by David Mengert | Mar 13, 2021 | Password Manager, Security, Training
An alert pops up on your computer: It’s time to change your password again. Sigh. Fine. You’ll just change from password4! to password5! and— Not so fast. Regular password changes are meant to make sure that even if someone gets your login credentials, they won’t be...
by David Mengert | Feb 25, 2021 | Clouds, Important Email Excerpts, MSO 365, Privacy, Security, Technology
Reminder: Microsoft 365 apps and services ending support on IE11 after August 17, 2021 MC241353 · TEKMAR SOLUTIONS, INC. As communicated in MC220490 (August ’20), Microsoft 365 apps and services will be focusing their efforts on modern browser support over the coming...
by David Mengert | Feb 17, 2021 | Clouds, Data Backup and restore, Life Style, Security, UPS
Another storm is on the way. It’s troubling because, driving past parking lots they filled with cars, people are worried about supplies, which is understandable. The pandemic is not over and we should all be budgeting time to get everything we need to handle...
by David Mengert | Jan 7, 2021 | Clouds, Data Backup and restore, Privacy, Security, Training
To celebrate data Privacy Day Tekmar is offering a month of help desk support as a bonus add-on with 60 day subscription for our TSI Password manager. The Purpose of TSI Password Manager is simplifying password management for businesses and users. What is the purpose...
by David Mengert | Dec 7, 2020 | Clouds, Desktop Apps, IT Blueprint, Privacy, Security, Technology, Uncategorized
Making a deep dive into the process running on your systems is two heart beats and a click away Tekmar Managed IT Blueprint keeps a running audit for home and business computer users. Click the retrieve audit button in the system tray and we’ll send you an...
by David Mengert | Jun 12, 2020 | IT Blueprint, Privacy, Security, Uncategorized
Tekmar Managed Threat Protection services are a critical focus for Tekmar Solutions, Inc. Threat Protection for business and home computers is not simple. It is elusive for many users. Threat protection requires state of the art defenses and regular monitoring. ...
by David Mengert | May 1, 2020 | Life Style, Security, Technology
It does not sound right, yet wearing a facemask is a mindful use technology in today’s world. Using tech is a choice and if we do it for a purpose. It helps ourselves, our friends and community, and even people we don’t know. A cloth face mash is a...
by David Mengert | Mar 7, 2020 | Clouds, Data Backup and restore, IT Blueprint, Privacy, Security
Managed Backup Solution The most important part of a backup solution is restoring. If you cannot restore a backup archive, it is worthless. The vital step is checking the integrity of the archive regularly. The managed part of Tekmar’s Backup Solution is...
by David Mengert | Sep 25, 2019 | Privacy, Security, Technology
IT and Data Security for your Business Did you know that the number of cyberattacks on business has been on the rise for several years in a row? Every business is vulnerable, even large organizations like Target, Capital One, and the cities of Baltimore and...
by David Mengert | Aug 1, 2019 | IT Blueprint, Life Style, Privacy, Security, Technology
NC not among nine states that have recently passed stricter data privacy and notification laws. Data security has been in the news, with several high profile breaches affecting the private data of millions of people. Without tighter data privacy and notification...
by David Mengert | Jun 6, 2019 | Clouds, Desktop Apps, Email Management, IOT, IT Blueprint, Privacy, Security, Uncategorized
New RCE Vulnerability Last month I wrote about the importance of keep our systems updated against a similar vulnerability in Windows remote desktop protocal. This vulnerabilty has fewer potential systems, but every system is affected by the flow of email. According to...
by David Mengert | May 18, 2019 | Uncategorized
Patch Tuesday RCE vulnerabites allow external parties to run code locally on your system. Microsoft released updates for this Tuesday, May 14th 2019 that include patches for products past their (Microsoft’s end of life). It Must be important. The first line of...
by David Mengert | May 6, 2019 | Uncategorized
Delve into Office 365’s new profile center. The profile is an ignored part of the office 365 suite, and it has been updated to use Delve which is another often ignored app. Now, Starting May 1 they are united. Recommending that our clients put their...
by David Mengert | Mar 4, 2019 | Anthropology, Life Style, Technology
Approach Bike lanes are tech friendly Bike lanes don’t sound as tech friendly as they are. They are needed to keep and extend Greensboro’s tech friendly infrastructure. Bike lanes make people happier technology users. Bikes are some of the friendliest technology of...
by David Mengert | Aug 18, 2018 | Clouds, Desktop Apps, IT Blueprint, MSO 365, Privacy, Security, Technology, Training
How to move your email safely securely for free, to a new provider. This article explains how to move your your email to a new host (provider). We begin by describing the situation and then discuss the four steps to migration. Lastly, we conclude by summarizing the...
by David Mengert | Jun 19, 2018 | Clouds, Desktop Apps, IT Blueprint, Technology, Training
Watch IT Assess IT Update IT Secure IT Is the model Tekmar Solution, Inc. uses as managed service provider. The four step process helps blending the best technologies for users, customers and the entire global computing environment. Our models stay steady for the...
by David Mengert | Apr 25, 2017 | Security, Technology, Training, Web presence
Technology and a golden ticket at Black Mountain Chocolate Factory For Easter, I used technology and a golden ticket to have a great time with my youngest daughter. The golden ticket came from the Black Mountain Chocolate Factory in downtown Winston Salem. It’s only...
by David Mengert | Apr 19, 2017 | Clouds, Privacy, Security, Technology, Training, Web presence
Ads are exploit gateways. Most ads convey a product promotion or endorse someone or something. Frequently the browser based kind are used as data collectors used to invade ones privacy. The worst kind of ads called malvertising are not legitimate ads but a con to get...
by David Mengert | Apr 17, 2017 | Uncategorized
Arriving at the office a little later than usual, I was surprised that the were so few cars. The reason is of course one of our neighbor companies close Easter Monday 2017. This post discusses our celebrating our holiday’s differently sometimes. Date Day Holiday...
by David Mengert | Apr 16, 2017 | Clouds, Privacy, Security, Training
Managing critical systems Managing critical sytsems is a huge concern for big business and governments. Despite the media frenzy over the NSA data release about potential Microsoft exploits, this data is widely known among hackers and IT professionals. Many owners and...