Outlook mail client, … most significant data breach threats, second on …
Read More
/ Cyber Security News

Lawsuit alleges health system maintained PHI ‘in a reckless manner’ ahead of breach

The complaint also includes allegations that the system’s employees didn’t properly monitor the computer network with breached data. Plaintiffs are …
Read More
/ Cyber Security News

Amtrak breached, some customers’ logins and PII potentially exposed

However, the attacker didn’t access financial data, be it credit card information or Social Security taxpayer IDs. “With Sophos we’ve …
Read More
/ Cyber Security News