WCG Blogs

Discover innovative stories from our leading bloggers, our people, our capabilities, our research, and the ever-changing face of our firm.
Blog
Do You Need A Data Analytics System?

-Data analytics (DA) involves processes and activities designed to obtain and evaluate data to extract useful information. The results of DA may be used to identify areas of key risk, fraud, errors, or misuse; improve business efficiency, verify process effectiveness, and make more-informed business decisions.

Blog
Tips to Leverage the Investment in the Shared CISO

-In April this year, Georgia Institute of Technology announced that they suffered a security breach leading to unlawful access to personally identifiable information of about 1.3 million students and staff. An internal investigation found that the unauthorized access to their network occurred in December 2018.

Blog
Combatting the Security Risks of Cloud Computing

-Small and large enterprises continue to benefit from increased digitization and greater use of cloud-based application and storage facilities. Cloud services are making it possible for businesses to place their information and data in “containers” that can be deployed consistently and reliably.

Blog
The Reason why Application Leaders should care about Privacy and Data Protection

-As of July 2018, downloadable apps on the Apple App Store reached 3.2 million. Data shows that social media applications are the most frequently used, allowing people to connect — and download other supporting apps. As people spend more time on their mobile phones, programming and production of apps are growing exponentially. While developing these products increases visibility and brand value for companies, it is equally important that leaders heed security guidelines.

Blog
Do Not Be Held Hostage by Ransomware Attacks

-In 2016, the FBI warned of the rise of the incidents of ransomware. Since then, these malicious applications have continued to grow in sophistication. Evolving new cyberattack modelsare being developedresultingin attackers being able to launch more sophisticated and profitable attacks on a larger global scale. Consequently, the incidences of these attacks have doubled to 27 percent of cyberincidents over the previous year, 2016 . To put this trend in perspective, there were 638 million ransomware attacks in 2016, per the SonicWall GRID 2017 Threat Network .This means that organizations across multiple countries have been targeted with close to 4 million ransomware attacks per day in 2017.

Blog
Developing Safeguards to Combat the Rise of ATM Malware

-ATM is one of the great convenience of this modern financial age. However, ATMs have been plagued with increased attacks as criminals are exploiting hardware and software vulnerabilities to exploit ATMs to obtain large sums of cash.A Trend Micro andEuropol2017 Report[1] highlighted that the use of ATM malware has evolved significantly as the scope and scale of these attacks have grown. This latestdevelopment is attributable to several factors.

Blog
Boosting Your Security Posture with Security Analytics

-With the rise of cyberincidents, organizations continue to search for effective tools and strategies to fight against cybercrimes and to build resilience in their environment. Based on the 2017 Trustwave Report[1], cyberincidents were spread across economic sectors and regions during the reporting year. Every single region was affected, with North America and the Asia-Pacific regions accounting for the bulk of reported cases (70%). The retail industry had the single largest share of cyberincidents (22%), followed by the food and beverage (20%), financeand insurance (14%), hospitality (12%). Technology, transport, entertainment, travel and other sectors accounted for the remaining 32%. These revealing statistics emphasize the continued urgent need for organizations to shore up the cybersecurity defenses while proactively engaging in offensive tactics.

Blog
The Business Impact of Unsecured Mobile Devices

-In 2016, it was discovered that mobile device breaches cost enterprises millions of dollars.Lookout, a global leader in mobile security, and Ponemon Institute conducted a study on the economic risk of mobile data breaches, as well as potential maximum losses. They found during their research that losses could be as high as $26.4 million. There were 588 IT and security leaders from the Forbes Global 2000 companies who participated in this study. Researchers examined the risks introduced by employee access to increasing amounts of corporate data via their mobile devices and then assigned a cost to any mobile-based breach.

Blog
The Need for Ongoing Security Awareness Training

-Humans are often regarded as the weakest link in a security breach. According to a study from CompTIA conducted in 2015, which surveyed people from several organizations in the United States, human error represents 52 percent of the cause of security breaches.[1] Businesses spend large amounts of money annually on security solutions but fail to properly address the human element of information security. Human error, whether accidental or malicious, can cause serious security risks or breaches.

Blog
2015 Top Cyber Breaches: Are You Next?

-169 million records were compromised in the 781 recorded incidents in 2015.[1] That is more than the population of California, Texas, Florida, New York, Illinois, Pennsylvania, Ohio, Georgia and North Carolina combined. Numerous companies in a variety of industries were victimized. While the medical and healthcare industry accounted for a staggering two-thirds of all compromises, businesses such as small and large corporations and law firms, suffered the most breaches. So, what exactly happened in 2015? Here is the breakdown of just a few major breaches:

Blog
Cloud Computing 101

-Visionary Steve Jobs once spoke of a dream in which data could be uploaded and accessed anywhere. Before there was the cloud, there were floppy disks, CD ROMs and very large immobile hardware. Fast forward to 2015 – now we are able to access and store information without physical limitations.

Blog
Your Alma Mater is Breached – Should You Care?

-In 2015, the higher education industry experienced 165 security incidents.[1] This year, seven higher education institutions withstood malicious, large-scale data breaches.No higher education institution of any size or prestige is immune to security threats.[2] A compromised security infrastructure can cripple reputation and moreover, result in financial loss.

Blog
IT Governance: What it is, the benefits, and solutions

-Most organizations are addressing the need for IT governance as an important matter. In a study conducted by Gartner in April 2015, 71 percent of respondents indicated that IT risk management data has influence at the board level. Alarmingly however, only 30 percent of respondents said business units are actively involved in developing security policies that will impact their businesses.

Blog
What Football Players and Your Network Have in Common

-Remaining ahead of the curb is crucial in cybersecurity. Organizations that are vulnerable to cyber-attacks must ensure their lines of protection are not outdated – falling behind in this aspect results in a loss of ground to potential hackers. There are innumerable network solutions that are currently on the market that bolster network security and help drastically reduce the risk of an attack. But as the market grows, it makes choosing a plan of defense increasingly complex, let alone selecting appropriate solutions.

Blog
Why HIPAA Compliance Is Important

-Healthcare organizations have increasingly become a target for cyber attacks. Numerous malicious, large scale health data breaches have taken place this year such as the Anthem data breach, which affected nearly 80 million individuals.[1]More recently, UCLA Health suffered a massive data breach in May 2015, where hackers accessed the medical files of more than 4.5 million patients, according to a UCLA Health notice published in July.[2]According to a 2015 Harris Poll commissioned by Vormetric Data Security, 26 percent of healthcare IT decision makers are protecting data because of a data breach in the past.[3] The report also stated that 48 percent of U.S. healthcare organizations reported either encountering a data breach or failing a compliance audit in the last year.

Blog
Ahead of the Curb: Security measures to take before potential IoT boom

-The emergence of large-scale use of Internet of Things (IoT) – a digital network of devices that may be used to record and transmit data – may extend the horizons of internet technology indefinitely. Social networks currently allow people to connect and interact with one another digitally. When the IoT becomes commercially available, it will give individuals the opportunity to interact with devices, and devices the ability to interact with each other on a network that would dwarf the magnitude of today’s cloud. Due to its projected pervasiveness in the global market, it is not surprising that this is – and will continue to be – a hot topic beyond IT.