<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=446209&amp;fmt=gif">

Concerned about Password Security? Amp up data security.

By Michael Thweatt |   May 05, 2016

At least once a year, you can find a report on the web about what the most common passwords are based upon leaked data. Think of these lists as the worst passwords you can ever use. Typically, 123456 and password top the list. Coming up the path of popularity are passwords 123456 and 123456789, as people are required to enter in longer passwords. Need a mix of letters and numbers? You might want to avoid abc123 and trustno1, among many others. Nowadays, a password security alone isn’t sufficient to lock anything down. How best can you secure your system to keep the bad guys out?

WEI Helps CVS Health and Target Pharmacy with Custom IT Solution

By Greg LaBrie |   Apr 26, 2016

At WEI, we pride ourselves on fostering strong client partnerships and truly believe that their success is our success. Our company was recently featured in an article by CVS Health, a longtime partner of WEI, for our assistance with the CVS Health and Target integration. We began working with CVS Health more than five years ago, when we were hired to replace keyboards and memory DIMMS in all of their 7,000 pharmacies.

WEI Named to the 2016 CRN Tech Elite 250 List

By Greg LaBrie |   Apr 07, 2016

We love sharing our recent wins with our clients, customers and friends, and are excited to announce that WEI has recently been named to the 2016 Tech Elite 250 list by CRN, a brand of The Channel Company. A prestigious award, this annual list honors an exclusive group of North American IT solution providers that have earned the highest number of advanced technical certifications from leading technology vendors.

The Importance of Data Encryption

By Greg LaBrie |   Mar 22, 2016

Is your business utilizing data encryption in your security strategy? The process of changing information to make it unreadable to those except authorized users can help your company securely protect data and safeguard it from potential threats. [click to tweet] Businesses use data encryption to protect personal information, customer data, trade secrets, employee files, tax information, credit card numbers and more. This benefits the network is breached. Read on to learn about the benefits of data encryption.

Key Elements of an ITaaS Strategy

By David Fafel |   Mar 10, 2016

Maxwell Health CEO, Veer Gidwaney wrote that as-a-service trends were poised to change the world. Even in 2014, as-a-service models were sweeping industries from software to healthcare. Giants such as Amazon and Netflix are now fully cemented in the entertainment space based on their aaS models; from business to personal life, such trends are creating evolution in the way people work and live. Companies can capitalize on aaS models by implementing IT as a service, or ITaaS.

3 Information Security Trends Every Company Should Know

By Greg LaBrie |   Mar 08, 2016

The technology industry is rapidly evolving, changing and growing; it’s important to stay up to date on current trends, and even brush up on skills well in advance of needing them, so you are prepared when emerging and disruptive technologies sweep the industry. Read on for three information security trends to be aware of in 2016 so your company can best prepare against potential hackers and cyber criminals.

Benefits of the ITaaS Model

By David Fafel |   Mar 03, 2016

As IT organizations are recognizing the increased efficiency, agility, and scalability of virtualized mission-critical applications, the next critical phase is to develop an IT-as-a-Service (ITaaS) program as a method of staying ahead of a constantly evolving IT and business environment. What is distinctive about the ITaaS model is that it allows an organization’s IT department to function as a separate business entity, operating as a value-based service team that delivers precisely the resources needed, when needed. [click to tweet] This model is geared towards the unique demands and requirements of internal and external customers.

Bonus White Paper!

Do Your Security Solutions Work as a Team?

By Greg LaBrie |   Feb 11, 2016

Every organizational leader knows the value of teamwork. When the various parts of your team work together, they can get more done with less, meet seemingly impossible goals, and stand up to enormous obstacles. What you might not realize as an IT leader is that your security solutions can deliver the same results if they also work as a team. While you don’t have to coach programs and hardware as you would a human team, you do have to choose solutions wisely and integrate them in a way that maximizes efficiency and effectiveness.

CEO Belisario Rosas Featured on One Million by One Million Blog

By Greg LaBrie |   Jan 19, 2016

We enjoy sharing about our recent media coverage with our clients and customers in addition to stories of our company’s history and business growth. Sramana Mitra from the One Million by One Million blog recently profiled our President and CEO Belisario Rosas about his journey to transform WEI into the company it is today. Many of the most talked-about sagas of technology entrepreneurs detail Asian or European innovators; Belisario is Latin American (from Lima, Peru), and Sramana Mitra recently shared his unique story in a 5-part interview series on the blog.

Data protection: The gap between accessibility and security

By Michael Thweatt |   Jan 07, 2016

An enormous challenge for technical and security departments within any organization is creating secure networks, apps, and servers without making access so difficult that legitimate production is impacted. This is true whether you are working with in-house employee-based systems or customer-facing solutions such as web portals or online account management. The consequences for not securing information are huge, ranging from federal or state sanctions to loss of customers or customer trust. At the same time, results of the wrong type of security or unnecessary security might include loss of productivity, inability to make deadlines or complete work, poor employee morale, and loss of revenues. Data protection is key, but how can you ensure you have the right solutions in place?

About WEI

WEI is an innovative, full service, customer-centric IT solutions provider. We're passionate about solving your technology challenges and we develop custom technology solutions that drive real business outcomes.

Subscribe to WEI's Tech Exchange Blog


Categories

see all
Contact Us