WCG Blogs

Discover innovative stories from our leading bloggers, our people, our capabilities, our research, and the ever-changing face of our firm.
Blog
Cyber Scammers, Are You Their Next Target?

-We have all encountered instances of cyber-scams, such as spam emails and viruses that attack private and commercial computer networks daily.Oftentimes, software is installed in hopes to safeguard systems -however, this does not always work. The security of information systems extends beyond firewalls, detection systems and other protective software – it involves the people operating those systems.

Blog
Is Your Web Application Secure?

-It is imperative that organizations and government entities are knowledgeable in securing web applications. Mis-configurations and lack of security controls can lead to information leakage, cross-site scripting, and many more vulnerabilities.

Blog
Compliance Consulting Saves Businesses

-Many firms that suffer from cyber-breaches not only struggle financially, but their credibility within their industry may also be jeopardized. This can lead to customers losing trust in the company, resulting in loss of potential sales and a struggle to regain customer trust. For these reasons, compliance with federal, industry, and/or cyber regulations is mandatory for businesses and organizations to save themselves from devastating consequences of becoming non-compliant.

Blog
Cyber Security and the Job Market

-With the increase in threats and incidences of cyber-attacks,there is a more apparent need for stronger cyber security governance and infrastructure.This increased demand for cyber security services has also resulted in new job opportunities for experts in the field. According to a report conducted by Cisco, 2016 is expected to witness the creation of one million cyber security jobs globally, with an expected increase to 6 million by the year 2019[1].

Blog
Cyber Security and the 2016 Elections

-With election season fast approaching, the most nerve wracking decision for many individuals in the political sphere, aside from picking a candidate, is ensuring that the electoral cycle runs smoothly and securely. Guaranteeing a free and fair election is top priority, and in order to do so, it is necessary to ensure the security of voting systems and polls.

Blog
Demystifying Cyber Intelligence

-As cyber security takes its place as the industry to watch for the foreseeable future, discussion surrounding this sector has become a minefield of buzz words and infographics. One of its most talked about—yet least understood—concepts is.

Blog
Cybersecurity: Facts vs Fiction

-Cybersecurity is without a doubt one of the hottest topics within the world today. It represents both an exciting new frontier and ominous new threat for companies and government entities across all industries, and is growing more and more important by the day. Unfortunately, as is often the case with new technologies and responsibilities, misinformation about cybersecurity runs rampant.Unfamiliarity with the nature of cyberthreats, lack of knowledge of its tools and best practices, and confusion about where management fits in terms of creating a solid infrastructure are all common pitfalls when seeking to create a solid security posture. Here are some common misconceptions and how you can help your company avoid the pitfalls of misinformation in the new age of cybersecurity.

Blog
The Need for Ongoing Security Awareness Training

-Humans are often regarded as the weakest link in a security breach. According to a study from CompTIA conducted in 2015, which surveyed people from several organizations in the United States, human error represents 52 percent of the cause of security breaches.[1] Businesses spend large amounts of money annually on security solutions but fail to properly address the human element of information security. Human error, whether accidental or malicious, can cause serious security risks or breaches.

Blog
2015 Top Cyber Breaches: Are You Next?

-169 million records were compromised in the 781 recorded incidents in 2015.[1] That is more than the population of California, Texas, Florida, New York, Illinois, Pennsylvania, Ohio, Georgia and North Carolina combined. Numerous companies in a variety of industries were victimized. While the medical and healthcare industry accounted for a staggering two-thirds of all compromises, businesses such as small and large corporations and law firms, suffered the most breaches. So, what exactly happened in 2015? Here is the breakdown of just a few major breaches:

Blog
Cloud Computing 101

-Visionary Steve Jobs once spoke of a dream in which data could be uploaded and accessed anywhere. Before there was the cloud, there were floppy disks, CD ROMs and very large immobile hardware. Fast forward to 2015 – now we are able to access and store information without physical limitations.

Blog
Your Alma Mater is Breached – Should You Care?

-In 2015, the higher education industry experienced 165 security incidents.[1] This year, seven higher education institutions withstood malicious, large-scale data breaches.No higher education institution of any size or prestige is immune to security threats.[2] A compromised security infrastructure can cripple reputation and moreover, result in financial loss.

Blog
IT Governance: What it is, the benefits, and solutions

-Most organizations are addressing the need for IT governance as an important matter. In a study conducted by Gartner in April 2015, 71 percent of respondents indicated that IT risk management data has influence at the board level. Alarmingly however, only 30 percent of respondents said business units are actively involved in developing security policies that will impact their businesses.

Blog
What Football Players and Your Network Have in Common

-Remaining ahead of the curb is crucial in cybersecurity. Organizations that are vulnerable to cyber-attacks must ensure their lines of protection are not outdated – falling behind in this aspect results in a loss of ground to potential hackers. There are innumerable network solutions that are currently on the market that bolster network security and help drastically reduce the risk of an attack. But as the market grows, it makes choosing a plan of defense increasingly complex, let alone selecting appropriate solutions.

Blog
Why HIPAA Compliance Is Important

-Healthcare organizations have increasingly become a target for cyber attacks. Numerous malicious, large scale health data breaches have taken place this year such as the Anthem data breach, which affected nearly 80 million individuals.[1]More recently, UCLA Health suffered a massive data breach in May 2015, where hackers accessed the medical files of more than 4.5 million patients, according to a UCLA Health notice published in July.[2]According to a 2015 Harris Poll commissioned by Vormetric Data Security, 26 percent of healthcare IT decision makers are protecting data because of a data breach in the past.[3] The report also stated that 48 percent of U.S. healthcare organizations reported either encountering a data breach or failing a compliance audit in the last year.

Blog
Ahead of the Curb: Security measures to take before potential IoT boom

-The emergence of large-scale use of Internet of Things (IoT) – a digital network of devices that may be used to record and transmit data – may extend the horizons of internet technology indefinitely. Social networks currently allow people to connect and interact with one another digitally. When the IoT becomes commercially available, it will give individuals the opportunity to interact with devices, and devices the ability to interact with each other on a network that would dwarf the magnitude of today’s cloud. Due to its projected pervasiveness in the global market, it is not surprising that this is – and will continue to be – a hot topic beyond IT.

Blog
2015 OPM Cybersecurity Attack: The Rundown

-Last year the U.S. government faced what is believed to be the largest cyberattack, as the Office of Personnel Management (OPM) discovered an intrusion into personal information of more than 4 million current and former federal employees, according to a recent OPM press release.