“Enterprises that implement a vulnerability management process will experience 90% fewer successful attacks…” 

~ Gartner, Predictions for  IT Security Directors

“We already have a firewall and intrusion detection systems

That’s a good start. However, despite all the attention that firewalls, anti-virus applications and Intrusion Detection System (IDS) receive, security vulnerabilities still plague organizations. By having these tools, organizations often believe that their networks and applications are safe from security incidents. Unfortunately, this is not the case.

The operational environments within businesses are becoming increasingly complex, and more reliant on the use of sofware and data every day. Often little attention is paid to business processes, policies, or any sort of consistent review of security posture. Many systems are not designed to protect network and data from improper configuration, out of date software, or unexpected user intervention from a disgruntled employee. Most sophisticated attacks can bypass intrusion detection systems and penetrate networks, and externally executed code may not be noticed at all. The best defense is fully knowing the existing security status, and understanding the actions required to cover any gaps or deficiencies in your security posture.

 “Our company isn’t a target for attacks”

Sure, you’re not Amazon, Apple, Facebook or Google. Recent history of largescale security incidents show not all attacks are targeted. Crypolocking viruses, Code Red, Wannacry, Bagel, etc. attacked systems at random, and operated using specific vulnerabilities. It is important to change thinking beyond “it probably won’t happen” to fully understanding the current situation, and fixing issues by evaluating the facts obtained.

The Technology and Risk Advisory group takes a wholistic approach to vulnerability management – including everything from organizational structure, data endpoints, operational policy, technology management, IT management policy, and existing security management to develop an actionable plan to make your company more secure, and better positioned to detect and act quickly when a security incident happens.

Technology and Risk Advisory Contacts:

Paul Schmidt

CPA, CA, CITP, Information Technology

Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881

Vaclav Vincalek

Managing Director,
Technology & Advisory Services

Email: vvincalek@wm.ca

Phone: 778-945-2996

Recent Cyber Security Articles

The Flip Side of Amazon

Amazon tends to be a dirty word in the residential security services industry, because ... Taking this path requires that ...
Read More
/ Cyber Security News

Network Segmentation: The First Line of Defense

Network segmentation is the security integrator's first and most important line of defense against a data breach. It is a ...
Read More
/ Cyber Security News

Lightning can strike twice: Marriott International suffers second data breach

After the previous data breach, one would have hoped that Marriott had really locked down its cybersecurity to ensure it ...
Read More
/ Cyber Security News

EHNAC Announces Launch of Privacy and Security Toolkit

... healthcare data, today announced the addition of new Privacy and Security ... cybersecurity, breach and enforcement, makes privacy and ...
Read More
/ Cyber Security News

Data science to debut as the UO’s newest major this fall

With all reviews completed and final approvals in hand, the data science ... “I am thrilled that the UO is ...
Read More
/ Data Analytics

Rise of the Machines: How Big Data is Changing More Than Just Portfolio Management

For policy-making efforts, the various SEC divisions rely on the Office of Data Science and the Division of Economic Research ...
Read More
/ Data Analytics

Okta Waves Flag For ‘Platform-First’ Approach To Identity Management

... it's User eXperience analysis or whether it's big data analytics and so on. ... But if firms like Okta ...
Read More
/ Data Analytics

Big Data Analytics in Healthcare Market Size Analysis, Top Manufacturers, Shares, Growth …

Big Data Analytics in Healthcare Market Size Analysis, Top Manufacturers, Shares, Growth Opportunities and Forecast to 2026. By Navanath R ...
Read More
/ Data Analytics

Cyber Insurance Market (COVID-19 UPDATE) Anticipated to Grow at a Significant Pace by 2026 …

Global “Cyber Insurance Market” 2020 Report comprises of strong research of global business which empowers the consumer to look at ...
Read More
/ Insurance