WCG Blogs

Discover innovative stories from our leading bloggers, our people, our capabilities, our research, and the ever-changing face of our firm.
Blog
Keeping Applications Secure from Malware

-Application security needs more attention as there is an increasing usage of applicationson smart devices. While security has seen improvements over the years, applications still have vulnerabilities that can expose them to spyware, keyloggers, viruses, worms, and other harmful scripts.

Blog
Minimizing Threats and Vulnerabilities on Mobile Platforms

-Mobile devices have enabled improved benefits of computing which have likely resulted in increased efficiencies for the organization and users. However, with the potential benefits come increased challenges in maintaining a stable and secured environment at work. Mobile devices are one of the most vulnerable vectors in an organization. As its ubiquity continues to expand, organizations continue to be challenged in developing suitable security controls to minimize vulnerabilities. These challenges are generally inherent in the device and use patterns. This dilemma has therefore placed increased challenges on the information security team to defend against mobile threats, maintain security standards and minimize risks.

Blog
Managing Vulnerabilities and Risks in the Healthcare Sector

-The healthcare industry processes a large volume of sensitive personal data of billions of people worldwide. A security breach therefore has significant financial, personal and organizational consequences. It is therefore hardly surprising that the cost of data breach in healthcare organizations more than double the average cost in other sectors. According to the 2017 Cost of Data Breach Study, healthcare organizations had an average cost of $380 for each lost or stolen record . This is compared to the average global cost of data breach being $141.