by david | Mar 7, 2020 | Clouds, Data Backup and restore, IT Blueprint, Privacy, Security
Managed Backup Solution The most important part of a backup solution is restoring. If you cannot restore a backup archive, it is worthless. The vital step is checking the integrity of the archive regularly. The managed part of Tekmar’s Backup Solution is...
by Dan Siebert | Jan 21, 2020 | Privacy, Security, Technology
Simplify Security with Tekmar Solutions, Inc. Password Manager The Tekmar Solutions, Inc. (TSI) Password Manager simplifies security and enhances data access. Acting as a trusted platform, it secures data processes effectively in the real world. What does a password...
by Dan Siebert | Oct 18, 2019 | Security, Technology, Training
Malware and ransomware Prevention Steps Avoiding malware and ransomware prevention steps ate simple actions we can all take to avoid exploits and file-encryption exploits. THese steps are not exhaustive or exhausting for our users. They do help. Sign up for our...
by david | Sep 25, 2019 | Privacy, Security, Technology
IT and Data Security for your Business Did you know that the number of cyberattacks on business has been on the rise for several years in a row? Every business is vulnerable, even large organizations like Target, Capital One, and the cities of Baltimore and...
by don_Howard | Sep 19, 2019 | Clouds, Security, Technology
The best security starts with asking the right questions. While I was speaking with a prospect yesterday, she asked me, “what security measures do you use on your own system?” It’s a great security question. A sign of good leadership is to not ask others to do what...
by david | Aug 1, 2019 | IT Blueprint, Life Style, Privacy, Security, Technology
NC not among nine states that have recently passed stricter data privacy and notification laws. Data security has been in the news, with several high profile breaches affecting the private data of millions of people. Without tighter data privacy and notification...