Managed Services, Article2 Patti Smerk Managed Services, Article2 Patti Smerk

Managed Service Agreements…What’s Covered? 

At Simplex-IT, we believe in building strong relationships with our clients by providing clear and transparent IT solutions that meet their unique business needs. We understand that every business is different and that's why we offer customized monthly IT agreements that cover everything required to maintain the status quo of your business operations.

Read More
Patti Smerk Patti Smerk

Recap of Ad World 2023 

I attended Ad World at the end of March, the annual online conference for digital advertising and marketing professionals. I wanted to share some of the highlights from it, particularly how AI is impacting the marketing profession, and some takeaways from Seth Godin's keynote speech.

Read More
Cybersecurity, Article2 Adam Evans, CISSP Cybersecurity, Article2 Adam Evans, CISSP

How Could Hackers Use AI?

At the end of 2022 artificial intelligence entered the mainstream with tools like ChatGPT, DALL E, and more, becoming wildly popular. As with any tool, they can be a powerful force for positive change in the world, but in the wrong hands they could cause harm. So how is AI technology empowering hackers?

Read More
Cybersecurity, Article2 Adam Evans, CISSP Cybersecurity, Article2 Adam Evans, CISSP

Is Your CEO Really Texting You?

In today’s fast-paced work environment, it’s not uncommon to receive messages and emails from colleagues and superiors requesting assistance or information. However, with the rise of cyber threats, it’s important to take a moment to pause and think before reacting to these messages, especially when they involve financial transactions or sensitive information.

Read More
Bob Coppedge Bob Coppedge

3CX New Vulnerability

3CX is a popular provider of VOIP services, and CrowdStrike has recently identified a vulnerability in the 3CX Desktop App, which affects certain versions of the installed application. The currently known affected versions are:

Read More
Cybersecurity, Article2 Adam Evans, CISSP Cybersecurity, Article2 Adam Evans, CISSP

New Microsoft Outlook Vulnerability 

Attention all Microsoft Outlook users! A new vulnerability has been revealed, and it's a pretty scary one. Essentially, a malicious entity can send an email to a user without any action on their part, and potentially obtain their password. Considering how much sensitive information is shared via email, this is a major concern.

Read More
Cybersecurity, Article2 Bob Coppedge Cybersecurity, Article2 Bob Coppedge

What is Laptop Encryption?

I just stole a laptop and took out the hard drive. I now have access to everything on it, regardless of the password used to log on. Just attach it to another computer, and I've got everything. Unless it's encrypted. Data encryption is the process of encoding data stored on your laptop so that it can only be accessed by an authorized user.

Read More
General Technology, Article2 Bob Coppedge General Technology, Article2 Bob Coppedge

How Do You Choose The Right VPN For Your Business?

Virtual Private Network (VPN) is a secure connection between two or more computers or devices that allows data to be transmitted and received over the internet without being exposed to malicious actors. It is commonly used to protect personal information, such as passwords and financial data, as well as provide access to restricted networks and websites.

Read More
Article, Cybersecurity Bob Coppedge Article, Cybersecurity Bob Coppedge

Does Microsoft Back Up Your 365 Data?

We’ve said it several times before. The last line of defense for almost all bad things in IT is a good backup. Does it make sense that your Microsoft 365 data…emails, contacts, calendars, SharePoint Online, OneDrive for Business, Teams…should absolutely be backed up and protected. Is it (I hear you cry)?

Read More
Sarah Brown Sarah Brown

Welcome Sarah!

Hi there, I’m Sarah Brown. I first joined Simplex back in 2017, and only for a couple of months. If you have access to IT Glue, then you may have seen my work. 😉 I left to pursue a different career path, but life works in mysterious ways, and I ended up back here.

Read More
Adam Evans, CISSP Adam Evans, CISSP

Right Of Boom Security Conference 2023

Recently, I had the opportunity to attend the Right Of Boom security conference down in Dallas. This conference is focused on the defensive operations that managed service providers should be taking in order to respond to the ever evolving threat landscape. I left this conference with a ton of ideas to increase the security posture for our clients, but also to be better prepared in the event of a security incident.

Read More
Adam Evans, CISSP Adam Evans, CISSP

Zero Trust World Conference 2023

Recently I had the opportunity to attend Zero Trust World in Orlando. This was an excellent security centric conference for Managed Service Providers. The focus of this conference was on defensive security practices, including the concept of Zero Trust. Over the course of two days, we had the opportunity to see some of the offensive tradecraft used by attackers and methods defenders can use to protect their environments.

Read More
Cassie Riebau Cassie Riebau

Announcing The Launch of Our Podcast: Biz-Tech Twists!

Exciting news for all the business and technology enthusiasts out there! Biz-Tech Twists, a new podcast, is set to launch on March 1, 2023. This podcast promises to offer a unique perspective on the intersection of business and technology. 

Read More
Bob Coppedge Bob Coppedge

What is Cloud Computing?

Traditional on-premises is the server that is in your basement closet. Where you are responsible for everything. So it is like you are making a pizza from scratch at home. You are responsible for everything like the table, soda, electricity, and everything down to the toppings.

Read More
Patti Smerk Patti Smerk

What Are the Pros and Cons of Outsourcing IT Services?

Outsourcing IT services is becoming increasingly popular among businesses of all sizes. It can be a great way to save money, reduce overhead costs, and access specialized expertise. However, there are also potential drawbacks to outsourcing IT services that should be considered before making the decision.

Read More