Secure your data and protect your business from cyber threats.

Being a target is expected. Becoming a case study shouldn't be.

In an increasingly digital world, organizations continue to adopt technologies that put mission-critical data and tools online and in the cloud. As the reliance on technology to make businesses more competitive continues, interruptions caused by security issues can create serious consequences.

The Technology and Risk Advisory group provides services designed to gather situational information, build strategy, and implement effective controls to mitigate risks to technology and critical business data.

Web Application Security

Vulnerability assessment and penetration testing on web applications, as well as customized compliance reports and application remediation assistance.

IT Vulnerability Assessment

Ensuring critical network, server, and data infrastructure is managed and secured against tampering and data loss. TaRA provides advanced reporting to manage vulnerabilities and source solutions to ensure technology infrastructure risk is mitigated.

Business Analysis

Process and technical operation can often expose potential gaps in security that are often overlooked until it is too late. A comprehensive security plan should include evaluation of operation of technology, policies, and business continuity plans.

Critical Incident Response

Having a well designed plan for incidents can mean the difference between a minor inconvenience, and business being interrupted for extended periods. Protect your operations, your data, and your brand by having a ready plan to put into action the moment an issue arises.

Penetration Testing

“Red Team” exercises designed to test all aspects of a business’ technology, policies, procedure and even people. Full penetration testing can provide a complete situational analysis of an organization’s security posture.

Technology and Risk Advisory Contacts:

Paul Schmidt

Partner,
CPA, CA, CITP, Information Technology


Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881


Vaclav Vincalek

Managing Director,
Technology & Advisory Services


Email: vvincalek@wm.ca

Phone: 778-945-2996

CYBER SECURITY ARTICLES:

AI for CyberSecurity: Managing Threats and Upscaling Risk Management

The manipulation of political systems, threat to national security, ... Incorporating, an AI-driven cybersecurity model to augment current cyber ...
Read More
/ Cyber Security News

‘Oblivious’ Drizly Reported Breach 5 Months Late, Suit Says

"Despite Drizly's claims of 'trust,' Drizly's deficient data security measures left its customers' sensitive customer data vulnerable to hackers who ...
Read More
/ Cyber Security News

SSP to host education event on identity theft

ALTON — Senior Services Plus is hosting a Zoom presentation discussing identity theft on Monday, Sept. 21 from 10-11 a.m ...
Read More
/ Cyber Security News

More than 400000 hit by data breach at online exam site — what to do

It added, “ProctorU has implemented additional security measures to prevent any recurrence. We have begun notifying affected universities and ...
Read More
/ Cyber Security News

Crystal Kinzel recognized for work on Identity Theft and Fraud Alert Task Force

... your personal records from criminals seeking to steal your identity. ... she has been proud to work closely with ...
Read More
/ Cyber Security News

Games, not shame: Why security awareness training needs a makeover

"If you opened up the Verizon Data Breach Investigations Report this year," ... Hacking and breaches in general, according to ...
Read More
/ Cyber Security News

Financial Services Security Software Market 2020 Industry Size, Trends, Global Growth, Insights …

The rapidly changing market scenario and initial and future assessment of the impact is covered in the report. The report ...
Read More
/ Cyber Security News

More fraud in the midst of pandemic: Emergency funding scamm

More fraud in the midst of pandemic: Emergency funding scamm ... The scammers use stolen identities to file claims for ...
Read More
/ Cyber Security News

Ransomware Hackers Post Data From 2 Providers, Device Manufacturer

... a potential data breach. Suspicious activity was detected in a number of employee email accounts, and steps were taken ...
Read More
/ Cyber Security News
Loading...