“Enterprises that implement a vulnerability management process will experience 90% fewer successful attacks…” 

~ Gartner, Predictions for  IT Security Directors

“We already have a firewall and intrusion detection systems

That’s a good start. However, despite all the attention that firewalls, anti-virus applications and Intrusion Detection System (IDS) receive, security vulnerabilities still plague organizations. By having these tools, organizations often believe that their networks and applications are safe from security incidents. Unfortunately, this is not the case.

The operational environments within businesses are becoming increasingly complex, and more reliant on the use of sofware and data every day. Often little attention is paid to business processes, policies, or any sort of consistent review of security posture. Many systems are not designed to protect network and data from improper configuration, out of date software, or unexpected user intervention from a disgruntled employee. Most sophisticated attacks can bypass intrusion detection systems and penetrate networks, and externally executed code may not be noticed at all. The best defense is fully knowing the existing security status, and understanding the actions required to cover any gaps or deficiencies in your security posture.

 “Our company isn’t a target for attacks”

Sure, you’re not Amazon, Apple, Facebook or Google. Recent history of largescale security incidents show not all attacks are targeted. Crypolocking viruses, Code Red, Wannacry, Bagel, etc. attacked systems at random, and operated using specific vulnerabilities. It is important to change thinking beyond “it probably won’t happen” to fully understanding the current situation, and fixing issues by evaluating the facts obtained.

The Technology and Risk Advisory group takes a wholistic approach to vulnerability management – including everything from organizational structure, data endpoints, operational policy, technology management, IT management policy, and existing security management to develop an actionable plan to make your company more secure, and better positioned to detect and act quickly when a security incident happens.

Technology and Risk Advisory Contacts:

Paul Schmidt

Partner,
CPA, CA, CITP, Information Technology


Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881


Vaclav Vincalek

Managing Director,
Technology & Advisory Services


Email: vvincalek@wm.ca

Phone: 778-945-2996

Recent Cyber Security Articles

The Latest: Trial Against Ex-Police Chief, Wife Delayed

Katherine and Louis Kealoha are facing a trial on bank fraud, identity theft and obstruction charges. They're also facing a ...
Read More
/ Cyber Security News

Police calls — update for Oct. 23, 2018

People booked into the Shawnee County Jail in connection with felonies. Nicole Marie Twemlow, 34, in connection with identity theft, ...
Read More
/ Cyber Security News

Asia-Pacific’s cybersecurity workforce gap hits 2.14m

According to a Cybersecurity Workforce Study by the International ... two years in order to advance in their careers include ...
Read More
/ Cyber Security News

SaaS based IT Security Market Growing at High CAGR by 2025 – Cisco, IBM, Intel Security …

An exclusive SaaS based IT Security Market research report created through ... Adoption of cloud computing by organizations, for reducing ...
Read More
/ Cyber Security News

Safety first: AI adoption in the healthcare sector

However, in the healthcare sector, the convergence of big data, cloud ... Predictive analytics tools support clinical decision-making and actions ...
Read More
/ Data Analytics

Police Report for Oct. 24

Gadsden. IDENTITY THEFT. A Gadsden woman told police she learned she'd become a victim of identity theft Saturday when she ...
Read More
/ Cyber Security News

On Medicare? Watch out for fraud

... away from using beneficiaries' Social Security numbers for identification. The new cards have a random number that is less ...
Read More
/ Cyber Security News

Data Security Tops New Zealand Public’s Concerns

Wellington, 24 October 2018 – New Zealanders are more concerned about data security issues spanning identity theft, credit card fraud ...
Read More
/ Cyber Security News

Best M.2 SSD: Toshiba XD5 Series – Product Overview and Insight

Toshiba XD5 Series Data Center NVMe SSD is a PCIe Gen 3, NVMe 1.3a specification, high-performance SSD, 1.92 TB and ...
Read More
/ Data Analytics
Loading...