BLOG
Stick with Security: Store sensitive personal information securely and protect it during transmission
You've heard about Newton's laws regarding bodies at rest and bodies in motion. A 21st-century corollary is to protect sensitive information when it's at rest on your network and implement effective...
5 things you need to know about identity theft
With the Internet, modern society is connected now more than ever. While this interconnectedness may make some things easier, less savory things, such as identity theft, seem to have become easier...
Five Tips for Word Documents
Do you spend a lot of time in Microsoft Word, working on projects, papers, proposals, and more? Here's a quick review of five top tips for Word documents. #1 The Format Painter Does one section of...
Cyber-protecting the 21st century workforce
Today's workers are more mobile, free, and flexible than ever before. That makes them harder to protect from IT threats. Ori Levi apologized as he took the stage at an October 2017 CryptoFriends...
Operating in the fourth industrial revolution
Writing in the Harvard Business Review, Michael Hammer once defined operations innovation as "truly deep change" in core activities and processes. However, he added, this entails more than mere...
NOTICE: Adobe Acrobat XI End of Support
Periodically we send out notification of application support that we think is relevant and worthy of your time. This notice is regarding software for editing and manipulating PDF file formats. If...
PRESS RELEASE – Help Desk New Hire
New Hire Contact Information: Tekmanagement Inc. Charity Cooley CharityC@tekmanagement.com 541-779-4777 Tekmanagement Inc. hires Jason Hopkins as Help Desk Technician FOR IMMEDIATE RELEASE...
Scott Christopherson to speak at Cybercrime Seminar
Tekmanagement's President, Scott Christopherson will participate in a panel discussion titled “Fraud & Cybercrime: Deter, Detect, Defend” at 1:00 PM. on October 24th. at the SOU/RCC Higher...
Take Simple Steps for Cybersecurity Strength
October is National Cybersecurity Awareness Month. Many small businesses may not have all the resources they need to have a strong cybersecurity posture. Here are some simple cybersecurity practices...
Prolonging Your Smartphone Battery
Is your smartphone battery suddenly being depleted too quickly? Your phone's age, environment, and installed apps can all affect the battery and its ability to hold a charge. Here are some...