by david | Dec 7, 2020 | Clouds, Desktop Apps, IT Blueprint, Privacy, Security, Technology, Uncategorized
Making a deep dive into the process running on your systems is two heart beats and a click away Tekmar Managed IT Blueprint keeps a running audit for home and business computer users. Click the retrieve audit button in the system tray and we’ll send you an...
by david | Jun 12, 2020 | IT Blueprint, Privacy, Security, Uncategorized
Tekmar Managed Threat Protection services are a critical focus for Tekmar Solutions, Inc. Threat Protection for business and home computers is not simple. It is elusive for many users. Threat protection requires state of the art defenses and regular monitoring. ...
by david | Mar 7, 2020 | Clouds, Data Backup and restore, IT Blueprint, Privacy, Security
Managed Backup Solution The most important part of a backup solution is restoring. If you cannot restore a backup archive, it is worthless. The vital step is checking the integrity of the archive regularly. The managed part of Tekmar’s Backup Solution is...
by david | Aug 1, 2019 | IT Blueprint, Life Style, Privacy, Security, Technology
NC not among nine states that have recently passed stricter data privacy and notification laws. Data security has been in the news, with several high profile breaches affecting the private data of millions of people. Without tighter data privacy and notification...
by Dan Siebert | Jun 19, 2019 | Clouds, IT Blueprint
Tech support for seniors computing peace of mind During the Covid19 pandemic, tech use by seniors has skyrocketed. Tekmar’s tech support for senior citizens program makes it easy for these users get help when they need it. Studies show (see below) that seniors are...
by david | Jun 6, 2019 | Clouds, Desktop Apps, Email Management, IOT, IT Blueprint, Privacy, Security, Uncategorized
New RCE Vulnerability Last month I wrote about the importance of keep our systems updated against a similar vulnerability in Windows remote desktop protocal. This vulnerabilty has fewer potential systems, but every system is affected by the flow of email. According to...