• Contributor
Joe Hewitson

Joe Hewitson

With a degree in Applied Computing Technology and over a decade of service in the IT and Software Development industries, Joe Hewitson has acquired a keen ability to write about emerging technologies and the impact they have on businesses in many different industries. Accompanying his love for all things tech is a passion for writing informed and engaging pieces in a unique and easy to understand voice. Living in the beautiful arms of the Rocky Mountains, Joe is an avid outdoorsman and enjoys running, biking, and fishing.

Being an Author

Are you an experienced writer with IT expertise? Contact us today to become a Tektonika contributor.



October 26, 2018 | 3 minute read

4 ways to celebrate National Cybersecurity Awareness Month

It's National Cybersecurity Awareness Month, and the best way to celebrate is strengthening your company's cybersecurity. This guide shows you how.


September 21, 2018 | 4 minute read

3 ways to modernize your IT security strategy

Today's global cybersecurity risks are different than yesterday's. When's the last time you updated your security strategy to combat modern threats?


August 20, 2018 | 3 minute read

Stay vigilant in the wake of mobile endpoint security risks

The days when endpoint security only encompassed devices within the confines of your office are long gone, thanks to mobility. Here's how to stay safe.


August 16, 2018 | 3 minute read

Walk away from passwords and into the future of IT

With the effectiveness of passwords decreasing every day, does the future of IT even need them? An innovation in biometric authentication suggests not.


May 15, 2018 | 4 minute read

Build your security immunity with an IT infrastructure checkup

Everyone needs their regular checkup to stay healthy—even your IT infrastructure. Use these practical steps to check the health of your office security.

May 10, 2018 | 4 minute read

Why is everyone freaking out about endpoint security?

Learn what all the hubbub is about—and a few tips for identifying the weak links in your endpoint security strategy, so you can stay ahead of hackers.