Twitter | Search | |
WrighTek Solutions
143
Tweets
95
Following
8
Followers
Tweets
WrighTek Solutions Aug 8
“Effective immediately, Defense Department personnel are prohibited from using geolocation features and functionality on government and nongovernment-issued devices, applications and…
Reply Retweet Like
WrighTek Solutions Aug 3
Cryptographic Experts Reveal Security Issues in Passport Virgil Security, Inc., a services provider, has published a report which raises concerns regarding the security of…
Reply Retweet Like
WrighTek Solutions Jul 29
Inside Michael Hoover’s home, Amy Murray, a loyal McDonald’s spokesperson, encouraged him to tell the camera about the luckiest moment of his life. Nervously clutching his massive check,…
Reply Retweet Like
WrighTek Solutions Jul 24
After a ransomware attack, entities must strive to "identify what happened in order to put technical controls in place to better protect the organization going forward,"…
Reply Retweet Like
WrighTek Solutions Jul 20
Generally these threats have the following consequences: Damage Corporate responsibility for exploitation Loss of profits Cost of data recovery Forensic or investigation…
Reply Retweet Like
WrighTek Solutions Jul 18
Todays's Read... Behavioral analytics have taken the fast lane from emerging tech to mature practice. The key element that has made behavioral analytics move so fast and become something…
Reply Retweet Like
WrighTek Solutions Jul 18
Just posted a photo
Reply Retweet Like
WrighTek Solutions Jul 17
It would be cool to speak with you all about partnerships. We're sure you have clients that need CyberSecurity and we have clients that need cloud services
Reply Retweet Like
WrighTek Solutions Jul 17
"The main concern is that since JavaScript usage in Excel is so new we do not know what controls Microsoft will put around it. They will need to make it more open and easier to use than…
Reply Retweet Like
WrighTek Solutions Jul 17
Cyber Insurance is for any business that does transactions with money and sensitive data (ie. Social Security Numbers, Address, Medical Records) using the internet. Why? In the event…
Reply Retweet Like
WrighTek Solutions Jul 16
To be effective, data protection requires not only time and effort on the part of employees; companies must do their share too. DATA PROTECTION TECHNOLOGIES Only 43% of…
Reply Retweet Like
WrighTek Solutions Jul 14
The truth is any business with a website or that accepts card payments is a target. Though the details are still coming to light, Macy’s revealed in a letter to customers…
Reply Retweet Like
WrighTek Solutions Jul 12
Not quite sure what your employees are doing to put your business at risk? Here are 10 of the some of the riskiest employee behaviors/practices that happen in every working…
Reply Retweet Like
WrighTek Solutions Jul 11
we offer training for your employees to minimize internal security risk. Want to know how? Contact us today for an initial assessment.
Reply Retweet Like
WrighTek Solutions Jul 10
Most Common Social Engineering Examples: Phishing is sending emails appearing to be from reputable sources with the goal of influencing or gaining personal information. The most common…
Reply Retweet Like
WrighTek Solutions Jul 10
Most Common Social Engineering Examples: Phishing is sending emails appearing to be from reputable sources with the goal of influencing or gaining personal information. The most common…
Reply Retweet Like
WrighTek Solutions Jul 9
1. Limit the use of unnecessary programs and control employee's online activity by filtering words when searched or blocking certain websites to be accessed on company PCs. 2. Use a…
Reply Retweet Like
WrighTek Solutions Jul 5
The IoT represents a valuable opportunity for businesses of all sizes and across different sectors. If your company offers IoT applications, products, and services contact for…
Reply Retweet Like
WrighTek Solutions Jul 4
Happy 4th to all of our followers. Safety first, eat lots, enjoy your loved ones, and have fun!
Reply Retweet Like
WrighTek Solutions Jul 3
Every enterprise will be affected by the Internet of Things (IoT), the growing phenomenon by which not only people, but also “things” — vehicles, commercial and industrial equipment,…
Reply Retweet Like