i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction. Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Cryptomining is Inspiring Cybercrime

Cryptomining is Inspiring Cybercrime

Blockchain technology is mainly known for its use with cryptocurrencies. Even though the values of cryptocurrencies have leveled off after the incredible growth it has sustained over the past few months, users are still attempting to use cryptocurrencies to make a little bit of extra cash on the side. Of course, if there is money involved, you can bet that there will also be criminals and shady activity surrounding it.

0 Comments
Continue reading

Understanding the New NIST Guidelines for Password Security

Understanding the New NIST Guidelines for Password Security

The National Institute for Standards and Technology (NIST) has released Special Publication 800-63B, titled Digital Identity Guidelines. The document outlines major changes to the ways password security should be approached and leaves a lot of what network administrators and software developers have implemented recently to be wrong Today, we’ll take a look at the publication, and try to make sense of the sudden change of course.

0 Comments
Continue reading

Know Your Tech: CMS

Know Your Tech: CMS

Marketing is increasingly critical to a business’ success, especially when it comes to the use of content as an impressions generator. This makes it all the more important for your content to be well organized and managed. Here, we’ll go over a few options you have as far as content management systems are concerned, and how they make maintaining your content strategy that much simpler.

0 Comments
Continue reading

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

0 Comments
Continue reading

How to Be Selective when Picking a Backup Solution

How to Be Selective when Picking a Backup Solution

You literally never know when your data may be lost. It may be frightening to consider, but there are so many factors that could lead to you losing your data, ranging from an act of nature to user error. To counter this, you need to make sure your backup solution meets certain requirements. Today, we’ll review those requirements.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite