“Enterprises that implement a vulnerability management process will experience 90% fewer successful attacks…” 

~ Gartner, Predictions for  IT Security Directors

“We already have a firewall and intrusion detection systems

That’s a good start. However, despite all the attention that firewalls, anti-virus applications and Intrusion Detection System (IDS) receive, security vulnerabilities still plague organizations. By having these tools, organizations often believe that their networks and applications are safe from security incidents. Unfortunately, this is not the case.

The operational environments within businesses are becoming increasingly complex, and more reliant on the use of sofware and data every day. Often little attention is paid to business processes, policies, or any sort of consistent review of security posture. Many systems are not designed to protect network and data from improper configuration, out of date software, or unexpected user intervention from a disgruntled employee. Most sophisticated attacks can bypass intrusion detection systems and penetrate networks, and externally executed code may not be noticed at all. The best defense is fully knowing the existing security status, and understanding the actions required to cover any gaps or deficiencies in your security posture.

 “Our company isn’t a target for attacks”

Sure, you’re not Amazon, Apple, Facebook or Google. Recent history of largescale security incidents show not all attacks are targeted. Crypolocking viruses, Code Red, Wannacry, Bagel, etc. attacked systems at random, and operated using specific vulnerabilities. It is important to change thinking beyond “it probably won’t happen” to fully understanding the current situation, and fixing issues by evaluating the facts obtained.

The Technology and Risk Advisory group takes a wholistic approach to vulnerability management – including everything from organizational structure, data endpoints, operational policy, technology management, IT management policy, and existing security management to develop an actionable plan to make your company more secure, and better positioned to detect and act quickly when a security incident happens.

Technology and Risk Advisory Contacts:

Paul Schmidt

Partner,
CPA, CA, CITP, Information Technology


Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881


Vaclav Vincalek

Managing Director,
Technology & Advisory Services


Email: vvincalek@wm.ca

Phone: 778-945-2996

Recent Cyber Security Articles

Does Singapore’s Ministry of Health deserve immunity for data breach?

Singapore's largest data breach happened in July 2018 when a government hospital became the target of cyber-hackers. It is believed ...
Read More
/ Cyber Security News

Head-To-Head Review: SINGAPORE TELEC/S (SGAPY) versus Oi SA em Recuperacao Judicial …

The Group Enterprise segment offers mobile, equipment sales, fixed voice and data, managed, cloud computing, cyber security, and IT and ...
Read More
/ Cyber Security News

Social Media Analytics Is A Disaster: Why Can’t We Fix It?

Social media platforms have created a reality distortion field that promotes them as the very definition of “big data” while ...
Read More
/ Data Analytics

Q&A: How to respond to the latest big data breach?

Around 617 million online account details have been stolen from 16 hacked websites, and these have been placed are on ...
Read More
/ Cyber Security News

Q&A: How to respond to the latest big data breach?

According to the seller of these credentials, the data for one of the websites has ... From all that data, ...
Read More
/ Data Analytics

Fontana’s crime rate goes down for the second straight year

Despite the good news regarding the steep decline in thefts, Green ... by a rash of mailbox vandalism, resulting in ...
Read More
/ Cyber Security News

Coinmama Cryptocurrency Exchange Faces Security Breach: Data of 450000 Users At Risk

However, a recent announcement from Coinmama states that the platform has gone through a major security breach - where data ...
Read More
/ Cyber Security News

Technological revolution and the jobs of tomorrow

... cities, the Internet of Things and Internet of Everything, Artificial Intelligence (AI) and Machine Learning, Big Data analytics, Blockchain ...
Read More
/ Data Analytics

Holder Harvard Management Co Has Raised Facebook (FB) Stake; As International Business …

It has underperformed by 21.12% the S&P500. ... greater regulation in the wake of data breach; 14/03/2018 – IBM Study: ...
Read More
/ Cyber Security News
Loading...