What Can You Do To Keep Your Services Up to Date?
Here at Simplex-IT we’ve developed our services around an annual cycle. We consistently watch the market for emerging technologies, evaluate, and then select the best options for our clients. Each year we modify our agreements to include the appropriate new and updated services. We call this Simplex-IT Managed Services, or SiMS for short.
When Should You Use An MSP For Your Organization?
There are three areas where MSP’s often have more flexibility and potential value than an internal IT department. Let’s talk about staffing, tools and standards and future technologies.
What is Break Fix When it Comes to IT?
Break Fix is a simple concept. It's not limited to IT. The bottom line for Break Fix is this: "When it breaks...fix it. Otherwise, leave it alone." But if you get bit by just a couple break-fix vulnerabilities, the savings you think that break-fix brings are likely gone.
Are You Using a Malicious Browser Extension?
There are hundreds of thousands of browser extensions designed to help us to save time, be more productive, and personalize our online experience. And while the majority of them do what they’re supposed to, some are not designed to help you at all…
Tales from Sales & Marketing - September Edition
Is it too cliché to start out by saying where the heck did August go? Someone must have hit fast forward because I swear this month just flew by... Have you caught on to the monthly special offers we started a few months back? What do you think? This month’s is one of my favorites, mainly because we get to give away more money to all of you! We have a really great referral program in place:
What is Shadow IT?
Shadow IT is a term given to IT resources…hardware, software, subscriptions, services…that are used by an organization without the knowledge of whoever’s handling IT or cybersecurity for the organization.
Keep in mind Shadow IT isn’t necessarily evil. Or destructive. It’s…well, honestly you don’t know what it is. And that’s the problem.
Passkeys Could Improve The Way You Work, Forever
Back in May, we heard there would soon be a successor to the password – the Passkey. Now, we’re hearing that Apple will start rolling out Passkeys in the next few months in iOS 16. And we’re excited. Though it’s caused a bit of confusion.
Should Users have Admin Rights?
Every time you log onto your computer, you’re doing so with your “User Account”. That’s not just your user name and password. It’s all of the setting specific to your account. Some of it’s about how programs should behave. Some of it’s about security.
Windows 10 is Getting a Very Useful Windows 11 Feature
There’s no denying that Windows 11 has a lot of really cool new features. If you haven’t made the move from Windows 10 yet, you’re missing out. But there’s good news. To make the (eventual) move from Windows 10 to 11 a little easier, Microsoft is sharing a couple of 11’s most useful features.
DEF CON 30 Hacking Conference Recap
What I saw and experienced at DEF CON was just unbelievable. People there are hacking satellites. They are hacking biomedical devices. I saw a whole stack of voting machines torn apart so people could figure out how they work and how to hack them.
When Should You Not Use an MSP?
My dad was an insurance salesguy. From all accounts he was a pretty successful one. He liked to talk with potential clients about what would make his services a bad fit right out of the gate. So, in honor of my Dad, let’s talk about 5 reasons why your organization might not want to use an MSP for their IT support needs.
If You’re Pressured To Take Urgent Action – Stop and Think
Phishing scams are one of the biggest security threats to your business right now. A massive 83% of organizations said they suffered successful attacks last year. And with just under a third of phishing emails being opened, the chances that someone in your business will be fooled are high.
What if Managed Services Isn’t For You?
A situation where an organization can have a combination of both internal IT employees and a Managed Service Provider that is cheaper and more effective (and secure) then an exclusive use of either. There are 3 types of Co-Managed IT service agreements organizations can enter into.
Is Working From Home Good For Your Business?
But have you stopped to consider the downside to remote working? The negative elements for your business and your people? While many employees are happy to work from home using video calls and collaborative software to stay connected, there’s a small percentage who find the whole experience isolating.
Tales from Sales and Marketing
Hi there – Patti here. I head up the Sales and Marketing activity at Simplex-IT and I’m starting my own monthly update for ya. So, let’s get to it!
What Does The Global Chip Shortage Mean For Your Business?
As you push your business towards increased growth it means planning ahead more than ever before. Industry experts expect the shortage to last into next year… and it could be even longer.
Can Your Cyber Insurance Claim Be Denied?
On July 5, in court, Travelers said it would not have issued a cyber insurance policy to an electronics manufacturing services company if they knew the company was not using MFA as it said. Recently that company suffered a ransomware attack.
What are SSL Certificates?
SSL certificates are important in IT. You go visit a web site and you want to know it’s safe. That the owner is who they say they are. The data on the site itself is secure and it’s not a fake site created by a bad actor.
Why Do I Still Get Spam if I Have a Spam Folder?
The simple answer is that computers aren't perfect. The bad guys are using low-tech emails from using common email addresses from a legit email provider like Gmail or Yahoo.
Remote Workers and Cybersecurity
Remote and hybrid working is now normal for a lot of people. But a recent survey has found that, despite it being more than two years since many of us were forced to work from home, too many businesses still don’t have the right cyber security measures in place for those away from the office.