IT Blog

Explore the IPM Computers IT Blog for valuable insights and thought leadership on industry best practices in managed IT services and enterprise IT trends.

Cyber Security

Staying Calm in Times of Crisis

We’ve all been through challenging times personally and professionally, and in our heads and hearts, we know that ...

Cyber Security

The Untapped Vertical

The Untapped Vertical With the cannabis industry growing rapidly in the United States, and more states legalizing mariju...

Cyber Security

Children’s Social Security Numbers – An Easy Target

An Easy Target The value of stolen data increases when it is more easily manipulated and used.  With a social secur...

Cyber Security

Malvertising – What Is It?

Malvertising We are in a time when “fake news” has become a term thrown around so frequently it is now part ...

Cyber Security

When the Threat Is Inside the Building

Insider Threat A recent discovery of a breach of customer data at Fifth Third Bank uncovered a troubling truth. It ...

Cyber Security

Equifax Breach Update

Made in China The 2017 Equifax breach brought individuals and one of the largest credit agencies to their knees.  A...

Cyber Security

Learn to Audit Your Website – On-Demand

How to Get Found  We know that running a business is more than ensuring that you have the right products to resell....

Cyber Security

Double Rewards – The Rise in Ransom Payments

The rate at which data breaches are occurring is on the rise, this we know.  But another corresponding rate on the ...

Cyber Security

Windows 7 End of Life – the Beginning for New Scams

End of Windows 7 They say when one door closes another one opens, but in this case, it’s a window.  On Januar...

Cyber Security

I Fell for a Phishing Scam

I just fell for a phishing email. Yep, the guy who builds services to protect clients from phishing emails was tricked b...