Bob & Patti Attend Greater Cleveland Partnership’s All In Leadership Event
Bob and Patti attended Greater Cleveland Partnership’s All In Leadership Event last week. The Greater Cleveland Partnership’s (GCP) All In Leadership Event brought together over 300 political and business leaders at The Madison in Cleveland’s AsiaTown to discuss their visions for the upcoming years.
IT Nation Learning Experiences
IT Nation Connect just wrapped up in Orlando. Normally I try to stick to the security focused conferences in the MSP space. This time around I wanted to take a step back to take a pulse on where Simplex-IT is at on the industry level as well as to look for ways to increase the value to our clients, especially around our security offerings.
Manufacturing Works Nuts and Bolts Bash
Ryan, Hayley, and I attended the Manufacturing Works Nuts and Bolts Bash on 11/17/22. We’ve been members of Manufacturing Works for years, and recently started sponsoring some of their events. It’s such a great organization and the Nuts and Bolts Bash is an annual event to raise funds for the programs they deliver throughout the year.
IT Nation First Timer!
This was my very first IT Nation! Despite the hurricane’s best efforts, I had a wonderful time and learned a lot from the breakout sessions that I attended. Being the new kid on the block, attending my first ever (huge!) IT conference was a little overwhelming at first but I soon became an information sponge.
What Does A Foundational IT Assessment Include?
Our Foundational IT Assessment covers 4 key areas of your IT: Your network, Microsoft 365, Cyber Security, Cyber Insurance. This takes about 2 hours of “run time” and we can do it remotely or on site. We don’t install any software and it’s non-invasive.
What to Know Before You Pick a Password Manager.
Password managers are amazing. These smart applications make great security easy for you and your team. They generate long random passwords for all the software you use, so you’re never tempted to reuse a password. Then, they remember these passwords for you, and even autofill logins.
How Does an Algorithm Work?
You may have heard the term “algorithm” circulated more and more lately, and like all newly emerging technologies, there are some fears and stigmas attached, some warranted, some not. But what is an algorithm? An algorithm is simply a set of instructions given to precisely define a sequence of some kind. That’s pretty much it!
Is CoMITs the Same as Co-Managed IT?
CoMITs is actually a made-up term. And I should know, since I'm the guy who made it up. Co-Managed IT is a collaborative relationship between a Managed Service Provider and the Internal IT resources for an organization. The MSP provides a ton of tools and resources for the Internal IT folks to take advantage of. We call those STMPs, which stands for “Software, Tools, Methodologies and Portals”.
Tales from Sales & Marketing - November Edition
Welcome to November, in a couple weeks we will be half way through Q4, wow! Our special offer for November is amazing! Our Foundational IT Assessment, designed to analyze your network, Cyber Insurance policy, MS 365 and your Dark Web risk, is FREE for this month only! That’s a $500 value! It’s such a great offer, and there are no strings attached.
Windows 12 is Coming… Here’s What We Know So Far
While Windows 11 is only just celebrating its first birthday, we’re already hearing our first rumors about what Windows 12 will have in store. There’s no rush for the time being – we won’t see this new operating system until the back end of 2024 – but we love to be ready for what’s coming next, so here’s what we know so far...
Simplex-IT Wins Case Weatherhead Award 2022
For the sixth year, Simplex-IT has been recognized by The Case Weatherhead awards! Yup, Simplex-IT is a winner of the Weatherhead 100 award for 2022.
What are some Common Methods of Authentication?
Ok, if you have any conversations about cyber security, you’ll hear the term “authentication.” It sounds important, but what is authentication?
Are You Really Downloading Zoom… or is it Malware?
Researchers have discovered at least six convincing-looking download sites. They’re not the real thing. They’re designed to tempt you into downloading FAKE Zoom software, containing ‘info stealers’ and other forms of malware (malicious software).
What Does Downtime Cost Your Organization?
“The Server is down.” Yeah, we hate to hear that. Because downtime is expensive. But how expensive? That’s a really important number that we ignore way too much. Downtime. Lost productivity! Unhappy customers! Shop floor at a standstill!
What To Do When Your Organization Has Been Breached?
So, what happens when your organization suffers from some kind of breach such as encryption theft or destruction? Does your organization have data backups or an incident response plan?
Android 13 is Safer For Your Business
We all use our phones for a lot more than sending messages and making the occasional call. And that means most of your staff are probably using their personal mobile for work now and then. Everyone does it.
How Can You Tell If An Email Is A Scam?
I want to show you something that we just received that is actually kind of funny. Spoiler alert it's bad guys trying to get us to give them money and we foiled it. I will show you how!
Tales from Sales & Marketing - October Edition
Welcome to October and the start of Q4 2022! Our special offer for October is a little different this month – In the spirit of Cybersecurity Month, we are keeping it a secret! Well, just for a little bit. It will be revealed during our webinar titled: Cyber Insurance: Getting the Right Coverage (and how to Reduce your Premiums) on October 11th .
Welcome Hayley
Howdy! My name is Hayley, and I just joined the Simplex-IT team as Video Producer and Editor. I recently graduated from Indiana University of Pennsylvania where I earned a degree in Communications Media with a focus in Media Production.
Make Sure Your Cloud Server Is Protected From This
When you’re using a cloud server, you must make sure it’s properly secured. A recent report has revealed cloud servers are increasingly being used as an entry point for cyber criminals to launch attacks.