Technology with a purpose
  • Home
  • TSI Backup Management
  • TSI News
  • Cybersecurity is monitoring and auditing
  • Technology Strategy Session
Select Page
SentinelOne-Powered Cybersecurity for Modern Businesses

SentinelOne-Powered Cybersecurity for Modern Businesses

by david | Nov 10, 2023 | IT Blueprint, Privacy, Security, Technology

Tekmar Solutions: SentinelOne-Powered Cybersecurity for Modern Businesses In today’s digital landscape, cybersecurity is paramount. As technology evolves, so do the threats that businesses face. We have evolved our Signature IT Blueprint technology into our End...
Online threats no businesses or individuals are safe

Online threats no businesses or individuals are safe

by david | Sep 6, 2023 | IT Blueprint, Security

Start here: In the realm of technology, threats refer to various risks and dangers that can compromise digital systems, data, and user privacy. These threats range from viruses and malware, which can infect and damage computers or steal sensitive information, to...
QuickBooks 2020 will be depricated on May 31st

QuickBooks 2020 will be depricated on May 31st

by Dan Siebert | May 1, 2023 | Clouds, Desktop Apps, IT Blueprint, Technology

Intuit has announced the discontinuation of services for QuickBooks Desktop 2020, with the termination of add-on services scheduled for May 31, 2023. Users relying on QuickBooks Desktop 2020 will lose access to critical services such as Desktop Payroll, Payments, and...
Safe passwords are peace of mind

Safe passwords are peace of mind

by david | Dec 7, 2021 | IT Blueprint, Password Manager, Privacy, Security, Technology

When he slips into a phone booth, Tekmar Password Man. becomes Log Me In’s Rescues Last Pass Man.  After careful annual analysis we are recommending and offering Last Pass for password management.  Here is why. Autosave and autofill to reliably capture every...
Staying Safe from Phishing Handbook part1

Staying Safe from Phishing Handbook part1

by Dan Siebert | Jun 10, 2021 | Clouds, Data Backup and restore, IT Blueprint, Password Manager, Security, Technology, Training

Phishing remains the primary cybersecurity threat to businesses and individuals using networked devices. It serves as a gateway for criminal enterprises, exploiting techniques often used by legitimate applications, which complicates detection. To combat this,...
One clue to DarkSide origins

One clue to DarkSide origins

by Dan Siebert | May 12, 2021 | Clouds, IT Blueprint, Privacy, Security, Technology

One Clue to dark side’s origins is that the problems are deeper and not as dark as some make out.  Dark makes it sound like there is not enough light obscuring what’s going on in attacks like the one on Colonial Pipelines.  There is more than knowledge...
« Older Entries

Recent Posts

  • Protect IT Users from AI Dangers
  • Mastering Multi-Account Best Practices
  • Understanding DMARC: A Pillar of Modern Email Security
  • Certificate errors: What to do and why
  • Be Cautious of Phishing Emails

Tekmar Solutions, our employees and contractors take your personal, and business privacy with the same concern we have for our own. You can read our privacy policies.

it-security-services

Tekmar Solutions founded in 1997 with a mission to help people with computer and networking support, custom software development and basic day to day support  high quality service now! Read our mission.

© Tekmar Solutions, Inc. 2013 – 2025