WCG Blogs

Discover innovative stories from our leading bloggers, our people, our capabilities, our research, and the ever-changing face of our firm.

Browse by



Cyber Scammers, Are You Their Next Target?

We have all encountered instances of cyber-scams, such as spam emails and viruses that attack private and commercial computer networks daily.Oftentimes, software is installed in hopes to safeguard systems -however, this does not always work. The security of information systems extends beyond firewalls, detection systems and other protective software – it involves the people operating those systems.

risk management

Is Your Web Application Secure?

It is imperative that organizations and government entities are knowledgeable in securing web applications. Mis-configurations and lack of security controls can lead to information leakage, cross-site scripting, and many more vulnerabilities.


Compliance Consulting Saves Businesses

Many firms that suffer from cyber-breaches not only struggle financially, but their credibility within their industry may also be jeopardized. This can lead to customers losing trust in the company, resulting in loss of potential sales and a struggle to regain customer trust. For these reasons, compliance with federal, industry, and/or cyber regulations is mandatory for businesses and organizations to save themselves from devastating consequences of becoming non-compliant.


Cyber Security and the Job Market

With the increase in threats and incidences of cyber-attacks,there is a more apparent need for stronger cyber security governance and infrastructure.This increased demand for cyber security services has also resulted in new job opportunities for experts in the field. According to a report conducted by Cisco, 2016 is expected to witness the creation of one million cyber security jobs globally, with an expected increase to 6 million by the year 2019[1].


Cyber Security and the 2016 Elections

With election season fast approaching, the most nerve wracking decision for many individuals in the political sphere, aside from picking a candidate, is ensuring that the electoral cycle runs smoothly and securely. Guaranteeing a free and fair election is top priority, and in order to do so, it is necessary to ensure the security of voting systems and polls.


Demystifying Cyber Intelligence

As cyber security takes its place as the industry to watch for the foreseeable future, discussion surrounding this sector has become a minefield of buzz words and infographics. One of its most talked about—yet least understood—concepts is.


Cybersecurity: Facts vs Fiction

Cybersecurity is without a doubt one of the hottest topics within the world today. It represents both an exciting new frontier and ominous new threat for companies and government entities across all industries, and is growing more and more important by the day. Unfortunately, as is often the case with new technologies and responsibilities, misinformation about cybersecurity runs rampant.Unfamiliarity with the nature of cyberthreats, lack of knowledge of its tools and best practices, and confusion about where management fits in terms of creating a solid infrastructure are all common pitfalls when seeking to create a solid security posture. Here are some common misconceptions and how you can help your company avoid the pitfalls of misinformation in the new age of cybersecurity.

risk management

The Need for Ongoing Security Awareness Training

Humans are often regarded as the weakest link in a security breach. According to a study from CompTIA conducted in 2015, which surveyed people from several organizations in the United States, human error represents 52 percent of the cause of security breaches.[1] Businesses spend large amounts of money annually on security solutions but fail to properly address the human element of information security. Human error, whether accidental or malicious, can cause serious security risks or breaches.


2015 Top Cyber Breaches: Are You Next?

169 million records were compromised in the 781 recorded incidents in 2015.[1] That is more than the population of California, Texas, Florida, New York, Illinois, Pennsylvania, Ohio, Georgia and North Carolina combined. Numerous companies in a variety of industries were victimized. While the medical and healthcare industry accounted for a staggering two-thirds of all compromises, businesses such as small and large corporations and law firms, suffered the most breaches. So, what exactly happened in 2015? Here is the breakdown of just a few major breaches:

cloud computing

Cloud Computing 101

Visionary Steve Jobs once spoke of a dream in which data could be uploaded and accessed anywhere. Before there was the cloud, there were floppy disks, CD ROMs and very large immobile hardware. Fast forward to 2015 – now we are able to access and store information without physical limitations.

Subscription Center

Stay in the Know with Our Newsletter