<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=446209&amp;fmt=gif">

Michael Thweatt

Mike Thweatt, Sales Executive at WEI, helps our customers transform IT from a cost center to a new profit center by aligning solutions that will provide our customers with their desired business outcomes. Mike’s specialties include transforming technology features into quantifiable business value, strategic market planning, and cultivating collaborative relationships. Mike holds VMware, HPE, and Fortinet certifications.
Find me on :

Posts by Michael Thweatt

Recent Malware Attacks and What Businesses Can Learn From Them

By Michael Thweatt |   Jan 23, 2018

It feels like every time we turn around there is a new cybersecurity threat to report that organizations need to protect themselves from. Malware is an unfortunate reality of living in a digital world, but there are many lessons we can learn from these attacks to safeguard sensitive material.

How to stop the latest cyber security threat, “Petya”

By Michael Thweatt |   Jun 29, 2017

Remember the destruction WannaCry caused? The casualties included up to 300,000 encrypted computers in over 150 countries, not to mention the damage or loss of data entirely. The newest ransomware cyber-attack threat is far worse than WannaCry, and it's going by the name “Petya.”

VMware and Amazon Web Services: A New Hybrid Cloud Partnership

By Michael Thweatt |   Jun 06, 2017

Want to improve your cloud operations and take advantage of robust new technology options? Now you can, as you may have heard the news recently about the new partnership between VMware and Amazon Web Services (AWS), called VMware Cloud on AWS. Enterprise Strategy Group (ESG), an IT analysis, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community, recently published a technology brief announcing the new joint offering; read on for an overview of its structure and benefits.

Cybersecurity Takeaways from Recent Ransomware Attacks

By Michael Thweatt |   Jun 01, 2017

The news is buzzing with instances of companies being taken for a ride by cyber thieves. Their new tactic? Injecting dangerous software into the organization and locking their data up until a ransom is paid. While the FBI still recommends not paying the ransom, enterprises are taking varying approaches to combatting ransomware. In this post we dive into some recent ransomware attacks and takeaways your organization can learn from them.

Lessons Learned: High Profile Enterprise Security Breaches

By Michael Thweatt |   May 16, 2017

Nearly every day, there is a new cybersecurity breach to announce; businesses should be more alert than ever before. In 2015, the Ponemon Institute and Symantec discovered that a whopping 47 percent of U.S. data breaches were the result of a malicious insider or criminal cyberattack. Read on for an illuminating look into recent high-profile cases, and what you can learn from them.

New Malware Keeping IT Managers Up at Night

By Michael Thweatt |   May 09, 2017

With the wide range of reported cybersecurity incidents and hackers getting more creative than ever before, there is no shortage of threats to the modern enterprise. IT managers must not only secure current data and systems, but preemptively protect against ongoing future threats, which are constantly evolving. While there are well-known versions of malware, “Tellingly, WatchGuard’s inaugural Internet Security Report found that some 30 percent of malware in Q4 was new, or ‘zero day.’ (Not to be confused with zero-day exploits.) In other words, one-third of malware identified wouldn’t be caught by legacy antivirus solutions,” according to PYMNTS.

Fixing One of the Biggest Holes in Data Security

By Michael Thweatt |   Apr 27, 2017

Unsecured printing and imaging leads to security breaches, putting organizations at risk of costly lawsuits and public relations nightmares.

Today’s printers can connect to wireless networks, scan and send documents, store data on hard drives, and even produce 3D materials. They have many of the same capabilities—and the same vulnerabilities—as computers. As their features increase, so do the opportunities for security breaches in the printing process.

Enterprise Security and Advanced Persistent Threats (APTs)

By Michael Thweatt |   Apr 13, 2017

How good are your enterprise’s security defenses? Today’s hackers have access to an arsenal of tools for carrying out targeted attacks, thanks in part to an anonymous and hidden area of the internet called the Dark Web (also called Deep Web or Darknet). Payment for purchases made there is typically in the international digital currency Bitcoin, which offers a fairly high level of privacy.

Advice for Managing Common Cybersecurity Risks

By Michael Thweatt |   Mar 07, 2017

The job of an IT professional is challenging, especially since strengthening cybersecurity is constantly a moving target. With attackers trying new approaches and getting stronger with their tactics every day, protecting an enterprise’s data and information is more crucial than ever before. How can you ensure you’re covering all of your security bases? Start with managing the most common security risks, which are described in this article.

3 Tips for Preventing a Ransomware Attack

By Michael Thweatt |   Oct 04, 2016

Ransomware is a flourishing IT threat, and one that can cost organizations thousands of dollars in lost data, ransomware repayments and security breaches. According to Marcin Kleczynski, the CEO of cybersecurity company Malwarebytes, "In the last six to 12 months, [ransomware] has just gone so aggressively to the business environment. We see companies from 25 people all the way to 250,000 people getting hit with ransomware."

    About WEI

    WEI is an innovative, full service, customer-centric IT solutions provider. We're passionate about solving your technology challenges and we develop custom technology solutions that drive real business outcomes.

    Subscribe to WEI's Tech Exchange Blog


    Categories

    see all
    Contact Us