Article3, Cybersecurity Hayley Ravotti Article3, Cybersecurity Hayley Ravotti

What is DomainKeys Identified Mail (DKIM)?

DKIM, DomainKeys Identified Mail, is used to authenticate an email. It uses a digital signature to let the email recipient know the message and content of the email was authorized by the domain owner. How does DKIM work? Actually it's fairly complicated in terms of generating public and private keys in order to verify the content of your email.

Read More
Article3, Cybersecurity Hayley Ravotti Article3, Cybersecurity Hayley Ravotti

What is SPF and How Does IT Work?

Sender Policy Framework (SPF) is an email authentication protocol designed to prevent email spoofing and spam. It restricts who can use an organization's domain as the sender of the email. In most phishing attacks, threat actors usually spoof the sender's email address to look official. SPF prevents that from being received.

Read More
Article3, Cybersecurity Hayley Ravotti Article3, Cybersecurity Hayley Ravotti

What is DMARC? Geeky Edition!

DMARC, Domain-based Message Authentication, Reporting & Conformance, is an email security protocol that verifies email senders by building on the DNS services and the SPF, and DKIM protocols. It was created to block the threat of email spoofing, domain spoofing, email phishing, business email compromise, and other email-based attacks.

Read More
Article3, Cybersecurity Alex Kovach Article3, Cybersecurity Alex Kovach

What You Need To Know About Insider Threats

An insider threat refers to the risk or potential harm posed to an organization's data, systems, or security by individuals who have authorized access to the organization's resources. These individuals could be current/ former employees, contractors, or business partners who possess knowledge, privileges, and/or access rights within the organization's systems and networks.

Read More
General Technology, Article3 Sarah Brown General Technology, Article3 Sarah Brown

Your Router Explained!

Think of your home or office as a city, and the internet as a vast network of roads connecting different cities. Now, think of a router as the traffic cop for your city. A router is a device that helps your computer or other devices connect to the internet. It's like a central hub that manages the flow of information between your devices and the internet.

Read More
Article3, Managed Services Bob Coppedge Article3, Managed Services Bob Coppedge

What The Heck is a TSP?

I’m glad to hear that other industries are getting into the three-letter acronym (aka TLA) world. A TSP can be a teaspoon. Or it can be a Thrift Savings Plan. Or Trisodium Phosphate. Or Travel Service Provider. But for this blog, we’re sticking with IT. The term stands for “Technology Service Provider”.

Read More
Article3, Managed Services Bob Coppedge Article3, Managed Services Bob Coppedge

What to Look for in an IT Service Provider

Are you a business owner or manager in search of a reputable IT service provider but unsure where to begin? You're not alone. In today's technology-driven world, selecting the right IT support company is crucial for your business's success. In this blog post, we will discuss key factors to consider when choosing a reputable IT provider, backed by three illustrative examples.

Read More
Article3, Our Approach Patti Smerk Article3, Our Approach Patti Smerk

Getting Started With Simplex-IT

Here at Simplex-IT, we understand looking for a new IT provider isn't fun. Pushy salespeople. Condescending IT jerks. We take a consultative approach, because we’re genuinely interested in supporting the success of your business through IT. Our proven 4 step process was designed to make this process easy.

Read More
Article3, Cybersecurity Adam Evans, CISSP Article3, Cybersecurity Adam Evans, CISSP

Does Your Company Need a CISO?

In today's digital age, data security has become a top priority for organizations across industries. With the increasing frequency and sophistication of cyber-attacks, it's critical for businesses to have a dedicated professional responsible for their overall information security.

Read More