by Dan | Jul 13, 2021 | Security, Technology
Reported in the New York Times today, by David Sanger, the aggressive ransomware organized crime syndicate believed base in Russia has gone offline. He lists several possible gambits. My favorite ” a third is that REvil decided that the heat was too intense, and...
by Dan | Jul 8, 2021 | Security, Technology
Printnightmare has kept IT and systems staff alerted for the past week. It was originally attributed to: An accidental leak Leaking the details for this vulnerability happened by accident, out of a confusion with another issue, CVE-2021-1675, also impacting Print...
by Dan | Jul 6, 2021 | Clouds, Data Backup and restore, IT Blueprint, Password Manager, Security, Technology, Training
Businesses, organizations, and individuals need to have an anti-phishing strategy. Just this simple step is minimizing the risk of successful phishing attacks. Staying safe from phishing attacks is a practice. Putting this handbook into your policies and procedures...
by David Mengert | May 12, 2021 | Clouds, IT Blueprint, Privacy, Security, Technology
One Clue to dark side’s origins is that the problems are deeper and not as dark as some make out. Dark makes it sound like there is not enough light obscuring what’s going on in attacks like the one on Colonial Pipelines. There is more than knowledge...
by David Mengert | Mar 13, 2021 | Password Manager, Security, Training
An alert pops up on your computer: It’s time to change your password again. Sigh. Fine. You’ll just change from password4! to password5! and— Not so fast. Regular password changes are meant to make sure that even if someone gets your login credentials, they won’t be...
by David Mengert | Feb 25, 2021 | Clouds, Important Email Excerpts, MSO 365, Privacy, Security, Technology
Reminder: Microsoft 365 apps and services ending support on IE11 after August 17, 2021 MC241353 · TEKMAR SOLUTIONS, INC. As communicated in MC220490 (August ’20), Microsoft 365 apps and services will be focusing their efforts on modern browser support over the coming...
by David Mengert | Feb 17, 2021 | Clouds, Data Backup and restore, Life Style, Security, UPS
Another storm is on the way. It’s troubling because, driving past parking lots they filled with cars, people are worried about supplies, which is understandable. The pandemic is not over and we should all be budgeting time to get everything we need to handle...
by Dan | Feb 13, 2021 | Password Manager, Security
If you use the same password for multiple systems—online shopping, email, your company’s cloud bookkeeping solution, etc.—you are not alone. The best password is unique, yet even Facebook founder Mark Zuckerburg did that. And in 2016 his LinkedIn credentials were...
by David Mengert | Jan 7, 2021 | Clouds, Data Backup and restore, Privacy, Security, Training
To celebrate data Privacy Day Tekmar is offering a month of help desk support as a bonus add-on with 60 day subscription for our TSI Password manager. The Purpose of TSI Password Manager is simplifying password management for businesses and users. What is the purpose...
by David Mengert | Dec 7, 2020 | Clouds, Desktop Apps, IT Blueprint, Privacy, Security, Technology, Uncategorized
Making a deep dive into the process running on your systems is two heart beats and a click away Tekmar Managed IT Blueprint keeps a running audit for home and business computer users. Click the retrieve audit button in the system tray and we’ll send you an...
by David Mengert | Jun 12, 2020 | IT Blueprint, Privacy, Security, Uncategorized
Tekmar Managed Threat Protection services are a critical focus for Tekmar Solutions, Inc. Threat Protection for business and home computers is not simple. It is elusive for many users. Threat protection requires state of the art defenses and regular monitoring. ...
by David Mengert | May 1, 2020 | Life Style, Security, Technology
It does not sound right, yet wearing a facemask is a mindful use technology in today’s world. Using tech is a choice and if we do it for a purpose. It helps ourselves, our friends and community, and even people we don’t know. A cloth face mash is a...
by David Mengert | Mar 7, 2020 | Clouds, Data Backup and restore, IT Blueprint, Privacy, Security
Managed Backup Solution The most important part of a backup solution is restoring. If you cannot restore a backup archive, it is worthless. The vital step is checking the integrity of the archive regularly. The managed part of Tekmar’s Backup Solution is...
by David Mengert | Jan 21, 2020 | Privacy, Security, Technology
The Purpose of our TSI Password Manager is simplifying security and data access. It works in the real world as a reliable trusted platform module making data processes secure. What is the purpose of a password manager? What are the advantages for my team? This...
by Dan | Oct 18, 2019 | Security, Technology, Training
Malware and ransomware Prevention Steps Avoiding malware and ransomware prevention steps ate simple actions we can all take to avoid exploits and file-encryption exploits. THese steps are not exhaustive or exhausting for our users. They do help. Sign up for our...
by David Mengert | Sep 25, 2019 | Privacy, Security, Technology
IT and Data Security for your Business Did you know that the number of cyberattacks on business has been on the rise for several years in a row? Every business is vulnerable, even large organizations like Target, Capital One, and the cities of Baltimore and...
by Don Howard | Sep 19, 2019 | Clouds, Security, Technology
The best security starts with asking the right questions. While I was speaking with a prospect yesterday, she asked me, “what security measures do you use on your own system?” It’s a great security question. A sign of good leadership is to not ask others to do what...
by David Mengert | Aug 1, 2019 | IT Blueprint, Life Style, Privacy, Security, Technology
NC not among nine states that have recently passed stricter data privacy and notification laws. Data security has been in the news, with several high profile breaches affecting the private data of millions of people. Without tighter data privacy and notification...
by David Mengert | Jun 6, 2019 | Clouds, Desktop Apps, Email Management, IOT, IT Blueprint, Privacy, Security, Uncategorized
New RCE Vulnerability Last month I wrote about the importance of keep our systems updated against a similar vulnerability in Windows remote desktop protocal. This vulnerabilty has fewer potential systems, but every system is affected by the flow of email. According to...
by David Mengert | Apr 28, 2019 | IT Blueprint, Security, Technology
Remote Support Name Email Address Enter best contact number Enter problem description. 8 + 15 = Start session After submitting your request we will contact you. Please wait for us to call or send you a code, then enter it below. Enter your six-digit code, then click...