Managed Services, Article2 Patti Smerk Managed Services, Article2 Patti Smerk

Managed Service Agreements…What’s Covered? 

At Simplex-IT, we believe in building strong relationships with our clients by providing clear and transparent IT solutions that meet their unique business needs. We understand that every business is different and that's why we offer customized monthly IT agreements that cover everything required to maintain the status quo of your business operations.

Read More
Cybersecurity, Article2 Adam Evans, CISSP Cybersecurity, Article2 Adam Evans, CISSP

How Could Hackers Use AI?

At the end of 2022 artificial intelligence entered the mainstream with tools like ChatGPT, DALL E, and more, becoming wildly popular. As with any tool, they can be a powerful force for positive change in the world, but in the wrong hands they could cause harm. So how is AI technology empowering hackers?

Read More
Cybersecurity, Article2 Adam Evans, CISSP Cybersecurity, Article2 Adam Evans, CISSP

Is Your CEO Really Texting You?

In today’s fast-paced work environment, it’s not uncommon to receive messages and emails from colleagues and superiors requesting assistance or information. However, with the rise of cyber threats, it’s important to take a moment to pause and think before reacting to these messages, especially when they involve financial transactions or sensitive information.

Read More
Cybersecurity, Article2 Adam Evans, CISSP Cybersecurity, Article2 Adam Evans, CISSP

New Microsoft Outlook Vulnerability 

Attention all Microsoft Outlook users! A new vulnerability has been revealed, and it's a pretty scary one. Essentially, a malicious entity can send an email to a user without any action on their part, and potentially obtain their password. Considering how much sensitive information is shared via email, this is a major concern.

Read More
Cybersecurity, Article2 Bob Coppedge Cybersecurity, Article2 Bob Coppedge

What is Laptop Encryption?

I just stole a laptop and took out the hard drive. I now have access to everything on it, regardless of the password used to log on. Just attach it to another computer, and I've got everything. Unless it's encrypted. Data encryption is the process of encoding data stored on your laptop so that it can only be accessed by an authorized user.

Read More
General Technology, Article2 Bob Coppedge General Technology, Article2 Bob Coppedge

How Do You Choose The Right VPN For Your Business?

Virtual Private Network (VPN) is a secure connection between two or more computers or devices that allows data to be transmitted and received over the internet without being exposed to malicious actors. It is commonly used to protect personal information, such as passwords and financial data, as well as provide access to restricted networks and websites.

Read More