IT Blog

Explore the IPM Computers IT Blog for valuable insights and thought leadership on industry best practices in managed IT services and enterprise IT trends.

Cyber Security

Hacker Helper

Are You a Hacker Helper? Here you go, let me get the door for you.  Are you looking for access to my company’s network? ...

Cyber Security

Security Risk Rate vs. Spend Rate

Security Risk Rate vs. Spend Rate According to the 2019 SMB IT Security Report from Untangle, 80% of the small to medium...

Cyber Security

A New Approach to Healthcare Cybersecurity

A New Approach to an Old Problem Resistance to yet another government regulation, a lack of understanding the complexiti...

Quick Tips

Backup, Disaster Recovery, and Dorian.

Hurricane Dorian is fast approaching and now is categorized as a 5. Your current backup and disaster recovery plans shou...

Cyber Security

Why We Need to Go Beyond HIPAA

HIPAA – Then & Now The Health Insurance Portability and Accountability Act, better known as HIPAA, has been around ...

Cyber Security

Changing our Attitudes About Password Security

Live and Learn Most situations teach us lessons so that we don’t repeat damaging behaviors. For example, if you touch a ...

Cyber Security

A New Kind of Cyber Threat to MSPs

There is a rise in awareness with small to medium-sized businesses (SMBs) of the threat to their cybersecurity.  The pro...

Cyber Security

Passwords: Why You Shouldn’t Reduce, Reuse & Recycle

The Excuses  It’s not easy! It’s a lot to keep track of. I have no idea where I’ve used that before. There’s nothing in ...

O365 Scam Email
Quick Tips

How to avoid being phished!

1. Who is it from? The number one easiest way to tell if an email you are reading is a phishing attempt is to read who t...


VLOG #4 – Unifi Wifi – The system we use to help our clients.