“Enterprises that implement a vulnerability management process will experience 90% fewer successful attacks…” 

~ Gartner, Predictions for  IT Security Directors

“We already have a firewall and intrusion detection systems

That’s a good start. However, despite all the attention that firewalls, anti-virus applications and Intrusion Detection System (IDS) receive, security vulnerabilities still plague organizations. By having these tools, organizations often believe that their networks and applications are safe from security incidents. Unfortunately, this is not the case.

The operational environments within businesses are becoming increasingly complex, and more reliant on the use of sofware and data every day. Often little attention is paid to business processes, policies, or any sort of consistent review of security posture. Many systems are not designed to protect network and data from improper configuration, out of date software, or unexpected user intervention from a disgruntled employee. Most sophisticated attacks can bypass intrusion detection systems and penetrate networks, and externally executed code may not be noticed at all. The best defense is fully knowing the existing security status, and understanding the actions required to cover any gaps or deficiencies in your security posture.

 “Our company isn’t a target for attacks”

Sure, you’re not Amazon, Apple, Facebook or Google. Recent history of largescale security incidents show not all attacks are targeted. Crypolocking viruses, Code Red, Wannacry, Bagel, etc. attacked systems at random, and operated using specific vulnerabilities. It is important to change thinking beyond “it probably won’t happen” to fully understanding the current situation, and fixing issues by evaluating the facts obtained.

The Technology and Risk Advisory group takes a wholistic approach to vulnerability management – including everything from organizational structure, data endpoints, operational policy, technology management, IT management policy, and existing security management to develop an actionable plan to make your company more secure, and better positioned to detect and act quickly when a security incident happens.

Technology and Risk Advisory Contacts:

Paul Schmidt

Partner,
CPA, CA, CITP, Information Technology


Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881


Vaclav Vincalek

Managing Director,
Technology & Advisory Services


Email: vvincalek@wm.ca

Phone: 778-945-2996

Recent Cyber Security Articles

Limiting social media and online activity can protect you from ID theft

Limiting social media and online activity can protect you from ID theft ... because it can expose you to hackers ...
Read More
/ Cyber Security News

Lawsuit filed in Hy-Vee data breach

The lawsuit claims that Hy-Vee left millions vulnerable to fraud and identity theft by taking so long to respond. While ...
Read More
/ Cyber Security News

Limiting social media and online activity can protect you from ID theft

Tyler Russell with the Better Business Bureau says one way people can prevent identity theft and scams is using their ...
Read More
/ Cyber Security News

Athens man sues local health agency for data breach

Athens man sues local health agency for data breach ... the private information of patients, putting them at “grave risk” ...
Read More
/ Cyber Security News

Giving force to Nigeria’s data protection regulation

Nigeria recently took a cue from the European GDPR by coming up with a data protection regulation. However, while the ...
Read More
/ GDPR

Kansas AG urges US Supreme Court to block limit on theft prosecutions

Kansas AG urges U.S. Supreme Court to block limit on theft prosecutions ... I-9 form whenever building criminal cases for ...
Read More
/ Cyber Security News

Haaretz Exclusive No Kremlin Link Found to Russian Hacker Awaiting Extradition in Israel, Lead …

... counts of fraud, identity theft, computer hacking and money laundering. ... Rasmussen has been following developments in the case ...
Read More
/ Cyber Security News

Police: Woman used baby car seat to hide stolen items from Tulsa Target store

Police arrested Edwards on suspicion of identity theft, possession of someone else's cards, stolen property, larceny and possession of fake ...
Read More
/ Cyber Security News

Reuters US Domestic News Summary

Following is a summary of current US domestic news briefs. Classes ... U.S. Supreme Court divided over Kansas immigrant identity ...
Read More
/ Cyber Security News
Loading...