by david | Jun 6, 2019 | Clouds, Desktop Apps, Email Management, IOT, IT Blueprint, Privacy, Security, Uncategorized
New RCE Vulnerability Last month I wrote about the importance of keep our systems updated against a similar vulnerability in Windows remote desktop protocal. This vulnerabilty has fewer potential systems, but every system is affected by the flow of email. According to...
by david | Aug 18, 2018 | Clouds, Desktop Apps, IT Blueprint, MSO 365, Privacy, Security, Technology, Training
How to move your email safely securely for free, to a new provider. This article explains how to move your your email to a new host (provider). We begin by describing the situation and then discuss the four steps to migration. Lastly, we conclude by summarizing the...
by david | Jun 19, 2018 | Clouds, Desktop Apps, IT Blueprint, Technology, Training
Watch IT Assess IT Update IT Secure IT Is the model Tekmar Solution, Inc. uses as managed service provider. The four step process helps blending the best technologies for users, customers and the entire global computing environment. Our models stay steady for the...
by Dan Siebert | May 9, 2017 | Clouds, MSO 365, Technology, Training
Another Great One Drive feature has been updated. The Vision office 365 from its earliest days was a consistently growing and adapting set of forms that helped users stay in front of demands. The vision is pretty true. The great feature of cc’ing a user when a...
by david | Apr 19, 2017 | Clouds, Privacy, Security, Technology, Training, Web presence
Ads are exploit gateways. Most ads convey a product promotion or endorse someone or something. Frequently the browser based kind are used as data collectors used to invade ones privacy. The worst kind of ads called malvertising are not legitimate ads but a con to get...
by david | Apr 16, 2017 | Clouds, Privacy, Security, Training
Managing critical systems Managing critical sytsems is a huge concern for big business and governments. Despite the media frenzy over the NSA data release about potential Microsoft exploits, this data is widely known among hackers and IT professionals. Many owners and...