WCG Blogs

Discover innovative stories from our leading bloggers, our people, our capabilities, our research, and the ever-changing face of our firm.

Browse by


risk management

Insider Threat in Financial Sector

According to CA Technologies, 53% of the organizations they surveyed experienced an insider threat in the past 12 months and it is only growing in frequency. How can a company combat a threat when it’s coming from their own people?

risk management

Fighting Phishing in the Financial Sector

As Russia welcomed the warmth of spring last March 2018, dozens of banks experienced a phishing attack from a hacker group called Silence. The sender of the email was disguised as FinCERT, Russian Central Bank’s security arm. The emails had attachments that claimed to help standardize digital communication across all banks. In reality, the files contained Silence’ downloader to exfiltrate important data.


Security and Privacy Issues of Connected Medical Devices

The healthcare sector is developing more technologically advanced devices aimed at making healthcare more accurate and safer. While the goal is to accelerate the body’s capacity to heal, computer-hacking threats to these devices that millions of people depend on pose serious issues. It is also not a surprise why hackers are extremely interested in health record data; while social security number is worth 10 cents on the dark web, and credit card 25 cents, medical health record data could be worth hundreds or even thousands of dollars. This means trouble not only for healthcare providers but also the patients they help.


The link between Data Loss Prevention (DLP) and GDPR compliance

Humanity’s entrance into the Fourth Industrial Revolution has made exponential changes to how people relate with one another and with their technology. Data is easily uploaded and shared to other gadgets through high-speed Internet and Cloud storage. The increased use of these and other supply chain networks has also made files easier to access—and harder to protect.

risk management

The Risks of Using Cloud Services

When J. C. R. “Lick” Licklider developed ARPAnet in 1962, he had the vision of creating a device that could receive and send data simultaneously amongst a large group of people. He called this idea the “Intergalactic Computer Network”. It carried the necessary principles that would find today’s Internet and, later, cloud computing and storage. In 2018, the Internet had 3.2 billion users. As a result, large amounts of data production and sharing created the demand for quicker, more collaborative storage solutions as an alternative to physical drives.


The Insecurity of Facial Recognition

The monumental success of the semi-automated facial recognition traces its roots back in the Los Angeles County Sheriff’s Department in 1988. Detectives used composite drawings of suspects and ran them through the very first system deployed to the Lakewood Division, in hopes that the digitized mugshots in their database would reveal who their prime suspect would be.


Internet of Things and the Impact of Smart Technology on Cybersecurity

In 2015, experts declared that the fourth industrial revolution had begun in Germany and other countries. The manufacturing industry started developing smart machines to do more complex work and in the years that followed, these smart machines include fitness bracelets connected to mobile applications that give real-time updates on exercise routines, and in smart refrigerators that can communicate if it’s time to order more groceries.


Automation of Cybersecurity and the Role of Virtual CISOs

2018 presented the possibilities and opportunities for cybersecurity. Unfortunately, these same technological advancements can be used for cybercrime. According to Symantec’s Internet Security Threat Report , malware and cyber threats continue to increase each year. Since 2017, there has been a 54% increase in mobile malware making systems more and more vulnerable. Cisco’s report shows that ransomware attacks exponentially increase by 350% per year, showing cause for urgency. With hackers and cyber criminals finding different ways to finesse through protected networks and hardware, it is high time for corporations to counter these threats.


The FDA Guide: How Medical Devices Can Be Secured

Medical devices have gone from simple bandages that help wrap up wounds to MRI machines that scan the body for organ irregularities. With increasing complexity over the last five years, these devices have come to rely on software and the Internet to assist people with more efficiency. Now that these machines are able to communicate with one another, their network is susceptible to data loss and compromise due to cyberattacks. A good example of this was the 2017 WannaCry’s ransomware attack against the UK’s National Health Service (NHS), costing them £92M to recover the data and its subsequent cleanup.


A 2018 Cybersecurity Review

The threats and opportunities Cyber advancements and events took center stage this year. This brought about new threats, opportunities, and solutions that are worth looking back to and learning from. As 2018 comes to a close, let us review four major trends:

Subscription Center

Stay in the Know with Our Newsletter