Cyber Security related critical incidents occur everyday to businesses around the world. Be prepared by ensuring you have a plan for immediate action, so your time can be focussed on continuing the business.

Ensure IT infrastructure, systems, users and applications that are targeted by advanced threats are appropriately safeguarded to keep your networks running and corporate assets safe.  The key objective with Cyber Security Incident Response is to protect your business operations,  intellectual property, customer data, and reputation. Companies face attacks daily from competitors, criminals, and nation-state entities who exploit all possible vulnerabilities to compromise networks and access sensitive data. Real-time measurement and monitoring of vulnerabilities and the threats is essential to stopping these complex attacks. A comprehensive critical incident response plan is also necessary as it defines the path to resolution of security incidents.

The Technology Risk and Advisory Group has a team of security specialists who are able to not only assist your business in developing a security posture and incident response plan, but can also take over security-related monitoring and incident management so you can also devote existing IT resources to your core business.

Technology and Risk Advisory Contacts:

Paul Schmidt

Partner,
CPA, CA, CITP, Information Technology


Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881


Vaclav Vincalek

Managing Director,
Technology & Advisory Services


Email: vvincalek@wm.ca

Phone: 778-945-2996

Recent Articles:

Grandma Ordered To Delete Grandchildren’s Photos From Facebook Or Pay Fine

GDPR rules typically don't apply to “purely personal” or “household” processing of data, but in this case the judge ruled ...
Read More
/ GDPR

Truecaller data of 47 million Indians breached, company denies

Security report suggest data of popular caller ID app Truecaller was leaked. That's not all, it says the data was ...
Read More
/ Cyber Security News

Naga Munchetty erupts at Matt Hancock over track and trace scheme ‘Sticks in our throat!’

GDPR nightmare.' ... “There are very strict confidentiality rules that are in place, both under GDPR and the medical system ...
Read More
/ GDPR

Why zero trust security needs strong hardware foundations

These are the ability to detect and protect against threats; keeping user ... at boosting the ability of security tools ...
Read More
/ Cyber Security News

Antivirus Software Market 2020 Industry Insights by Growth, Emerging Trends and Forecast to 202

Over the years, cyber security threats have increased rapidly worldwide. ... In addition, usage of the internet and growth in ...
Read More
/ Cyber Security News

Yotpo releases report on user generated content

Compliance with GDPR rules is the biggest challenge facing brands when it comes to leveraging user-generated content. The Rise of ...
Read More
/ GDPR

Solving the security challenges of remote working

The use of data loss prevention (DLP) technology can significantly mitigate this, giving businesses much more ... to quickly detect ...
Read More
/ Cyber Security News

Top 10 Vulnerabilities In Web Apps You Can Prevent With Testing

The OWASP Top 10 2017 is a list of the most significant web application security risks. How are you addressing ...
Read More
/ OWASP

Analytics Round Table 2020: Diagnosing Data

Akixi's Colin Gill told us that some of the biggest challenges businesses face today are analysis paralysis and figuring out ...
Read More
/ Data Analytics
Loading...