WCG Blogs

Discover innovative stories from our leading bloggers, our people, our capabilities, our research, and the ever-changing face of our firm.

Browse by


risk management

Securing Your Assets Against Cybersecurity Threats

During the COVID-19 Pandemic, advanced persistent threats (APTs) are working overtime to steal information from secure systems. Protect and secure your information assets against these threats from now on.


Role and Impact of Women in Technology

Even with the underrepresentation of women in the technology industry, many women have taken leadership roles in the industry and are recognized globally. This article gives a brief history of women in technology, and the impact of women today in enhancing diversity in the technology industry. At Wilson Consulting Group, we value the role women have in the technology field and the influence they bring to the cybersecurity sector.


Global Privacy Laws and Data Protection Regulations

The protection of employee and consumer data has become a priority for companies and organizations, especially with the ever-increasing potential for liability due to the use of new technologies. The collection and management of data require a broad range of legal compliance activities. It is essential to prioritize and protect sensitive, confidential, and proprietary information. Data breaches or losses can have a substantial adverse effect on a company’s financials and reputation. This article discusses several privacy laws expected to guide organizations in the protection of their information assets, and the privacy rights of individuals, through compliance.

risk management

Surviving Security Risks Existent in Third-Party Software

Third-Party Software is comprised of software libraries, modules and other components that are either purchased from a third-party vendor or made freely available. It includes open source software and commercial off-the-shelf components, which are components that are available for use straight away instead of building entirely from scratch, thereby reducing application development time.


COVID-19 Facts: How Business Leaders Should Take Action

At the current time, much is unknown about the COVID-19 pandemic that has swept the globe. However, there is an undeniable threat to local and international health and economic status. Business leaders, like you, have a key role in implementing strategies and crisis responses to the growing threat of the coronavirus. Here’s how business leaders should take action.

risk management

Ways to Mitigate Social Engineering-based Cyber Attacks

Social engineering is an attack mechanism majorly aimed at misleading employees or individuals to hand over relevant information for the attacker’s financial gain. Social engineering attacks are launched mostly via email, social media, and over the phone.


The Impact of 5G Networks on Cybersecurity

5G is a wireless technology with higher speeds and increased bandwidth, which means that you can download/stream videos online at a faster rate without worrying much about the number of users on the network. 5G networks also help reduce the time needed for data to travel across the network. This process is called latency, which is a major factor in automated processes, such as self-driving cars and factory robots. Due to the massive connectivity of devices collectively known as the Internet of Things (IoT) across 5G networks, viable and in-depth security measures should be in place to prevent cybercriminals from hijacking the connected devices or launching Distributed Denial of Service (DDoS) attacks.


Tips to Leverage the Investment in the Shared CISO

In April this year, Georgia Institute of Technology announced that they suffered a security breach leading to unlawful access to personally identifiable information of about 1.3 million students and staff. An internal investigation found that the unauthorized access to their network occurred in December 2018.

risk management

Combatting the Security Risks of Cloud Computing

Small and large enterprises continue to benefit from increased digitization and greater use of cloud-based application and storage facilities. Cloud services are making it possible for businesses to place their information and data in “containers” that can be deployed consistently and reliably.

risk management

Protecting Sensitive data from Vulnerable Application User Interface

ProtonMail, a Swiss-based email service provider, duped a sophisticated phishing scheme against a team of journalists from Bellingcat. The cybercriminals had written an email that claimed to be from the ProtonMail team and asked for their login credentials. While the motives appear to be political, ProtonMail prevented their success by partnering with Swiss authorities in shutting down the web domains involved. Should the phishers have succeeded, ProtonMail’s user interface (UI) would have been easy to bypass — no matter how cutting edge their system’s security is.

Subscription Center

Stay in the Know with Our Newsletter