5955 W Peoria Ave

Unit 6538, Glendale, AZ 85312

+1 623-930-1533

Customer Support

Mon-Fri: 8:00a - 5:00p

Other times, by appointment

Wright Consulting: Tech Wisdom & Updates

Our team shares expert advice, how-tos, and the occasional rant about all things IT. Scroll down to discover something new, or just laugh at our tech jokes. (We try.)

Looking for something specific? Use the search box below or contact us with your questions or content suggestions!

Digital combination lock with the word PASSWORD displayed among rotating number dials.
MrWrightAZ

What’s In A Password

What’s In A Password Passwords, in one form or another, have been around since biblical times. In ancient times, the Roman Army referred to them as Watchwords. Centuries later, Fernando Corbató, a professor at MIT, is credited with developing the first password system for the Compatible Time-Sharing System (CTSS), which allowed multiple users to access the same computer system. Since then, passwords have undergone a metamorphosis, if you will, from being a simple 4 digit number to a process that can be extremely complex and lengthy. Naturally, whenever a new security system is introduced and implemented, it becomes the goal of the deplorables to thwart it. As you can imagine, hacking was born, and it, too, has undergone an evolution, as well. From its humble beginnings, passwords like “1234” and “password”, the two most common passwords ever used, are easily overcome by today’s standards. Fast forward to our modern security

Read More »
Two people in hoodies sitting in front of a computer screen, representing hackers in a dark room.
MrWrightAZ

Don’t Accept A Friend Request From Me…I’ve Been Hacked

Don’t Accept A Friend Request From Me…I’ve Been Hacked I hear it all the time, “Don’t Accept A Friend Request From Me…I’ve Been Hacked!” In reality, they weren’t hacked; they were impersonated. Let’s be clear, if someone had actually hacked your Facebook account (or any account for that matter) they would instantly have access to everything you have access to—including your friends list…either way, it sucks! Here’s a quick distinction between the two: Hacked: someone breaks into your account and changes your password. Impersonated: someone creates a fake profile using your name and photo.   So what can you do as the “victim”? Have I Been Hacked? Whether you’ve been hacked, or impersonated, it’s too late to worry about what you can, or can’t do. You need to focus on getting control back of your account as quickly as possible. In some cases, you may lose access to old messages

Read More »
meme: the most used internet browser to download other browsers
MrWrightAZ

No Thanks, I’m Just Browsing

Browser Wars: No Thanks, I’m Just Browsing Browsers are the gateway to the internet, and nothing proves that more than the epic browser wars that shaped how we surf today. Without them, we would be back to the infancy of the internet and bulletin board chat screens. Perish the thought! Browser Wars Now we enter the Browser Wars. In the early days, we had Netscape, AOL, Prodigy, CompuServ, and, yes, Internet Explorer. At one point Netscape dominated the market with a whopping 86% share while Microsoft maintained a measly 10%. So, where is Netscape now? Great question. Sadly, it suffered the same fate as Novell Netware and WordPerfect at the hands of Microsoft’s sleazy tactics of bait and switch and dark marketing. The standard for Microsoft is simple: if they can’t compete with it, they buy it, and if they can’t buy it, they destroy it. All in favor of

Read More »
cyber security
MrWrightAZ

Firewalls and Websites

Firewalls & Websites You did it! You bought your first domain—some-domain.com. Maybe you’re selling widgets, opening a Shopify or Etsy store, or just staking your claim on the internet. Congrats! (Cue confetti cannons.)” Owning and managing your new website on the World Wide Web is fantastic, and can be very profitable. It also comes with some inherent risks. Much like entering the ocean for the first time, you actually stand a chance of coming face to face with a great white shark, Jaws, if you will. Although, unlikely, the risk is there. The same goes for your new website. Within 24 hours, the sharks—er, hackers—will sniff out your fresh site, like blood in digital water. Honestly, I don’t even know how they know. I’m thinking that similar to blood in the water that attracts sharks, these nefarious actors seem to be magically drawn to new sites. Why, you may ask.

Read More »
welcome
MrWrightAZ

Welcome To Our New Website & Blog

Welcome To Our New Website & Blog We’re excited to welcome you to the official blog of Wright Consulting, LLC. As a trusted technology partner for businesses of all sizes, we are passionate about helping organizations navigate the ever-changing digital landscape. Whether you’re a small startup or an established enterprise, our mission is to empower you with practical IT solutions, strategic guidance, and ongoing support that moves your business forward. At Wright Consulting, LLC, we believe technology should simplify your operations—not complicate them. Our experienced team specializes in everything from network security and cloud solutions to web development and technology consulting. We take the time to understand your unique needs, offering customized strategies that are both effective and easy to implement. Our commitment to transparency, integrity, and clear communication ensures that our clients always know they’re in good hands. Through this blog, we’ll be sharing insights, tips, and the latest

Read More »

Have a topic idea?