by david | Jun 12, 2020 | IT Blueprint, Privacy, Security, Uncategorized
Tekmar Managed Threat Protection services are a critical focus for Tekmar Solutions, Inc. Threat Protection for business and home computers is not simple. It is elusive for many users. Threat protection requires state of the art defenses and regular monitoring. ...
by david | Mar 7, 2020 | Clouds, Data Backup and restore, IT Blueprint, Privacy, Security
Managed Backup Solution The most important part of a backup solution is restoring. If you cannot restore a backup archive, it is worthless. The vital step is checking the integrity of the archive regularly. The managed part of Tekmar’s Backup Solution is...
by Dan Siebert | Jan 21, 2020 | Privacy, Security, Technology
Simplify Security with Tekmar Solutions, Inc. Password Manager The Tekmar Solutions, Inc. (TSI) Password Manager simplifies security and enhances data access. Acting as a trusted platform, it secures data processes effectively in the real world. What does a password...
by david | Sep 25, 2019 | Privacy, Security, Technology
IT and Data Security for your Business Did you know that the number of cyberattacks on business has been on the rise for several years in a row? Every business is vulnerable, even large organizations like Target, Capital One, and the cities of Baltimore and...
by david | Aug 1, 2019 | IT Blueprint, Life Style, Privacy, Security, Technology
NC not among nine states that have recently passed stricter data privacy and notification laws. Data security has been in the news, with several high profile breaches affecting the private data of millions of people. Without tighter data privacy and notification...
by david | Jun 6, 2019 | Clouds, Desktop Apps, Email Management, IOT, IT Blueprint, Privacy, Security, Uncategorized
New RCE Vulnerability Last month I wrote about the importance of keep our systems updated against a similar vulnerability in Windows remote desktop protocal. This vulnerabilty has fewer potential systems, but every system is affected by the flow of email. According to...