Making a deep dive into the process

running on your systems is two heart beats and a click away

Tekmar Managed IT Blueprint keeps a running audit for home and business computer users. Click the retrieve audit button in the system tray and we’ll send you an encrypted email with the latest audit details. It is necessary in IT today, whether your laptop, desktop computer, pad or mobile phone knowing whets running on it is essential. 

If you don’t have our audit software making a list is a good idea and not that difficult either.  In windows you can see the installed programs in the control panel. Also in Apps and features.  The deep dive takes some time but it’s worth it.  Anything that is on the list you make that is not contributing to the purpose you are you the technology to accomplish is slowing you down, expanding your attack surface or both.     

Basic backup has been built into windows and Mac operating systems for many years. That’s because it is essential.

Bullet List how to inventory devices for mindful computing:

  1. get a list manually or more easily with an IT Blueprint.
  2. Windows control Panel > Add and Remove programs.
  3. Windows settings apps.
  4. Window Task Manager.
  5. your files are financial documentation.

 

In business and home settings our vital files are important in ways we never thought possible just a few years ago. Basic backup does a good job protecting them. In windows 10 one can and should use File History to back up to an external drive or network location. We recommend an external drive rotation and that one be taken off-site to a safe location as part of worst case planning.

Select Start > Settings  > Update & Security > Backup > Add a drive , and then choose an external drive or network location for your backups.

Tekmar Managed Backup Solution services

are a critical focus for Tekmar Solutions, Inc. Threat Protection for business and home computers is simple but elusive for many users. It requires state of the art defense and monitoring. Tekmar Solutions, Inc. has a no secrets policy that simplifies security. Beyond no secrets, we educate our clients and help them get and maintain the right  tools and use them correctly.

Security measures are a must for small and medium size companies. People hear about he breaches of information system of large corporations because they survive. Successful attacks have compromised global retail giants, banks, and some of the largest providers in technology. What we Small and medium size business need to be aware that they too are targets. The unsettling fact is 90% of small and medium business are out of business.

Threat protection at its best is simple:

Set up a data security policy

Get back to your basics

Use outside monitoring service. IT WILL reduce costs, but maintain a fully staffed IT department to provide constant analysis of traffic in and out of your system.

Tekmar’s threat protection agents help people manage the explosive costs that breaches cause. By mitigating threats from Malware, Trojans, and viruses risks are reduced. Business in the cloud exposes systems to despite that best user training.

While keeping your systems running at optimal levels the ITB Threat Protection module provides a wealth of information, and today’s best technology that Tekmar analyzes routinely to help maintain a modern on premises and cloud based information system. The best thing is that with our 30 day trial, one can start enjoying the benefits without risk of a long term contract. With the Basic agent after the first month one pays only three dollars a month. Try it now.

Training people to watch for danger signs.

We have found that people really want to be safe computer users. With all the day to day concerns people forget to be caution. All one has to do is hold a 10-15 minute security briefing periodically. Try it at your next team meeting. Need help, contact us for a free trial and we’ll send you some materials no obligation. 

Changing passwords regularly. 

 Tekmar starts out all new clients with a simple easy to remember password mantra for all our threat protection clients. We used to leave with that in place with a warning that this policy is only temporary – 60 – 90 days. (we recommend 45-60-day frequency now and this story occurred ten years ago,) A team member working for this South Carolina company became disgruntled. In the second year of the policy which they failed to mandate a change too, despite our warnings the password mantra came back to bite them. A user knowing the manager’s password sent out hundreds of emails from her computer as her. It turned out the password policy not only protects from external threats. It provides threat protection from internal sources too.

Updating software continuously.

Use an update service with monitored results. Browsers, databases and integration service software such as Java need to be regularly updated.

Maintain a graduated hardware replace schedule.

Computers are costly but not upgrading is more expense in terms of lost productivity.

Updating firewalls and other network devices.

Use a real hardware firewall. Update it regularly.

Maintaining state of the art anti-virus and anti-malware tools.

Maintaining start of the art Anti-virus and anti-malware tools is more that buying it. We need to have it installed and we need to monitor it – that is key to threat protection.  

Getting an outside assessment from a professional security provider regularly

An outside assessment is called for because security is so important. Without an out side assessment companies are basically open complacency that is the ground of attacks that you have heard about. Like the breach of Global giant Target or the smaller breach of ABC board here in Greensboro.

Have a standard and clear BYOD policy.

A good well crafted BYOD, Bring Your Own Device policy is a dual layer of protection. Employees and the company are protected with a simple well thoughout policy. 

Use outside monitoring service.

The promise of information technology is reducing costs.  Small and medium sized businesses must maintain fully functional systems without a fully staffed IT department. Yet providing constant analysis of traffic in and out of your system is difficult.

 

hardware-solutions-are-not enough

Security problem or need system support?

If you have:

  • a security problem,
  • technology question,
  • configuration issue,
  • had a network intrusion, malware or
  • item place in quarantine,

call the Tekuser Service Desk at (336) 373-110(5).

Or submit a request by clicking the get help button below.