
Learning Center Video Library
Our Learning Center Video Library is designed to provide answers to our most frequently asked questions. Since we have so many videos, we have separated them out into categories to help you navigate to the video that will best answer your questions. We also have a search feature on each page.
In today's digital age, businesses face an increasing number of cyber threats. That's why Endpoint Detection and Response (EDR) is becoming a crucial tool for companies looking to stay ahead of hackers. But what exactly is EDR, and why do businesses need it? In this video, we break down the fundamentals of EDR, explain how it works, and show you why it's a must-have.
In today's digital age, businesses face an increasing number of cyber threats. That's why Endpoint Detection and Response (EDR) is becoming a crucial tool for companies looking to stay ahead of hackers. But what exactly is EDR, and why do businesses need it? In this video, we break down the fundamentals of EDR, explain how it works, and show you why it's a must-have.
Visit our Learning Center to view more videos!
In this video, we provide a comprehensive guide to help businesses manage a cyberattack effectively. Acting methodically after a data breach is crucial to protect your business and reduce future risks. Whether you have a plan in place or are starting from scratch, this video gives you actionable steps to respond to a cyberattack effectively.
In this video, we provide a comprehensive guide to help businesses manage a cyberattack effectively. Acting methodically after a data breach is crucial to protect your business and reduce future risks. Whether you have a plan in place or are starting from scratch, this video gives you actionable steps to respond to a cyberattack effectively.
Visit our Learning Center to view more videos!
At its core, Bluetooth is a wireless technology that enables devices to communicate over short distances, acting like an invisible cable connecting your phone, headphones, or car stereo. It facilitates seamless data transfers, such as music or files, without the need for physical connections.
At its core, Bluetooth is a wireless technology that enables devices to communicate over short distances, acting like an invisible cable connecting your phone, headphones, or car stereo. It facilitates seamless data transfers, such as music or files, without the need for physical connections.
Visit our Learning Center to view more videos!
Why is survey feedback so important to Simplex-IT? You’ve likely seen the post-service survey pop up after closing a ticket — but have you ever wondered why it matters? The truth is, your feedback helps us improve! Whether it's positive, negative, or neutral, every comment is read and used to better our service to you.
Why is survey feedback so important to Simplex-IT? You’ve likely seen the post-service survey pop up after closing a ticket — but have you ever wondered why it matters? The truth is, your feedback helps us improve! Whether it's positive, negative, or neutral, every comment is read and used to better our service to you.
Visit our Learning Center to view more videos!
While most people have heard of IP addresses, many aren’t aware of the crucial distinctions between public and private IPs. A public IP address is your device’s unique identifier on the internet, and visible to the world. In contrast, a private IP address is used within a local network.
While most people have heard of IP addresses, many aren’t aware of the crucial distinctions between public and private IPs. A public IP address is your device’s unique identifier on the internet, assigned by your Internet Service Provider (ISP), and visible to the world. In contrast, a private IP address is used within a local network.
Visit our Learning Center to view more videos!
Effectively prompting AI is crucial for getting the results you want, and it’s more than just typing in a simple question or request. To get tailored, accurate responses, it's important to craft your AI prompts with clarity and structure.
Effectively prompting AI is crucial for getting the results you want, and it’s more than just typing in a simple question or request. To get tailored, accurate responses, it's important to craft your AI prompts with clarity and structure.
Visit our Learning Center to view more videos!
If you’re relying on just a username and password, your business is at risk. Multi-Factor Authentication (MFA) is a game-changer in cybersecurity, adding an extra layer of protection to keep unauthorized users out. In this video, we’ll explain what MFA is, and why it’s essential.
If you’re relying on just a username and password, your business is at risk. Multi-Factor Authentication (MFA) is a game-changer in cybersecurity, adding an extra layer of protection to keep unauthorized users out. In this video, we’ll explain what MFA is, and why it’s essential.
Visit our Learning Center to view more videos!
The temptation to cut costs by purchasing low-priced IT products is common, especially for businesses trying to stick to a budget. But while saving money upfront might seem like a win, the truth is that opting for the cheapest IT products can end up costing your business more in the long run.
The temptation to cut costs by purchasing low-priced IT products is common, especially for businesses trying to stick to a budget. But while saving money upfront might seem like a win, the truth is that opting for the cheapest IT products can end up costing your business more in the long run.
Visit our Learning Center to view more videos!
Windows 11 launched in October 2021 with several exciting changes, including a modern, streamlined design and performance improvements. Windows 10 remains supported until October 2025, but after that, Microsoft will no longer provide security updates or bug fixes.
Windows 11 launched in October 2021 with several exciting changes, including a modern, streamlined design and performance improvements. Windows 10 remains supported until October 2025, but after that, Microsoft will no longer provide security updates or bug fixes.
Visit our Learning Center to view more videos!
In today’s digital landscape, cyber threats are everywhere—from ransomware attacks to data breaches, and everything in between. Businesses of all sizes are under constant threat of these costly incidents, so how do you prepare for the worst? This is where cyber insurance comes into play.
In today’s digital landscape, cyber threats are everywhere—from ransomware attacks to data breaches, and everything in between. Businesses of all sizes are under constant threat of these costly incidents, so how do you prepare for the worst? This is where cyber insurance comes into play.
Visit our Learning Center to view more videos!
Are you wondering if you can continue using OST and PST files in the new Microsoft Outlook? Historically, these file types were used by Microsoft Outlook to store data locally (PST files) or synchronize with the cloud (OST files). However, with the transition to Outlook 365, Microsoft has moved away from these older formats.
Are you wondering if you can continue using OST and PST files in the new Microsoft Outlook? Historically, these file types were used by Microsoft Outlook to store data locally (PST files) or synchronize with the cloud (OST files). However, with the transition to Outlook 365, Microsoft has moved away from these older formats.
