“Enterprises that implement a vulnerability management process will experience 90% fewer successful attacks…” 

~ Gartner, Predictions for  IT Security Directors

“We already have a firewall and intrusion detection systems

That’s a good start. However, despite all the attention that firewalls, anti-virus applications and Intrusion Detection System (IDS) receive, security vulnerabilities still plague organizations. By having these tools, organizations often believe that their networks and applications are safe from security incidents. Unfortunately, this is not the case.

The operational environments within businesses are becoming increasingly complex, and more reliant on the use of sofware and data every day. Often little attention is paid to business processes, policies, or any sort of consistent review of security posture. Many systems are not designed to protect network and data from improper configuration, out of date software, or unexpected user intervention from a disgruntled employee. Most sophisticated attacks can bypass intrusion detection systems and penetrate networks, and externally executed code may not be noticed at all. The best defense is fully knowing the existing security status, and understanding the actions required to cover any gaps or deficiencies in your security posture.

 “Our company isn’t a target for attacks”

Sure, you’re not Amazon, Apple, Facebook or Google. Recent history of largescale security incidents show not all attacks are targeted. Crypolocking viruses, Code Red, Wannacry, Bagel, etc. attacked systems at random, and operated using specific vulnerabilities. It is important to change thinking beyond “it probably won’t happen” to fully understanding the current situation, and fixing issues by evaluating the facts obtained.

The Technology and Risk Advisory group takes a wholistic approach to vulnerability management – including everything from organizational structure, data endpoints, operational policy, technology management, IT management policy, and existing security management to develop an actionable plan to make your company more secure, and better positioned to detect and act quickly when a security incident happens.

Technology and Risk Advisory Contacts:

Paul Schmidt

CPA, CA, CITP, Information Technology

Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881

Vaclav Vincalek

Managing Director,
Technology & Advisory Services

Email: vvincalek@wm.ca

Phone: 778-945-2996

Recent Cyber Security Articles

Threats to international peace and security – Security Council, 8272nd meeting

The Security Council addresses threats to international peace and security ...
Read More
/ Cyber Security News

Sophos Releases a Report About How Fast Cybercriminals Attacks Are

Matthew Boddy, The Security Specialist at Sophos explained: Cyber attacks on Cloud Honeypots, identify the threats organizations migrating to hybrid ...
Read More
/ Cyber Security News

Internet of Things Security Market Revenue and Value Chain 2018 – 2023

This report on Global Internet of Things Security market is a detailed research ... and advantage, Trends, opportunity, and market ...
Read More
/ Cyber Security News

Data Center Logical Security Market 2019 By Recent Trend, Size, Share, Demand Analysis with …

This report on Global Data Center Logical Security market is a detailed research study ... potential and advantage, Trends, opportunity, ...
Read More
/ Cyber Security News

Mobile Biometric Security Service Market Future Technological Trends and Business Opportunities …

This report on Global Mobile Biometric Security Service market is a detailed research ... potential and advantage, Trends, opportunity, and ...
Read More
/ Cyber Security News

Oil Gas Security Service Market Analysis: By Key Players, Types, Applications -Ready To Boost …

This report on Global Oil Gas Security Service market is a detailed research study that ... potential and advantage, Trends, ...
Read More
/ Cyber Security News

Security Appliance Market to Witness Astonishing Growth with Key Players: Cisco Systems …

Their capabilities include UTM, VPN and firewall, IDP systems, web security, and routing, which provide and ... Unified Threat Management ...
Read More
/ Cyber Security News

New Documentary Film, CYBER CRIME, Its Not a Question of “If,” It’s a Question of “When”

Featuring commentary from ten leading experts in the cyber security field, ... This documentary is meant to raise viewers awareness ...
Read More
/ Cyber Security News

Zscaler url

Configured in minutes, Zscaler Internet Security leverages the threat intelligence harnessed from the Zscaler cloud. Hi, The site Review URL ...
Read More
/ Cyber Security News