“Enterprises that implement a vulnerability management process will experience 90% fewer successful attacks…” 

~ Gartner, Predictions for  IT Security Directors

“We already have a firewall and intrusion detection systems

That’s a good start. However, despite all the attention that firewalls, anti-virus applications and Intrusion Detection System (IDS) receive, security vulnerabilities still plague organizations. By having these tools, organizations often believe that their networks and applications are safe from security incidents. Unfortunately, this is not the case.

The operational environments within businesses are becoming increasingly complex, and more reliant on the use of sofware and data every day. Often little attention is paid to business processes, policies, or any sort of consistent review of security posture. Many systems are not designed to protect network and data from improper configuration, out of date software, or unexpected user intervention from a disgruntled employee. Most sophisticated attacks can bypass intrusion detection systems and penetrate networks, and externally executed code may not be noticed at all. The best defense is fully knowing the existing security status, and understanding the actions required to cover any gaps or deficiencies in your security posture.

 “Our company isn’t a target for attacks”

Sure, you’re not Amazon, Apple, Facebook or Google. Recent history of largescale security incidents show not all attacks are targeted. Crypolocking viruses, Code Red, Wannacry, Bagel, etc. attacked systems at random, and operated using specific vulnerabilities. It is important to change thinking beyond “it probably won’t happen” to fully understanding the current situation, and fixing issues by evaluating the facts obtained.

The Technology and Risk Advisory group takes a wholistic approach to vulnerability management – including everything from organizational structure, data endpoints, operational policy, technology management, IT management policy, and existing security management to develop an actionable plan to make your company more secure, and better positioned to detect and act quickly when a security incident happens.

Technology and Risk Advisory Contacts:

Paul Schmidt

CPA, CA, CITP, Information Technology

Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881

Vaclav Vincalek

Managing Director,
Technology & Advisory Services

Email: vvincalek@wm.ca

Phone: 778-945-2996

Recent Cyber Security Articles

AI for CyberSecurity: Managing Threats and Upscaling Risk Management

The manipulation of political systems, threat to national security, ... Incorporating, an AI-driven cybersecurity model to augment current cyber ...
Read More
/ Cyber Security News

‘Oblivious’ Drizly Reported Breach 5 Months Late, Suit Says

"Despite Drizly's claims of 'trust,' Drizly's deficient data security measures left its customers' sensitive customer data vulnerable to hackers who ...
Read More
/ Cyber Security News

SSP to host education event on identity theft

ALTON — Senior Services Plus is hosting a Zoom presentation discussing identity theft on Monday, Sept. 21 from 10-11 a.m ...
Read More
/ Cyber Security News

More than 400000 hit by data breach at online exam site — what to do

It added, “ProctorU has implemented additional security measures to prevent any recurrence. We have begun notifying affected universities and ...
Read More
/ Cyber Security News

Crystal Kinzel recognized for work on Identity Theft and Fraud Alert Task Force

... your personal records from criminals seeking to steal your identity. ... she has been proud to work closely with ...
Read More
/ Cyber Security News

Games, not shame: Why security awareness training needs a makeover

"If you opened up the Verizon Data Breach Investigations Report this year," ... Hacking and breaches in general, according to ...
Read More
/ Cyber Security News

Financial Services Security Software Market 2020 Industry Size, Trends, Global Growth, Insights …

The rapidly changing market scenario and initial and future assessment of the impact is covered in the report. The report ...
Read More
/ Cyber Security News

More fraud in the midst of pandemic: Emergency funding scamm

More fraud in the midst of pandemic: Emergency funding scamm ... The scammers use stolen identities to file claims for ...
Read More
/ Cyber Security News

Ransomware Hackers Post Data From 2 Providers, Device Manufacturer

... a potential data breach. Suspicious activity was detected in a number of employee email accounts, and steps were taken ...
Read More
/ Cyber Security News