Secure your data and protect your business from cyber threats.

Being a target is expected. Becoming a case study shouldn't be.

In an increasingly digital world, organizations continue to adopt technologies that put mission-critical data and tools online and in the cloud. As the reliance on technology to make businesses more competitive continues, interruptions caused by security issues can create serious consequences.

The Technology and Risk Advisory group provides services designed to gather situational information, build strategy, and implement effective controls to mitigate risks to technology and critical business data.

Web Application Security

Vulnerability assessment and penetration testing on web applications, as well as customized compliance reports and application remediation assistance.

IT Vulnerability Assessment

Ensuring critical network, server, and data infrastructure is managed and secured against tampering and data loss. TaRA provides advanced reporting to manage vulnerabilities and source solutions to ensure technology infrastructure risk is mitigated.

Business Analysis

Process and technical operation can often expose potential gaps in security that are often overlooked until it is too late. A comprehensive security plan should include evaluation of operation of technology, policies, and business continuity plans.

Critical Incident Response

Having a well designed plan for incidents can mean the difference between a minor inconvenience, and business being interrupted for extended periods. Protect your operations, your data, and your brand by having a ready plan to put into action the moment an issue arises.

Penetration Testing

“Red Team” exercises designed to test all aspects of a business’ technology, policies, procedure and even people. Full penetration testing can provide a complete situational analysis of an organization’s security posture.

Technology and Risk Advisory Contacts:

Paul Schmidt

Partner,
CPA, CA, CITP, Information Technology


Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881


Vaclav Vincalek

Managing Director,
Technology & Advisory Services


Email: vvincalek@wm.ca

Phone: 778-945-2996

CYBER SECURITY ARTICLES:

What is the Latest Consumer Data Protection Act that Everyone is Talking About?

In previous CSPi blogs, we have described many specific data privacy ... All of this makes them unusable in the ...
Read More
/ Cyber Security News

US points finger at Chinese government over Marriott data breach

US cybersecurity experts suspect that the hackers who gained access to the personal data of half a billion Marriott hotels ...
Read More
/ Cyber Security News

Hadoop and Big Data Analytics Market 2026 Investment Analysis To Obtain The Exact …

The business research report on “Hadoop and Big Data Analytics Market” Research Report 2018- 2026 covers summery, market outlook, trends, ...
Read More
/ Data Analytics

Forcepoint: 2019 sees IoT attack surge

"The cybersecurity industry and attackers expended effort in a never-ending cycle of breach, react, and circumvent -- a true cat-and-mouse ...
Read More
/ Cyber Security News

Michigan Chamber Of Commerce Applauds Senate Action On Data Breach Notification Legislation

"This legislation imposes reasonable mandates that will require businesses to notify consumers that could be affected by a data breach." ...
Read More
/ Cyber Security News

Why the 1-size-fits-all approach doesn’t work for hospital cybersecurity: Q&A with Proficio CISO …

Dickon Smart-Gill, CIO and chief information security officer at managed ... Once the breach is under control, the next step ...
Read More
/ Cyber Security News

Digi International Nominates New Candidate for Board of Directors

Since May 2016, Hatem Naguib has served as SVP and GM of the security business unit for Barracuda, Inc., a ...
Read More
/ Cyber Security News

Despite Breaches, Many Organizations Struggle to Quantify Cyber-Risks to Business

Many organizations are still struggling to adopt a more risk-focused approach to cybersecurity, although the need for it has been ...
Read More
/ Cyber Security News

11 Top Breach and Attack Simulation (BAS) Vendors

It has won multiple awards, including a 2018 Cybersecurity ... which offers some limited breach and attack simulation capabilities ...
Read More
/ Cyber Security News
Loading...