CTComp (@ct_comp) 's Twitter Profile
CTComp

@ct_comp

Your Technology Partner

ID: 1150813654482161664

calendar_today15-07-2019 17:05:31

583 Tweet

10 Followers

2 Following

CTComp (@ct_comp) 's Twitter Profile Photo

Windows Server 2012 and Windows Server 2012/R2 will soon be reaching the end of their support lifecycles. We can help you implement the right option for your business. #WindowsServer #cloudmigration #Azure #Microsoft dmc.partner.microsoft.com/links/a48e05a0…

CTComp (@ct_comp) 's Twitter Profile Photo

Windows Server 2012/R2 will reach end of support on October 10, 2023. It’s time to upgrade to Azure. #cloud #digital #PaaS dmc.partner.microsoft.com/links/0e2ebb15…

CTComp (@ct_comp) 's Twitter Profile Photo

Last month, 15,349,203 healthcare records were reported as exposed or impermissibly disclosed (The HIPAA Journal). Bad actors are preying on healthcare organizations primarily through network servers and email accounts. How secure is your infrastructure? ow.ly/GxZr50N7oKV

Last month, 15,349,203 healthcare records were reported as exposed or impermissibly disclosed (The <a href="/HIPAAJournal/">HIPAA Journal</a>).

Bad actors are preying on healthcare organizations primarily through network servers and email accounts.

How secure is your infrastructure? ow.ly/GxZr50N7oKV
CTComp (@ct_comp) 's Twitter Profile Photo

For this small energy company, modernizing its data estate with cloud has built a solid foundation for a future filled with innovation – for them and their customers. #Microsoft #cloud #Azure dmc.partner.microsoft.com/links/0de947b7…

CTComp (@ct_comp) 's Twitter Profile Photo

For this small energy company, modernizing its data estate with cloud has built a solid foundation for a future filled with innovation – for them and their customers. #Microsoft #cloud #Azure dmc.partner.microsoft.com/links/6d24cfad…

CTComp (@ct_comp) 's Twitter Profile Photo

Your org can protect itself by embracing a Zero Trust security model. Zero Trust operates on several distinct principles: ✔️ Explicit verification ✔️ Least-privilege access ✔️ Breach assumption Learn more about the evolution of #ZeroTrust: ow.ly/t0oo50S9Q3A.

Your org can protect itself by embracing a Zero Trust security model. Zero Trust operates on several distinct principles:

✔️ Explicit verification

✔️ Least-privilege access

✔️ Breach assumption

Learn more about the evolution of #ZeroTrust: ow.ly/t0oo50S9Q3A.
CTComp (@ct_comp) 's Twitter Profile Photo

Something to celebrate 🎣 Last month, CTComp's Senior Account Executive, Dean Rustic, participated in the 12th annual Sports Association’s Disabled Veterans Fishing Tournament in Danbury. To learn more, watch Jim Altman’s segment on Fox 61: ow.ly/buTZ50ShhNq.

Something to celebrate 🎣 

Last month, CTComp's Senior Account Executive, Dean Rustic, participated in the 12th annual Sports Association’s Disabled Veterans Fishing Tournament in Danbury. 

To learn more, watch Jim Altman’s segment on Fox 61: ow.ly/buTZ50ShhNq.
CTComp (@ct_comp) 's Twitter Profile Photo

Microsoft: a new Wi-Fi vulnerability in Windows allows hackers to gain remote code execution. This vulnerability threatens "hotels, trade shows, or anywhere else numerous devices connect to WiFi networks.” What should you do? Patch—stat. Learn more: ow.ly/Fa6850SlQ5K.

Microsoft: a new Wi-Fi vulnerability in Windows allows hackers to gain remote code execution.

This vulnerability threatens "hotels, trade shows, or anywhere else numerous devices connect to WiFi networks.” 

What should you do? Patch—stat. 

Learn more: ow.ly/Fa6850SlQ5K.
CTComp (@ct_comp) 's Twitter Profile Photo

Q3 is next week. The end of a quarter is the perfect time to check back in with your Technology Roadmap. Have you been following your strategic plan? Take five minutes and review your checklist. Can’t find your copy? Here’s an extra for you: ow.ly/67Js50Sq5zG.

Q3 is next week.

The end of a quarter is the perfect time to check back in with your Technology Roadmap. Have you been following your strategic plan? Take five minutes and review your checklist.

Can’t find your copy? Here’s an extra for you: ow.ly/67Js50Sq5zG.
CTComp (@ct_comp) 's Twitter Profile Photo

As SMBs embrace new technology like AI and cloud computing, they often overlook the security ramifications of digital transformation. Vonahi Security outlines their top cyber security best practices for SMBs. Learn more—read the white paper now: ow.ly/yLQ650SuB68.

As SMBs embrace new technology like AI and cloud computing, they often overlook the security ramifications of digital transformation. <a href="/vonahisec/">Vonahi Security</a> outlines their top cyber security best practices for SMBs. Learn more—read the white paper now: ow.ly/yLQ650SuB68.
CTComp (@ct_comp) 's Twitter Profile Photo

Last week, 9,948,575,739 passwords were uploaded to the dark web. According to Cybernews, passwords exposed in the leak have already been used in “credential stuffing attacks.” If you reuse passwords, change them—stat. ow.ly/GxyS50SyLsf

Last week, 9,948,575,739 passwords were uploaded to the dark web.

According to Cybernews, passwords exposed in the leak have already been used in “credential stuffing attacks.”

