i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction. Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Why Your Business Needs to Define Its Ethical Code

Why Your Business Needs to Define Its Ethical Code

As the technology that businesses have available to them develops, so does the propensity for this technology to be used unethically. This has become especially apparent where data collection is concerned, and what that data is used for after it has been collected. How can you keep operations moving both productively, and ethically?

0 Comments
Continue reading

Tip of the Week: Use Admin Accounts to Control Your Network

Tip of the Week: Use Admin Accounts to Control Your Network

There are various types of user accounts that your employees and administrators can use to access their workstations, but one of the biggest points of contention to consider when planning out data access is the use of administrator accounts. Specifically, you want to avoid handing out administrator account access to users like it’s Halloween candy.

0 Comments
Continue reading

IT Support Scams are Everywhere. Here’s What You Should Know

IT Support Scams are Everywhere. Here’s What You Should Know

Chances are you’ve encountered a couple of tech support scams in your days. These people frequently dial random numbers in an attempt to get the person on the end of the phone long enough to trust them with remoting into the device. These kinds of scams are designed to be as vague as possible, and since most people have computers that are at least a couple years old, they tend to experience some kind of sluggishness that makes them believe that something is genuinely wrong. This can turn out to be a grave mistake.

0 Comments
Continue reading

How NOT to Maintain a Backup

How NOT to Maintain a Backup

A data loss incident is considered a major disaster scenario, especially for small and medium-sized businesses. All it takes is one moment to lose your business’s entire data infrastructure. We’ll walk you through a story that should serve as a cautionary tale, one that hopefully teaches you to adhere to data backup and disaster recovery best practices.


Marco Marsala, a hosting provider, posted on a server forum looking for advice on how to deal with a major issue he encountered while trying to delete a few files. He had utilized what’s called the “rm-rf” command with undefined variables, which wound up destroying all data on the system. Like any good hosting provider, he had backups of the files, but, like a dumb-dumb, he had the backups stored on the system that he accidentally wiped. What a mess.

This is actually a similar blunder to one that Pixar experienced, almost deleting Toy Story 2 prior to its release.

As a result of Marsala’s negligence, all of the data that his company had stored was destroyed. This included the data of 1,535 customers, whom he had built and hosted websites for. Without any backups stored off-site, he had no way to recover the data.

As you might expect, the responses that Marsala received from other users of the online forum were quite negative. Many completely dismissed the possibility that his company could recover from such a devastating failure, and others questioned his abilities as a hosting provider. One poster even went as far as recommending that Marsala seek legal counsel, rather than attempt to restore the data, predicting that Marsala was “going out of business.”

The conclusion: Marsala’s best chance of recovering from this major blow was to recruit help from a third-party data recovery firm. Fortunately for him, the company was able to recover his files, but that doesn’t change the fact that his simple mistake was a huge hit to his company’s finances. The company suffered from fees associated with the disaster recovery process, as well as reduced income from the loss of business suffered as a result of his negligence.

The lesson: neglecting to follow best practices got Marsala in some hot water, and his failure basically invited disaster to his doorstep. Following the accepted best practices of data recovery could have easily prevented the situation from escalating as quickly as it did. In fact, Marsala’s reason for distress (user error) is one of the most common reasons to use a backup and disaster recovery solution, a solution that stores your backups off-site on a separate system.

Storing your data off-site allows your organization to avoid the many causes of data loss, including user error, fires, electrical surges, hardware failure, theft, and so much more. This minimizes the risk of these events threatening your business’s operations.

How do you manage your business’s data backups? Are they stored off-site, and do you have a system in place to rapidly deploy them in the event of a major disaster? If you’re uncertain, reach out to i-medIT at 630-549-6199.

0 Comments
Continue reading

Tip of the Week: 3 Ways to Be Productive When Your Internet Connection Fails

b2ap3_thumbnail_no_internet_400.jpgModern businesses are reliant on certain parts of their infrastructure to keep operations functioning. For example, if your building’s electricity were to go down, what would you do? What about if you lost Internet access? Would your business be able to keep your employees busy, or would the downtime experienced be enough to cause panic?

0 Comments
Continue reading

Drugs, Assassins For Hire, Weapon Sales, and More: All Conveniently Found On the Web

b2ap3_thumbnail_cybercrime_black_market_400.jpgThe Internet is a fascinating and wonderful place full of great, informative resources and websites, but it’s also home to online markets for illegal and unethical practices. These hotbeds of criminal activity are a danger not only to your business, but to everyone who uses the Internet.

0 Comments
Continue reading

736 Million Records Were Exposed to Data Theft in 2015

b2ap3_thumbnail_stolen_data_problems_400.jpg2015 saw a significant increase in high-profile hacking attacks in organizations of all disciplines: healthcare, government, and even large entertainment companies all fell victim to data breaches. In light of these attacks, valuable lessons can be learned through analyzing the types of records that were stolen. In 2015, over half of all records exposed to hackers were passwords and email addresses.

0 Comments
Continue reading

The Strict Security Measures of Nuclear Power Plants Can Benefit Your Business Too

b2ap3_thumbnail_backup_system_400.jpgTechnology, while a great asset that can be leveraged for your benefit, can also frighten businesses due to how unpredictable it can be at times. The constant threat of data loss, identity theft, and hardware failure can cripple your business’s ability to retain operations. Specifically, businesses can learn about risk management by analyzing the processes used by an industry where risk management is absolutely critical: nuclear power plants.

0 Comments
Continue reading

3 Technologies That Will Give Your Remote Workers the Edge

b2ap3_thumbnail_remote_working_400.jpgMore businesses than ever before are finding value in allowing their workers to work from the comfort of their own homes, rather than have them drive all the way to the office to do a job that can be done from anywhere with an Internet connection. More importantly, it’s much more cost effective for businesses to allow for remote workers. How can you make it as easy as possible for remote workers to get their jobs done?

0 Comments
Continue reading

3 Billion Users May Have Good Reason to Avoid Upgrading Their Old PCs

b2ap3_thumbnail_these_old_pcs_400.jpgAny user of technology knows the frustration of periodically replacing it with better and more recent technology. In fact, the latest gadgets seem to be outdated just months after they’re released. Many people believe that this unprecedented growth in the technology industry could lead to a decrease in PC sales, but it also means that devices are growing more reliable.

0 Comments
Continue reading

Business Continuity: Prepare For the Worst and Hope For the Best

b2ap3_thumbnail_business_continuity_400.jpgThere are few things more important than the continuity of your business. Your livelihood, and that of your employees, depends on the continued functionality of your organization. Therefore, it becomes necessary to do all that you can to ensure your business is protected from an unexpected downfall, due to data loss, natural disasters, and other means.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite