WCG Blogs

Discover innovative stories from our leading bloggers, our people, our capabilities, our research, and the ever-changing face of our firm.
Blog
The Reason why Application Leaders should care about Privacy and Data Protection

-As of July 2018, downloadable apps on the Apple App Store reached 3.2 million. Data shows that social media applications are the most frequently used, allowing people to connect — and download other supporting apps. As people spend more time on their mobile phones, programming and production of apps are growing exponentially. While developing these products increases visibility and brand value for companies, it is equally important that leaders heed security guidelines.

Blog
Insider Threat in Financial Sector

-According to CA Technologies, 53% of the organizations they surveyed experienced an insider threat in the past 12 months and it is only growing in frequency. How can a company combat a threat when it’s coming from their own people?

Blog
Fighting Phishing in the Financial Sector

-As Russia welcomed the warmth of spring last March 2018, dozens of banks experienced a phishing attack from a hacker group called Silence. The sender of the email was disguised as FinCERT, Russian Central Bank’s security arm. The emails had attachments that claimed to help standardize digital communication across all banks. In reality, the files contained Silence’ downloader to exfiltrate important data.

Blog
Security and Privacy Issues of Connected Medical Devices

-The healthcare sector is developing more technologically advanced devices aimed at making healthcare more accurate and safer. While the goal is to accelerate the body’s capacity to heal, computer-hacking threats to these devices that millions of people depend on pose serious issues. It is also not a surprise why hackers are extremely interested in health record data; while social security number is worth 10 cents on the dark web, and credit card 25 cents, medical health record data could be worth hundreds or even thousands of dollars. This means trouble not only for healthcare providers but also the patients they help.

Blog
The link between Data Loss Prevention (DLP) and GDPR compliance

-Humanity’s entrance into the Fourth Industrial Revolution has made exponential changes to how people relate with one another and with their technology. Data is easily uploaded and shared to other gadgets through high-speed Internet and Cloud storage. The increased use of these and other supply chain networks has also made files easier to access—and harder to protect.

Blog
The Risks of Using Cloud Services

-When J. C. R. “Lick” Licklider developed ARPAnet in 1962, he had the vision of creating a device that could receive and send data simultaneously amongst a large group of people. He called this idea the “Intergalactic Computer Network”. It carried the necessary principles that would find today’s Internet and, later, cloud computing and storage. In 2018, the Internet had 3.2 billion users. As a result, large amounts of data production and sharing created the demand for quicker, more collaborative storage solutions as an alternative to physical drives.

Blog
The Insecurity of Facial Recognition

-The monumental success of the semi-automated facial recognition traces its roots back in the Los Angeles County Sheriff’s Department in 1988. Detectives used composite drawings of suspects and ran them through the very first system deployed to the Lakewood Division, in hopes that the digitized mugshots in their database would reveal who their prime suspect would be.

Blog
Internet of Things and the Impact of Smart Technology on Cybersecurity

-In 2015, experts declared that the fourth industrial revolution had begun in Germany and other countries. The manufacturing industry started developing smart machines to do more complex work and in the years that followed, these smart machines include fitness bracelets connected to mobile applications that give real-time updates on exercise routines, and in smart refrigerators that can communicate if it’s time to order more groceries.

Blog
Automation of Cybersecurity and the Role of Virtual CISOs

-2018 presented the possibilities and opportunities for cybersecurity. Unfortunately, these same technological advancements can be used for cybercrime. According to Symantec’s Internet Security Threat Report , malware and cyber threats continue to increase each year. Since 2017, there has been a 54% increase in mobile malware making systems more and more vulnerable. Cisco’s report shows that ransomware attacks exponentially increase by 350% per year, showing cause for urgency. With hackers and cyber criminals finding different ways to finesse through protected networks and hardware, it is high time for corporations to counter these threats.

Blog
The FDA Guide: How Medical Devices Can Be Secured

-Medical devices have gone from simple bandages that help wrap up wounds to MRI machines that scan the body for organ irregularities. With increasing complexity over the last five years, these devices have come to rely on software and the Internet to assist people with more efficiency. Now that these machines are able to communicate with one another, their network is susceptible to data loss and compromise due to cyberattacks. A good example of this was the 2017 WannaCry’s ransomware attack against the UK’s National Health Service (NHS), costing them £92M to recover the data and its subsequent cleanup.

Blog
A 2018 Cybersecurity Review

-The threats and opportunities Cyber advancements and events took center stage this year. This brought about new threats, opportunities, and solutions that are worth looking back to and learning from. As 2018 comes to a close, let us review four major trends:

Blog
An Imminent Connection: 5G and Its Cybersecurity Implications

-Over the past few years, businesses have increasingly shifted towards digital customer communication and records. As efficiency and connectivity of this digitization of business has increased, so have the likelihood and potential damage of cyberattacks. As our society nears yet another informational shift towards 5th generation (5G) wireless networks, these already prevalent dangers to corporate data security will intensify.

Blog
The Role of AI in Cybersecurity

-Artificial intelligence (AI) and machine learning (ML) have become fundamental to cybersecurity. Artificial Intelligence has the amazing capacity for use to protect as well as to do harm. In the wrong applications, AI has a tremendous capacity to render security systems useless. Grasping the scope of AI’s capabilities and strengths and how it can help protect information is, therefore, essential for any firm concerned with data security.

Blog
The Future of Blockchain Technology in Cybersecurity

-Modern cyberattacks frequently target companies with large data holdings. Last year, Equifax, a credit reporting agency that collects information on nearly 800 million individuals and 88 million businesses worldwide, fell victim to a massive attack that compromised the personal information of 150 million customers. Just earlier this year, GitHub, a major online software development platform, suffered from a DDoS attack that overloaded their servers with simultaneous online traffic of 1.35 TB per second. Attacks such as these are increasingly frequent and are often used to steal valuable customer data from companies. In response to this growing threat, blockchain technology is now being implemented by some companies.

Blog
What California's Consumer Privacy Act Means for Your Organization

-Following the implementation of the European Union’s General Data Protection Regulation (GDPR) earlier this year, privacy and security regulations are taking the worldby storm. The California Consumer Privacy Act, petitioned and signed June 2018, will be put into effect on January 1, 2020. Despite its smaller geographical scope, the law will have significant effect on many businesses.

Blog
Reducing Risks in Financial Transactions with SWIFT Sanctions Screening

-The Society for Worldwide Interbank Financial Telecommunications (SWIFT) offers a messaging service which allows financial institutions around the world to send and receive information and instructions about financial transactions securely.