by Dan | Jul 6, 2021 | Clouds, Data Backup and restore, IT Blueprint, Password Manager, Security, Technology, Training
Businesses, organizations, and individuals need to have an anti-phishing strategy. Just this simple step is minimizing the risk of successful phishing attacks. Staying safe from phishing attacks is a practice. Putting this handbook into your policies and procedures...
by David Mengert | May 12, 2021 | Clouds, IT Blueprint, Privacy, Security, Technology
One Clue to dark side’s origins is that the problems are deeper and not as dark as some make out. Dark makes it sound like there is not enough light obscuring what’s going on in attacks like the one on Colonial Pipelines. There is more than knowledge...
by David Mengert | Dec 7, 2020 | Clouds, Desktop Apps, IT Blueprint, Privacy, Security, Technology, Uncategorized
Making a deep dive into the process running on your systems is two heart beats and a click away Tekmar Managed IT Blueprint keeps a running audit for home and business computer users. Click the retrieve audit button in the system tray and we’ll send you an...
by David Mengert | Jun 12, 2020 | IT Blueprint, Privacy, Security, Uncategorized
Tekmar Managed Threat Protection services are a critical focus for Tekmar Solutions, Inc. Threat Protection for business and home computers is not simple. It is elusive for many users. Threat protection requires state of the art defenses and regular monitoring. ...
by David Mengert | Mar 7, 2020 | Clouds, Data Backup and restore, IT Blueprint, Privacy, Security
Managed Backup Solution The most important part of a backup solution is restoring. If you cannot restore a backup archive, it is worthless. The vital step is checking the integrity of the archive regularly. The managed part of Tekmar’s Backup Solution is...
by David Mengert | Aug 1, 2019 | IT Blueprint, Life Style, Privacy, Security, Technology
NC not among nine states that have recently passed stricter data privacy and notification laws. Data security has been in the news, with several high profile breaches affecting the private data of millions of people. Without tighter data privacy and notification...
by David Mengert | Jun 19, 2019 | Clouds, IT Blueprint
Tech support for seniors computing peace of mind During the Covid19 pandemic, tech use by seniors has skyrocketed. Tekmar’s tech support for senior citizens program makes it easy for these users get help when they need it. Studies show (see below) that seniors are...
by David Mengert | Jun 6, 2019 | Clouds, Desktop Apps, Email Management, IOT, IT Blueprint, Privacy, Security, Uncategorized
New RCE Vulnerability Last month I wrote about the importance of keep our systems updated against a similar vulnerability in Windows remote desktop protocal. This vulnerabilty has fewer potential systems, but every system is affected by the flow of email. According to...
by David Mengert | Apr 28, 2019 | IT Blueprint, Security, Technology
Remote Support Name Email Address Enter best contact number Enter problem description. 8 + 15 = Start session After submitting your request we will contact you. Please wait for us to call or send you a code, then enter it below. Enter your six-digit code, then click...
by David Mengert | Aug 18, 2018 | Clouds, Desktop Apps, IT Blueprint, MSO 365, Privacy, Security, Technology, Training
How to move your email safely securely for free, to a new provider. This article explains how to move your your email to a new host (provider). We begin by describing the situation and then discuss the four steps to migration. Lastly, we conclude by summarizing the...
by David Mengert | Jun 19, 2018 | Clouds, Desktop Apps, IT Blueprint, Technology, Training
Watch IT Assess IT Update IT Secure IT Is the model Tekmar Solution, Inc. uses as managed service provider. The four step process helps blending the best technologies for users, customers and the entire global computing environment. Our models stay steady for the...
by Dan | Dec 29, 2016 | Clouds, Desktop Apps, IT Blueprint, Security, Technology, Training
This post details why training people to watch for danger signs is a great start and important to information security. It offers several tips and tricks to make it easier for home and business users. Training is not enough it’s a mindful approach that makes the...
by David Mengert | Apr 16, 2015 | Clouds, IT Blueprint, Technology
Best reason to IT Blueprint (Clouds, IT Blueprint, Technology) The best reason to IT Blueprint…peace-of-mind. I•T (eye tee) Blue•Print (blo͞oˈprĭntˌ) n. A contact print of a drawing or other image rendered as white lines on a...
by Dan | Mar 15, 2015 | Clouds, Desktop Apps, IT Blueprint, Security, Technology
5 easy steps to reduce info security risks are really as easy, and many people and companies are taking them up today. User training is the most important and easiest key to a better info-security profile for businesses. Most of the big corporations and even large...
by David Mengert | Feb 24, 2015 | Clouds, IT Blueprint, Technology, Web presence
Customer Management is all about how your prospects feel about your offering. The best way to get them to the emotion they want is to get back to the basics: Understanding the three critical elements in everything we do – People, Process, Tools. It is the coffee you...
by Dan | Feb 20, 2015 | Clouds, IT Blueprint, MSO 365, Technology
Email is a great tool, but it’s a huge distraction in itself. I try to not look at it till after 9:30 every day. Then I follow the same process: go through the newest emails, deal with the priority and delete them. Flag the ones that have to be dealt with by end of...
by David Mengert | Feb 2, 2015 | Clouds, IT Blueprint, Security, Technology, Training
Three simple steps prevent delivering breakthrough experiences for the bad guys. The choice is yours whether to take action or not.. “For the third time in the last couple of weeks, Adobe is dealing with a zero day vulnerability in Flash. The company is working...
by Dan | Oct 14, 2014 | Clouds, Desktop Apps, IT Blueprint, MSO 365, Security, Technology
Three simple reasons that upgrading makes sense now: Always The has been huge growth in data over the past few years. Big data this and big data that. Where do we put it and what do we do with it? We actually have plenty of places to put it all… 16k is how many...
by Dan | Sep 12, 2014 | Clouds, IT Blueprint
3 Key Answers to Security Concerns The 3 key answers to security concerns are right under our noses. What makes a business successful is the same set of concerns as what keeps its data safe. Companies are people, processes and hard system, technology. They must...
by David Mengert | Sep 11, 2014 | Clouds, IT Blueprint, Technology
Internet Slow Down Day Internet slow down day came and went without inflicting any real slowdown on network traffic. The echoing halls of government had more traffic than usual yesterday. Phones were ringing and email boxes brimming with comments on the idea that...