WCG Blogs

Discover innovative stories from our leading bloggers, our people, our capabilities, our research, and the ever-changing face of our firm.

Browse by

Clear

whitepapers

Strategies to Combat the Rise of Advanced Persistent Threats (APTs)

The number of reported incidences of Advanced Persistent Threats (APTs) continue to rise over the last few years. While there is no precise statistics, which may be attributable to the limited awareness of these attacks or reluctance to share attack incidences, it is recognized that many organizations in various countries have fallen victims to APT attacks. Their knownvictims include global technology firms, financial services, military and defense entities, where the threat actors or attackers are usually state sponsored groups and cyber mercenaries.

risk management

Shielding the Organization in the Fight Against Malware

Malware continues to be one of the top factors contributing to network compromise which may eventually lead to data breach. Malware attack has the costliest impact on organizations with an average total cost amounting to$2.4 million .This means close to $7,000 per day or $200,000 per month is incurred by victims across the globe. Moreover, these attacks cause significant damage to an organization’s infrastructure by compromising data, preventing or slowing down the running of computers and resulting in the loss of vital information.

risk management

Minimizing Threats and Vulnerabilities on Mobile Platforms

Mobile devices have enabled improved benefits of computing which have likely resulted in increased efficiencies for the organization and users. However, with the potential benefits come increased challenges in maintaining a stable and secured environment at work. Mobile devices are one of the most vulnerable vectors in an organization. As its ubiquity continues to expand, organizations continue to be challenged in developing suitable security controls to minimize vulnerabilities. These challenges are generally inherent in the device and use patterns. This dilemma has therefore placed increased challenges on the information security team to defend against mobile threats, maintain security standards and minimize risks.

risk management

Managing Vulnerabilities and Risks in the Healthcare Sector

The healthcare industry processes a large volume of sensitive personal data of billions of people worldwide. A security breach therefore has significant financial, personal and organizational consequences. It is therefore hardly surprising that the cost of data breach in healthcare organizations more than double the average cost in other sectors. According to the 2017 Cost of Data Breach Study, healthcare organizations had an average cost of $380 for each lost or stolen record . This is compared to the average global cost of data breach being $141.

risk management

Do Not Be Held Hostage by Ransomware Attacks

In 2016, the FBI warned of the rise of the incidents of ransomware. Since then, these malicious applications have continued to grow in sophistication. Evolving new cyberattack modelsare being developedresultingin attackers being able to launch more sophisticated and profitable attacks on a larger global scale. Consequently, the incidences of these attacks have doubled to 27 percent of cyberincidents over the previous year, 2016 . To put this trend in perspective, there were 638 million ransomware attacks in 2016, per the SonicWall GRID 2017 Threat Network .This means that organizations across multiple countries have been targeted with close to 4 million ransomware attacks per day in 2017.

risk management

Developing Safeguards to Combat the Rise of ATM Malware

ATM is one of the great convenience of this modern financial age. However, ATMs have been plagued with increased attacks as criminals are exploiting hardware and software vulnerabilities to exploit ATMs to obtain large sums of cash.A Trend Micro andEuropol2017 Report[1] highlighted that the use of ATM malware has evolved significantly as the scope and scale of these attacks have grown. This latestdevelopment is attributable to several factors.

risk management

Boosting Your Security Posture with Security Analytics

With the rise of cyberincidents, organizations continue to search for effective tools and strategies to fight against cybercrimes and to build resilience in their environment. Based on the 2017 Trustwave Report[1], cyberincidents were spread across economic sectors and regions during the reporting year. Every single region was affected, with North America and the Asia-Pacific regions accounting for the bulk of reported cases (70%). The retail industry had the single largest share of cyberincidents (22%), followed by the food and beverage (20%), financeand insurance (14%), hospitality (12%). Technology, transport, entertainment, travel and other sectors accounted for the remaining 32%. These revealing statistics emphasize the continued urgent need for organizations to shore up the cybersecurity defenses while proactively engaging in offensive tactics.

risk management

The Real Benefits of Conducting Vulnerability Assessment and Penetration Testing (VAPT)

An organization, regardless of its size, purpose and location is susceptible to cybersecurity threats. This is so, once an organization has data and operates in a networked environment.

risk management

How to Minimize Risks with Open-source Solutions

Many organizations in various industries across the globe have invested in open-source solutions to reduce costs. These solutions are also attractive to commercial vendors since the use of open-source components reduces development costs and improve the time to market. These situations have resulted in approximately 3 in 4 organizations adopting open-source solutions.

risk management

Empowering End-users to Minimize Cyberattacks and Vulnerabilities

The end-users have been shown to be a significant source of vulnerabilities.All types and levels of users (the top-level executives, business partners and any person with access credentials to an organization’s network) are susceptible to costly errors that may result in data breach or financial crimes.Furthermore, these errors cause significant and persistent risks to the privacy and security of both the individual and the enterprise.

Subscription Center

Stay in the Know with Our Newsletter