WCG Blogs

Discover innovative stories from our leading bloggers, our people, our capabilities, our research, and the ever-changing face of our firm.

Browse by

Clear

cybersecurity

Improving Cybersecurity Awareness in Healthcare

Many cyberattacks succeed due to mistakes by employees and a lack of awareness of basic aspects of cybersecurity. According to the 2022 Verizon Data Breach Investigations Report, 82% of data breaches in 2021 involved the human element.

compliance

FedRAMP Compliance: What you need to know?

FedRAMP is a U.S. government-wide program that delivers a standard approach to the security assessment, authorization, and continuous monitoring of cloud products and services.

compliance

What NIST 800-53 Revision 5 Means to Cybersecurity

NIST Special Publication (SP) 800-53, Revision 5, Security and Privacy Controls for Information Systems and Organizations, represents a multi-year effort to develop the next generation of security and privacy controls needed to strengthen and support .

cybersecurity

Urgency of Cyber Security After Colonial Pipeline

On May 7, 2021, Colonial Pipeline, Co. was forced to close operations after a ransomware hack was confirmed to have breached their systems. This attack hindered services to the East-coast of the United States and sparked fears of a massive gas shortage to American motorists. This hack greatly compromised Colonial Pipeline’s system integrity and put private data at risk.

data analytics

Do You Need A Data Analytics System?

Data analytics (DA) involves processes and activities designed to obtain and evaluate data to extract useful information. The results of DA may be used to identify areas of key risk, fraud, errors, or misuse; improve business efficiency, verify process effectiveness, and make more-informed business decisions.

risk management

Best Practices for Securing Educational Resources in the Age of Distance Learning

According to Microsoft’s Global Threat Activity Tracker, more than 4.7 million malicious software (or “malware”) incidents were detected in the education industry worldwide in June 2020 – which accounted for more than 60 percent of all the corporate and institutional malware incidents reported during the month, the most affected industry by far. More than 20 universities and charities across the United States, United Kingdom, and Canada reported that they were compromised by a cyberattack.

corporate

COVID-19 and Remote Work Security Challenges

Since the COVID-19 outbreak in January 2020 and pandemic declaration in late March, organizations and federal agencies have been scrambling to secure their systems and create remote work contingency plans to keep continuity for their business matters.

risk management

Securing Your Assets Against Cybersecurity Threats

During the COVID-19 Pandemic, advanced persistent threats (APTs) are working overtime to steal information from secure systems. Protect and secure your information assets against these threats from now on.

culture

Role and Impact of Women in Technology

Even with the underrepresentation of women in the technology industry, many women have taken leadership roles in the industry and are recognized globally. This article gives a brief history of women in technology, and the impact of women today in enhancing diversity in the technology industry. At Wilson Consulting Group, we value the role women have in the technology field and the influence they bring to the cybersecurity sector.

compliance

Global Privacy Laws and Data Protection Regulations

The protection of employee and consumer data has become a priority for companies and organizations, especially with the ever-increasing potential for liability due to the use of new technologies. The collection and management of data require a broad range of legal compliance activities. It is essential to prioritize and protect sensitive, confidential, and proprietary information. Data breaches or losses can have a substantial adverse effect on a company’s financials and reputation. This article discusses several privacy laws expected to guide organizations in the protection of their information assets, and the privacy rights of individuals, through compliance.

Subscription Center

Stay in the Know with Our Newsletter