Secure your data and protect your business from cyber threats.

Being a target is expected. Becoming a case study shouldn't be.

In an increasingly digital world, organizations continue to adopt technologies that put mission-critical data and tools online and in the cloud. As the reliance on technology to make businesses more competitive continues, interruptions caused by security issues can create serious consequences.

The Technology and Risk Advisory group provides services designed to gather situational information, build strategy, and implement effective controls to mitigate risks to technology and critical business data.

Web Application Security

Vulnerability assessment and penetration testing on web applications, as well as customized compliance reports and application remediation assistance.

IT Vulnerability Assessment

Ensuring critical network, server, and data infrastructure is managed and secured against tampering and data loss. TaRA provides advanced reporting to manage vulnerabilities and source solutions to ensure technology infrastructure risk is mitigated.

Business Analysis

Process and technical operation can often expose potential gaps in security that are often overlooked until it is too late. A comprehensive security plan should include evaluation of operation of technology, policies, and business continuity plans.

Critical Incident Response

Having a well designed plan for incidents can mean the difference between a minor inconvenience, and business being interrupted for extended periods. Protect your operations, your data, and your brand by having a ready plan to put into action the moment an issue arises.

Penetration Testing

“Red Team” exercises designed to test all aspects of a business’ technology, policies, procedure and even people. Full penetration testing can provide a complete situational analysis of an organization’s security posture.

Technology and Risk Advisory Contacts:

Paul Schmidt

CPA, CA, CITP, Information Technology


Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting


Phone: 604-691-6881

Vaclav Vincalek

Managing Director,
Technology & Advisory Services


Phone: 778-945-2996


The Latest: Trial Against Ex-Police Chief, Wife Delayed

Katherine and Louis Kealoha are facing a trial on bank fraud, identity theft and obstruction charges. They're also facing a ...
Read More
/ Cyber Security News

Police calls — update for Oct. 23, 2018

People booked into the Shawnee County Jail in connection with felonies. Nicole Marie Twemlow, 34, in connection with identity theft, ...
Read More
/ Cyber Security News

Asia-Pacific’s cybersecurity workforce gap hits 2.14m

According to a Cybersecurity Workforce Study by the International ... two years in order to advance in their careers include ...
Read More
/ Cyber Security News

HITRUST® Statement Regarding HIPAA Settlement of the 2015 Anthem Breach

A key component of any comprehensive information risk management ... (such as a board of directors, senior management, regulators and ...
Read More
/ Insurance

SaaS based IT Security Market Growing at High CAGR by 2025 – Cisco, IBM, Intel Security …

An exclusive SaaS based IT Security Market research report created through ... Adoption of cloud computing by organizations, for reducing ...
Read More
/ Cyber Security News

Safety first: AI adoption in the healthcare sector

However, in the healthcare sector, the convergence of big data, cloud ... Predictive analytics tools support clinical decision-making and actions ...
Read More
/ Data Analytics

Police Report for Oct. 24

Gadsden. IDENTITY THEFT. A Gadsden woman told police she learned she'd become a victim of identity theft Saturday when she ...
Read More
/ Cyber Security News

On Medicare? Watch out for fraud

... away from using beneficiaries' Social Security numbers for identification. The new cards have a random number that is less ...
Read More
/ Cyber Security News

Data Security Tops New Zealand Public’s Concerns

Wellington, 24 October 2018 – New Zealanders are more concerned about data security issues spanning identity theft, credit card fraud ...
Read More
/ Cyber Security News