Does Your Security Team Rely Too Much on Common Vulnerability Scoring System (CVSS)?

Does Your Security Team Rely Too Much on Common Vulnerability Scoring System (CVSS)?

We recently shared an experience from a network segmentation project during which we discovered a technical vulnerability affecting Cisco’s Firepower Threat Defense firewall line. The firewall, itself, was not the problem, but, under specific conditions that are not uncommon in many environments, it allowed access through the firewall to systems it was meant to protect.…

Read More
How do Credit Unions Stay Relevant in the Age of Big Bank Mega-Tech Investments?

How do Credit Unions Stay Relevant in the Age of Big Bank Mega-Tech Investments?

Despite any lingering recession-era skepticism of big banks and their motivations, we are now seeing a significant shift in their favor – even among customers who were affected by the last downturn. The ten largest U.S. retail banks now manage 48% of total consumer deposits, up from 39% in 2009. This uptick is largely a result of their investments in digital technology.…

Read More
Are Utilities Moving to the Cloud? Don’t Wait for Regulators to Make the First Move

Are Utilities Moving to the Cloud? Don’t Wait for Regulators to Make the First Move

As part of our cloud advisory engagements, we work with clients to determine their strategic visions and goals for adopting cloud technologies. Cloud adoption in most industries is well underway but the landscape within energy and utilities is a bit different. This is primarily driven by two factors: Utilities’ unique IT organizations, matched with their technical and operational...

Read More
Why Operational Technology may be your Cybersecurity Achilles’ Heel

Why Operational Technology may be your Cybersecurity Achilles’ Heel

Everyone in business is familiar with information technology (IT) and understands what it means, but what about operational technology, often abbreviated “OT”? At first glance, IT and OT appear similar because they share similar technologies like IP networks and Windows operating systems – but they have very different objectives. While IT systems generally support office workers and...

Read More
Utility Analytics: How A (Good) Data Framework Today Leads To Analytical Insights Tomorrow

Utility Analytics: How A (Good) Data Framework Today Leads To Analytical Insights Tomorrow

As we engage utilities on their progress and insights deploying data analytics platforms and use cases, we’re noticing a common theme. When embarking on more complex operational technology (OT) use cases, they are finding gaps in historical records that require them to revisit or rethink their data acquisition, storage, and retrieval strategies.…

Read More
3 Ways Enterprises Are Addressing Blockchain Privacy Concerns

3 Ways Enterprises Are Addressing Blockchain Privacy Concerns

Blockchain has been touted as the great connector to integrate businesses under consortium networks. It’s ability to verify data using smart contracts and provide transparency across network participants through immutable shared data has people talking about a technical revolution. However, this benefit has been a double-edged sword because the enterprise world is skeptical about sharing...

Read More
Capital One Fallout: Should Business Leaders Expect More Security From Their Cloud Providers? Yes.

Capital One Fallout: Should Business Leaders Expect More Security From Their Cloud Providers? Yes.

This week brought another set of headlines about a large data breach—this time at Capital One. In this case, the alleged attacker is domestic and the federal indictment provided some details of how the breach occurred. In this case, a misconfigured firewall allegedly allowed Paige Thompson to remotely execute commands against an Amazon Web Services (AWS) server.…

Read More
How to Develop Adaptability Among Employees to Meet the Growing Needs of Your Organization

How to Develop Adaptability Among Employees to Meet the Growing Needs of Your Organization

One challenge a growing organization faces involves sustaining a team of skilled professionals that can meet the growing expectations and needs of the business. Even more difficult is the task of filling less-desirable roles, such as shifted positions, where employees endure difficult hours and see less room for opportunity. One way to address these challenges involves adding more value to the...

Read More
7 Steps to Changing Your Organization’s Cybersecurity Culture—For Good

7 Steps to Changing Your Organization’s Cybersecurity Culture—For Good

Despite the escalated rate and severity of cyberattacks, leaders at most companies have not changed their approach to cybersecurity in the past few years to adapt to the increasingly challenging environment. The goalposts have changed. And the question leaders should ask themselves is not, “is my data secure?” but “how prepared are we to minimize operational downtime in the likely event of a...

Read More
Improve Workforce Productivity with Microsoft’s Power Platform

Improve Workforce Productivity with Microsoft’s Power Platform

SharePoint has always been a great tool for quickly solving business problems. Microsoft’s “Power Platform” is a potent solution that can enable business processes at a speed that’s hard to match and without hard-to-mitigate limitations. It’s a set of tools built on top of Office 365 that enables rapid creation of apps, data visualization and process automation...

Read More
How to Rethink your Cybersecurity Strategy in 5 Minutes

How to Rethink your Cybersecurity Strategy in 5 Minutes

Malware attacks are wreaking havoc on the international economy and costing businesses billions of dollars in lost revenue, operational shutdowns, and reputational damage. It’s likely that you may have even experienced an episode like this at your firm. The latest industry research indicates that 50% of surveyed executives experienced disruptions from malware 6-10 times over the past five...

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons