Technology with a purpose
  • Home
  • TSI Backup Management
  • TSI News
  • Technology Strategy Session
Select Page
SentinelOne-Powered Cybersecurity for Modern Businesses

SentinelOne-Powered Cybersecurity for Modern Businesses

by david | Nov 10, 2023 | IT Blueprint, Privacy, Security, Technology

Tekmar Solutions: SentinelOne-Powered Cybersecurity for Modern Businesses In today’s digital landscape, cybersecurity is paramount. As technology evolves, so do the threats that businesses face. We have evolved our Signature IT Blueprint technology into our End...
Types of Personal Information Targeted by Cybercriminals

Types of Personal Information Targeted by Cybercriminals

by Dan Siebert | Jan 13, 2023 | Clouds, Privacy, Security, Technology

One clue to DarkSide origins

One clue to DarkSide origins

by Dan Siebert | May 12, 2021 | Clouds, IT Blueprint, Privacy, Security, Technology

One Clue to dark side’s origins is that the problems are deeper and not as dark as some make out.  Dark makes it sound like there is not enough light obscuring what’s going on in attacks like the one on Colonial Pipelines.  There is more than knowledge...

Moving email to a new host

by david | Aug 18, 2018 | Clouds, Desktop Apps, IT Blueprint, MSO 365, Privacy, Security, Technology, Training

How to move your email safely securely for free, to a new provider. This article explains how to move your your email to a new host (provider). We begin by describing the situation and then discuss the four steps to migration. Lastly, we conclude by summarizing the...

Ads are exploit gateways

by david | Apr 19, 2017 | Clouds, Privacy, Security, Technology, Training, Web presence

Ads are exploit gateways. Most ads convey a product promotion or endorse someone or something. Frequently the browser based kind are used as data collectors used to invade ones privacy. The worst kind of ads called malvertising are not legitimate ads but a con to get...

Net nuetrality is necessary

by david | Mar 28, 2017 | Anthropology, Privacy, Security, Technology, Training, Web presence

Net neutrality is necessary for our privacy. This article encourages taking action now to let your Congressperson know that you care and are aware. If you are in the sixth district of North Carolina Mark Walker’s Greensboro office info is at the bottom of the...
« Older Entries

Recent Posts

  • Understanding DMARC: A Pillar of Modern Email Security
  • Certificate errors: What to do and why
  • Be Cautious of Phishing Emails
  • Effective Email Management: Essential Tips
  • Target Phishing becoming more prevalent

Tekmar Solutions, our employees and contractors take your personal, and business privacy with the same concern we have for our own. You can read our privacy policies.

it-security-services

Tekmar Solutions founded in 1997 with a mission to help people with computer and networking support, custom software development and basic day to day support  high quality service now! Read our mission.

© Tekmar Solutions, Inc. 2013 – 2024