Deleted No
Hibernated No
Last Checked Feb. 20, 2020

Created

Thu Jan 09 21:06:54 +0000 2020

Likes

0

Retweets

1

Source

Twitter Web App

View Raw Data

JSON Data

View on Twitter

Likely Available
Profile Image

Ben Popken @bpopken

"First, your cybersecurity practices including incidence response procedures. Two, any cyberattacks you've experienced. Three, personnel policies and procedures including whether background checks and other procedures are in place to safeguard against inside attacks." — PolitiTweet.org

Posted Jan. 9, 2020