

Hosting Panel



Get Support



614-401-8800



Remote Support

  • Follow
  • Follow
  • Follow
  • Follow


614-401-8800

MAXtech Logo
  • Home
  • IT Services
  • Our Stack
    • IT Support
    • Cybersecurity
    • Cloud Computing
    • Digital Phones
  • MAXtech University
  • Case Studies
  • About Us
    • History
    • Our Team
    • FAQ
    • Locations
    • Careers
    • Blog
    • E-Books
  • Contact
  • Give BackGive Back
MAXtech logo
  • Request Support
  • Home
  • Services
  • Our Stack
  • University
  • Case Studies
  • Our Team
  • History
  • Locations
  • Contact
  • FAQ

The Definitive Cybersecurity Guide

DOWNLOAD YOUR FREE CYBERSECURITY GUIDE

Social

  • Follow
  • Follow
  • Follow
  • Follow

MAXtech

MAXtech
MAXtech7 days ago
New MAXtech Team Member Alert! Please welcome Ariel to our team as an IT CSR 🥳. We're excited to have Ariel aboard to help keep everyone in line and keep everything running smoothly.
MAXtech
View on Facebook

Contact Us

Columbus, OH (HQ)


8740 Orion Place #150,
Columbus, OH 43240


614-401-8800

Tampa, FL


1497 Main St,
Dunedin, FL 34698


813-535-9333

Charlotte, NC 


10926 Quality Dr
Charlotte, NC 28278


704-960-1997

The Nerd Note

Matt and Mike on The Nerd Note podcast talking about cybersecurity

Hacker Implants & LastPass Data Breach

Matt and Steve on The Nerd Note talking about SEO and AI

Bing, SEO, and ChatGPT

App Icon Apple Podcasts
Watch

Blog

4. 2-Factor Authentication versus Multi-Factor Authentication for HIPAA

Jun 12, 2021 | Industry insights

What is 2-factor authentication (2FA) vs multi-factor authentication (MFA)? 2-factor authentication is a security measure where users must confirm who they are by providing just two pieces of proof before they can receive access to a device (e.g. computer, phone),...

5. HIPAA Password Requirements

Jun 11, 2021 | Industry insights

When it comes to protecting ePHI, one of the first lines of defense is a strong password policy for all systems that house sensitive information. HIPAA has set out guidelines for creating, changing and protecting passwords. It’s critical that covered entities follow...

« Older Entries
Next Entries »