What is Social Engineering?
Social engineering is a method that threat actors can and will use to try to gain access to sensitive information. This could be passwords, sensitive documents, money, or access to locations they shouldn't have access to.
Why Does Your MSP’s Price Change From Year to Year?
It’s easy to just say “inflation” when someone asks why there’s a price increase for what seems to be the same service from one year to the next. And boy, there's truth there. But it can be more complicated than that.
Why Should You Have Endpoint Detection and Response?
Endpoint Detection and Response (EDR) has become an increasingly important tool in the cybersecurity industry, especially for businesses and organizations that require enhanced security measures.
What Are Some Common Tech Policies?
And what policies should you have for your organization? Short answer, it depends. This blog lists some common policies that are important for all companies to have. Without these policies, technology can't be aligned to any given standard. You set the policy, and then build out your standards.
Are You Overpaying for IT Managed Services?
When you’re shopping for IT services, It’s important to understand the different pricing models that MSPs and IT providers use. Not only do you want your provider to be transparent in their pricing and their model in general, but you need to know when you’re comparing providers as well.
Get Ready for Cybersecurity Month
October is just around the corner, and that means it's almost time for National Cybersecurity Awareness Month! In a world where technology is deeply integrated into our lives, cybersecurity has become more crucial than ever.
Understanding Risk and Responding Effectively
Can I eliminate risk? Not really. There's always going to be some inherent risk in everything we do. But there are different responses that you can take to reduce that risk. For instance, you can mitigate the risk by putting appropriate controls and safeguards in place to decrease the impact of that risk.
Taylor Business Group BigBIG 2023 Conference Recap
Taylor Business Group is a coaching group specifically for Managed Service Providers that really help us from an executive management standpoint. So, one of the things I wanted to do is to check out some of the executive coaching options that are out there in the industry, and Taylor Business Group has one of the better reputations.
Stop Fraud With Your Online Banking
How can you stop fraud with your online banking? Millions of dollars are stolen from small business bank accounts around the world every single month. As hackers get smarter and build new ways to break into your systems, you need to work hard to stay one step ahead of them so you don’t fall victim.
How Does Simplex-IT Handle My Support Ticket?
You can submit a support ticket in a number of different ways, give a call, send an email, use our portal. However you decide to submit it, we handle them all with the same process.
Apple's iOS 17 Update and It’s Impact on Businesses
Apple's iOS updates have been a source of excitement and anticipation for iPhone and iPad users worldwide, and the upcoming release of iOS 17 is no exception. Packed with a plethora of innovative features and improvements, this latest major release is set to redefine user experiences and interactions.
New Trend in Cloud Account Takeover, Even With MFA
The FBI's IC3 report for 2022 reported over 300,000 instances of phishing and almost 22k instances of business email compromise (compared to only 2,300 reported cases of ransomware.) Traditionally, security folks have been advocating for MFA as an effective control to reduce these risks.
Blackpoint Cyber Nashville – Recap
Last weekend I had the opportunity to attend a small gathering of MSPs at the Music City Grand Prix in Nashville. Before we get into the business stuff, I have to talk about the fun side of this event.
Demystifying Managed IT Services: Your Ultimate FAQ Guide
Are you a business owner looking to elevate your company's IT infrastructure and operations? If the term "Managed Service Provider or MSP" leaves you with more questions than answers, fret not – we've got you covered!
Recap: Cyber QP Fantastic Forum, Texas
Recently I had the opportunity to attend the Fantastic Forum Academy presented by Cyber QP. This event was focused on implementing and operationalizing the Center for Internet Security’s Critical controls. So, what did we go over?
Update on Changes Here at Simplex-IT
I wanted to take a moment to update you on some of the changes going on here at Simplex-IT. These have been in place for a couple of weeks, but now it’s time to “go public”, and we wanted you to be amongst the first to hear the news.
What are SIEM and SOAR?
SIEM, or Security Information and Event Management, is a platform that collects and stores all the logs from various sources, including firewalls, servers, endpoints, and cloud platforms, in one centralized location. This allows security teams to monitor and analyze all the logs in one place, making it easier to detect any anomalies or potential security breaches.
What Should You Do To Handle Data Privacy Updates?
Once data began going digital, authorities realized a need to protect it. Many organizations have one or more data privacy policies they need to meet. Industry and international data privacy regulations are just the tip of the iceberg. Here are a few things you should investigate to handle data privacy updates:
What is BI and How Is It Used?
BI stands for “Business Intelligence”. Like all acronyms in IT, the definition varies. But I like this definition: BI is a collection of software that allows organizations to analyze existing data and receive meaningful results.
Why Should You Have Cyber Insurance?
In today's digital age, businesses and individuals face a growing threat of cyber-attacks, data breaches, and other types of cyber incidents. These incidents can cause significant financial and reputational harm to those affected. Cyber insurance is a type of insurance designed to protect against these risks.