“Enterprises that implement a vulnerability management process will experience 90% fewer successful attacks…” 

~ Gartner, Predictions for  IT Security Directors

“We already have a firewall and intrusion detection systems

That’s a good start. However, despite all the attention that firewalls, anti-virus applications and Intrusion Detection System (IDS) receive, security vulnerabilities still plague organizations. By having these tools, organizations often believe that their networks and applications are safe from security incidents. Unfortunately, this is not the case.

The operational environments within businesses are becoming increasingly complex, and more reliant on the use of sofware and data every day. Often little attention is paid to business processes, policies, or any sort of consistent review of security posture. Many systems are not designed to protect network and data from improper configuration, out of date software, or unexpected user intervention from a disgruntled employee. Most sophisticated attacks can bypass intrusion detection systems and penetrate networks, and externally executed code may not be noticed at all. The best defense is fully knowing the existing security status, and understanding the actions required to cover any gaps or deficiencies in your security posture.

 “Our company isn’t a target for attacks”

Sure, you’re not Amazon, Apple, Facebook or Google. Recent history of largescale security incidents show not all attacks are targeted. Crypolocking viruses, Code Red, Wannacry, Bagel, etc. attacked systems at random, and operated using specific vulnerabilities. It is important to change thinking beyond “it probably won’t happen” to fully understanding the current situation, and fixing issues by evaluating the facts obtained.

The Technology and Risk Advisory group takes a wholistic approach to vulnerability management – including everything from organizational structure, data endpoints, operational policy, technology management, IT management policy, and existing security management to develop an actionable plan to make your company more secure, and better positioned to detect and act quickly when a security incident happens.

Technology and Risk Advisory Contacts:

Paul Schmidt

CPA, CA, CITP, Information Technology

Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881

Vaclav Vincalek

Managing Director,
Technology & Advisory Services

Email: vvincalek@wm.ca

Phone: 778-945-2996

Recent Cyber Security Articles

Rekor Launches New AI School Security and Student Safety Software

Rekor Launches New AI School Security and Student Safety Software ... OnGuard enhances student safety by identifying and assessing threats ...
Read More
/ Cyber Security News

Global Web Application Firewall (WAF) Market Size – Industry Insights Top Trends Drivers Growth …

The leading competitors functioning in the Global Web Application Firewall (WAF) Market are focusing on expansions, ... The report provides ...
Read More
/ Cyber Security News

Financial Analysis: ChannelAdvisor (NYSE:ECOM) vs. Rapid7 (NYSE:RPD)

Further, the company provides consulting services in the areas of cyber security maturity assessment, incident response program development, ...
Read More
/ Cyber Security News

Thousands of Movie Pass subscribers have info exposed in data breach

A cyber-security expert reportedly discovered the un-encrypted database of 161 million pieces of information, including personal credit card details, ...
Read More
/ Cyber Security News

7 IT security best practices to know to prevent data breaches

Imagine a hacker trying to break into a secure system. You often envision an expert programmer make attempts at a ...
Read More
/ Cyber Security News

Internet ‘bazaar’ announces it’s selling card data stolen in Hy-Vee data breach

... stolen during a data breach at Hy-Vee went on sale this week at a site that traffics in stolen ...
Read More
/ Cyber Security News

Work-From-Anywhere Cultures Need Work-From-Anywhere Security: The Value of a Managed …

Learn how partners can help secure mobile workforces. ... however, a data breach could outweigh the potential benefits of a ...
Read More
/ Cyber Security News

The Top Cyber Security Trends in 2019 (and What to Expect in 2020)

Verizon's 2019 Data Breach Investigations Report (DBIR) reports that 32% of confirmed data breaches boiled down to phishing, and 78% ...
Read More
/ Cyber Security News

Incident Of The Week: Millions of Hy-Vee Customer Payment Cards Appear For Sale Online

The online “dump” of payment card data appeared online under the breach ... according to reports and images shared with ...
Read More
/ Cyber Security News