“Enterprises that implement a vulnerability management process will experience 90% fewer successful attacks…” 

~ Gartner, Predictions for  IT Security Directors

“We already have a firewall and intrusion detection systems

That’s a good start. However, despite all the attention that firewalls, anti-virus applications and Intrusion Detection System (IDS) receive, security vulnerabilities still plague organizations. By having these tools, organizations often believe that their networks and applications are safe from security incidents. Unfortunately, this is not the case.

The operational environments within businesses are becoming increasingly complex, and more reliant on the use of sofware and data every day. Often little attention is paid to business processes, policies, or any sort of consistent review of security posture. Many systems are not designed to protect network and data from improper configuration, out of date software, or unexpected user intervention from a disgruntled employee. Most sophisticated attacks can bypass intrusion detection systems and penetrate networks, and externally executed code may not be noticed at all. The best defense is fully knowing the existing security status, and understanding the actions required to cover any gaps or deficiencies in your security posture.

 “Our company isn’t a target for attacks”

Sure, you’re not Amazon, Apple, Facebook or Google. Recent history of largescale security incidents show not all attacks are targeted. Crypolocking viruses, Code Red, Wannacry, Bagel, etc. attacked systems at random, and operated using specific vulnerabilities. It is important to change thinking beyond “it probably won’t happen” to fully understanding the current situation, and fixing issues by evaluating the facts obtained.

The Technology and Risk Advisory group takes a wholistic approach to vulnerability management – including everything from organizational structure, data endpoints, operational policy, technology management, IT management policy, and existing security management to develop an actionable plan to make your company more secure, and better positioned to detect and act quickly when a security incident happens.

Technology and Risk Advisory Contacts:

Paul Schmidt

Partner,
CPA, CA, CITP, Information Technology


Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881


Vaclav Vincalek

Managing Director,
Technology & Advisory Services


Email: vvincalek@wm.ca

Phone: 778-945-2996

Recent Cyber Security Articles

Check Point Software Technologies Reports Third Quarter 2020 Financial Results

We announced the acquisition of Odo Security, a new cloud-based SASE ... connectivity to datacenter applications, web applications, cloud services ...
Read More
/ Cyber Security News

Mounting cyber threat to critical infrastructure ramps up UK countermeasures

10 steps to reduce the impact of security breaches. According to the NCSC, most cyber attacks have four stages: Survey, ...
Read More
/ Cyber Security News

Cloud Security in Energy Sector Market 2020: Industry Overview by Size, Share, Future Growth …

Cloud Security in Energy Sector Report 2020 (value and volume) by company, regions, product types, end industries, history data and ...
Read More
/ Cyber Security News

Ex-Grand Prix CEO liable for nearly $2 million

... used the corporation to perpetrate a fraud upon its creditors," Bailey wrote in ... and filing false tax returns, ...
Read More
/ Cyber Security News

Beware Microsoft computer messages

Remember, do not allow anyone you don't know access your computer. • • •. If your child's ID is stolen ...
Read More
/ Cyber Security News

Whats The Future Of Cloud

Cloud computing and IoT are allowing for enhanced security features and reliability” says Seedoyal, outlining that future of cloud is ...
Read More
/ Cyber Security News

Web application security testing owasp

web application security testing owasp OWASP has 32 000 volunteers around the world who perform security assessments and research. The ...
Read More
/ OWASP

Toolkit developed by BRC aims to counter cyber attacks in retail sector

Last year, retailers spent over £186 million on cyber security, but the growth in online selling means there's an increasing ...
Read More
/ Cyber Security News

Data Reply Achieves AWS Machine Learning Competency Status

With strong competences in Big Data Engineering, Data Science and IPA, Data Reply builds Big Data platforms and implements ML ...
Read More
/ Data Analytics
Loading...