by david | Nov 10, 2023 | IT Blueprint, Privacy, Security, Technology
Tekmar Solutions: SentinelOne-Powered Cybersecurity for Modern Businesses In today’s digital landscape, cybersecurity is paramount. As technology evolves, so do the threats that businesses face. We have evolved our Signature IT Blueprint technology into our End...
by Dan Siebert | May 12, 2021 | Clouds, IT Blueprint, Privacy, Security, Technology
One Clue to dark side’s origins is that the problems are deeper and not as dark as some make out. Dark makes it sound like there is not enough light obscuring what’s going on in attacks like the one on Colonial Pipelines. There is more than knowledge...
by david | Aug 18, 2018 | Clouds, Desktop Apps, IT Blueprint, MSO 365, Privacy, Security, Technology, Training
How to move your email safely securely for free, to a new provider. This article explains how to move your your email to a new host (provider). We begin by describing the situation and then discuss the four steps to migration. Lastly, we conclude by summarizing the...
by david | Apr 19, 2017 | Clouds, Privacy, Security, Technology, Training, Web presence
Ads are exploit gateways. Most ads convey a product promotion or endorse someone or something. Frequently the browser based kind are used as data collectors used to invade ones privacy. The worst kind of ads called malvertising are not legitimate ads but a con to get...
by david | Mar 28, 2017 | Anthropology, Privacy, Security, Technology, Training, Web presence
Net neutrality is necessary for our privacy. This article encourages taking action now to let your Congressperson know that you care and are aware. If you are in the sixth district of North Carolina Mark Walker’s Greensboro office info is at the bottom of the...