If you reuse passwords, change them—stat. ow.ly/GxyS50SyLsf
CTComp (@ct_comp) 's Twitter Profile Photo

In 2023, 84% of critical infrastructure incidents could have been prevented if best security practices were used. Stay safe—it’s time to thoughtfully design and deploy tech services that keep your organization ahead of the curve (and hackers): ow.ly/bfQU50SEyvF.

In 2023, 84% of critical infrastructure incidents could have been prevented if best security practices were used.

Stay safe—it’s time to thoughtfully design and deploy tech services that keep your organization ahead of the curve (and hackers): ow.ly/bfQU50SEyvF.
CTComp (@ct_comp) 's Twitter Profile Photo

According to CSO and the IDC, the 2024 Paris Olympics “will see the largest number of threats, the most complex threat landscape, the largest ecosystem of threat actors, and the highest degree of ease for threat actors to execute attacks.” Learn more: ow.ly/sgyN50SOyFa.

According to CSO and the IDC, the 2024 Paris Olympics “will see the largest number of threats, the most complex threat landscape, the largest ecosystem of threat actors, and the highest degree of ease for threat actors to execute attacks.”

Learn more: ow.ly/sgyN50SOyFa.
CTComp (@ct_comp) 's Twitter Profile Photo

108 K-12 school systems nationwide were targeted by hackers in 2023 (NPR). Attacks included ransomware, DoS, phishing, and more. Schools often have older computer systems, rely heavily on tech, and don't necessarily have cyber security experts on staff: ow.ly/1RKS50STbrP.

108 K-12 school systems nationwide were targeted by hackers in 2023 (<a href="/NPR/">NPR</a>).

Attacks included ransomware, DoS, phishing, and more. Schools often have older computer systems, rely heavily on tech, and don't necessarily have cyber security experts on staff: ow.ly/1RKS50STbrP.
CTComp (@ct_comp) 's Twitter Profile Photo

In 2023, Vonahi completed over 10,000 network pentests. Vonahi Security tested over 1,200 orgs and found the "Top 10 Critical Internal Network Pentest Findings.” Learn about which were successfully exploited by automated pentesting and the security impact: ow.ly/Sw4W50SXIKJ.

In 2023, Vonahi completed over 10,000 network pentests. 

<a href="/vonahisec/">Vonahi Security</a> tested over 1,200 orgs and found the "Top 10 Critical Internal Network Pentest Findings.”

Learn about which were successfully exploited by automated pentesting and the security impact: ow.ly/Sw4W50SXIKJ.
CTComp (@ct_comp) 's Twitter Profile Photo

Last month, @sbagov released guidelines detailing how SMBs can strengthen their cybersecurity and prevent attacks. The bottom line? It's time to secure your IT infrastructure. Let’s talk about comprehensive #SOC protection: ow.ly/zWjp50JORhu. #SecurityOperationsCenter

Last month, @sbagov released guidelines detailing how SMBs can strengthen their cybersecurity and prevent attacks. The bottom line? It's time to secure your IT infrastructure. Let’s talk about comprehensive #SOC protection: ow.ly/zWjp50JORhu. #SecurityOperationsCenter
CTComp (@ct_comp) 's Twitter Profile Photo

66% of IT leaders believe their current data growth is outpacing their ability to secure it and manage the risk (Rubrik). To get ahead of hackers, “you need to secure data to enable IT operations to do more with data.” Get 24/7/365 protection: ow.ly/zWjp50JORhu. #SOC

66% of IT leaders believe their current data growth is outpacing their ability to secure it and manage the risk (Rubrik).

To get ahead of hackers, “you need to secure data to enable IT operations to do more with data.”

Get 24/7/365 protection: ow.ly/zWjp50JORhu. #SOC
CTComp (@ct_comp) 's Twitter Profile Photo

For many orgs, September means budget planning. Don’t forget to review your “5 Year Technology Roadmap Checklist.” If you don't have a copy of our #TechnologyRoadmap, you can download it here: ow.ly/WQjE50TfE9Q. #InfoSecPlanning #BudgetingForSecurity #CyberSecurityBudget

For many orgs, September means budget planning.

Don’t forget to review your “5 Year Technology Roadmap Checklist.”

If you don't have a copy of our #TechnologyRoadmap, you can download it here: ow.ly/WQjE50TfE9Q. #InfoSecPlanning #BudgetingForSecurity #CyberSecurityBudget
CTComp (@ct_comp) 's Twitter Profile Photo

From 2022 to 2023, there was a 71% increase in the volume of cyberattacks where bad actors used stolen credentials (#IBM). Protect your employees and your business by investing in security fundamentals: ow.ly/Mpqw50TlsfT. #SecurityPosture #Cybersecurity

From 2022 to 2023, there was a 71% increase in the volume of cyberattacks where bad actors used stolen credentials (#IBM).

Protect your employees and your business by investing in security fundamentals: ow.ly/Mpqw50TlsfT. #SecurityPosture #Cybersecurity
CTComp (@ct_comp) 's Twitter Profile Photo

“Cyber risk is a business risk.” @fortinet details the need for treating cybersecurity as an “enterprise risk-management imperative” not a “mere technology issue.” Set the “tone from the top” with your budget planning and technology roadmap: ow.ly/WQjE50TfE9Q.

“Cyber risk is a business risk.”

@fortinet details the need for treating cybersecurity as an “enterprise risk-management imperative” not a “mere technology issue.”

Set the “tone from the top” with your budget planning and technology roadmap: ow.ly/WQjE50TfE9Q.