

Hosting Panel



Get Support



614-401-8800



Remote Support

  • Follow
  • Follow
  • Follow
  • Follow


614-401-8800

MAXtech Logo
  • Home
  • IT Services
  • Our Stack
    • IT Support
    • Cybersecurity
    • Cloud Computing
    • Digital Phones
  • MAXtech University
  • Case Studies
  • About Us
    • History
    • Our Team
    • FAQ
    • Locations
    • Careers
    • Blog
    • E-Books
  • Contact
  • Give BackGive Back
MAXtech logo
  • Request Support
  • Home
  • Services
  • Our Stack
  • University
  • Case Studies
  • Our Team
  • History
  • Locations
  • Contact
  • FAQ

The Definitive Cybersecurity Guide

DOWNLOAD YOUR FREE CYBERSECURITY GUIDE

Social

  • Follow
  • Follow
  • Follow
  • Follow

MAXtech

MAXtech
MAXtech3 weeks ago
2025 has certainly been a year to remember. We want to wish all our clients, friends and family a safe, prosperous, and happy 2026!
MAXtech
View on Facebook

Contact Us

Columbus, OH (HQ)


8740 Orion Place #150,
Columbus, OH 43240


614-401-8800

Tampa, FL


1497 Main St,
Dunedin, FL 34698


813-535-9333

Charlotte, NC 


10926 Quality Dr
Charlotte, NC 28278


704-960-1997

The Nerd Note

Matt and Mike on The Nerd Note podcast talking about cybersecurity

Hacker Implants & LastPass Data Breach

Matt and Steve on The Nerd Note talking about SEO and AI

Bing, SEO, and ChatGPT

App Icon Apple Podcasts
Watch

Blog

3. HIPAA Training Requirements

Jun 13, 2021 | Industry insights

HIPAA regulations are far-reaching and apply to many types of covered entities. From single-doctor practices to enterprise hospital networks and the business associates that each works with, everyone is required to be HIPAA compliant. Since HIPAA applies to such a...

4. 2-Factor Authentication versus Multi-Factor Authentication for HIPAA

Jun 12, 2021 | Industry insights

What is 2-factor authentication (2FA) vs multi-factor authentication (MFA)? 2-factor authentication is a security measure where users must confirm who they are by providing just two pieces of proof before they can receive access to a device (e.g. computer, phone),...

« Older Entries
Next Entries »