Visit our Learning Center to view more videos!
2024 has been an incredible year for Simplex-IT, filled with achievements, milestones, and memories worth celebrating. We’re proud of the hard work, dedication, and support from our fantastic team, clients, and partners that made this year unforgettable. Here’s to an even bigger and better 2025! Join us as we recap the highlights of our year.
2024 has been an incredible year for Simplex-IT, filled with achievements, milestones, and memories worth celebrating. We’re proud of the hard work, dedication, and support from our fantastic team, clients, and partners that made this year unforgettable. Here’s to an even bigger and better 2025! Join us as we recap the highlights of our year.
Visit our Learning Center to view more videos!
Wondering why Bob isn't hogging the spotlight in Simplex-IT's videos anymore? Well, here's the scoop: Bob was the face of our videos for a while, but the truth is, Simplex-IT isn’t "The Bob Show"—and trust us, nobody wants that. We’ve got a whole team of brilliant people and now they’re stepping up to share their expertise on camera.
Wondering why Bob isn't hogging the spotlight in Simplex-IT's videos anymore? Well, here's the scoop: Bob was the face of our videos for a while, but the truth is, Simplex-IT isn’t "The Bob Show"—and trust us, nobody wants that. We’ve got a whole team of brilliant people and now they’re stepping up to share their expertise on camera.
Visit our Learning Center to view more videos!
Social engineering is a type of cyberattack that relies on psychological manipulation rather than advanced hacking tools. Hackers use these tactics to trick individuals into revealing sensitive information. This video explains how social engineering works, common tactics used by attackers, and why business owners should care.
Social engineering is a type of cyberattack that relies on psychological manipulation rather than advanced hacking tools. Hackers use these tactics to trick individuals into revealing sensitive information. This video explains how social engineering works, common tactics used by attackers, and why business owners should care.
Visit our Learning Center to view more videos!
Is Microsoft forcing you to switch to the new Outlook? Yes, starting January 2025, the classic version of Outlook is getting a makeover—whether you like it or not. Here's what you need to know, including tips to navigate the transition smoothly, and if there are features you're missing or you just like the old version, how you can go back and forth to your heart's content.
Is Microsoft forcing you to switch to the new Outlook? Yes, starting January 2025, the classic version of Outlook is getting a makeover—whether you like it or not. Here's what you need to know, including tips to navigate the transition smoothly, and if there are features you're missing or you just like the old version, you can go back and forth to your heart's content.
Visit our Learning Center to view more videos.
Industrial Internet of Things (IIoT) refers to the use of smart sensors, devices, and systems in industrial environments to collect and analyze data in real-time. Unlike the consumer-focused IoT (Internet of Things), IIoT is designed specifically to improve efficiency, safety, and productivity in sectors like manufacturing, energy, and transportation.
Industrial Internet of Things (IIoT) refers to the use of smart sensors, devices, and systems in industrial environments to collect and analyze data in real-time. Unlike the consumer-focused IoT (Internet of Things), IIoT is designed specifically to improve efficiency, safety, and productivity in sectors like manufacturing, energy, and transportation.
Visit our Learning Center to view more videos!
Is outsourcing IT management a smart move or a risky decision for your business? The answer depends on your specific needs and circumstances. While outsourcing can provide major advantages such as cost savings, access to specialized expertise, and the ability to focus on your core operations, it’s not without potential drawbacks.
Is outsourcing IT management a smart move or a risky decision for your business? The answer depends on your specific needs and circumstances. While outsourcing can provide major advantages such as cost savings, access to specialized expertise, and the ability to focus on your core operations, it’s not without potential drawbacks.
Visit our Learning Center to view more videos!
Time is running out! If you’re still using Windows 7, Windows 8.1, Windows Server 2008 R2, or Windows SBS 2011, this is your wake-up call. After March 31 2025, these operating systems will no longer receive critical security updates, leaving them vulnerable to cyber threats and exposing your business to potential risks.
Time is running out! If you’re still using Windows 7, Windows 8.1, Windows Server 2008 R2, or Windows SBS 2011, this is your wake-up call. After March 31 2025, these operating systems will no longer receive critical security updates, leaving them vulnerable to cyber threats and exposing your business to potential risks.
Visit our Learning Center to view more videos!
Business critical devices are the essential IT hardware that keeps your business running smoothly. Whether you're a business owner or IT professional, understanding these devices can help you mitigate risks, avoid costly downtime, and ensure your operations stay up and running.
Business critical devices are the essential IT hardware that keeps your business running smoothly. Whether you're a business owner or IT professional, understanding these devices can help you mitigate risks, avoid costly downtime, and ensure your operations stay up and running.
Visit our Learning Center to view more videos!
In this video, we explore the difference between cloud redundancy and traditional backups. Cloud providers like Microsoft, Google, and Amazon use redundancy to store your data across multiple servers and locations, protecting it from hardware failures and technical issues. But redundancy alone doesn’t equate to a full backup.
In this video, we explore the difference between cloud redundancy and traditional backups. Cloud providers like Microsoft, Google, and Amazon use redundancy to store your data across multiple servers and locations, protecting it from hardware failures and technical issues. But redundancy alone doesn’t equate to a full backup.
Visit our Learning Center to view more videos!
Ever wondered how the internet evolved into what it is today? From its early days as a military experiment to becoming an integral part of our daily lives, the internet has come a long way! In this video, we take you on a fascinating journey through the history of the internet, covering key milestones.
Ever wondered how the internet evolved into what it is today? From its early days as a military experiment to becoming an integral part of our daily lives, the internet has come a long way! In this video, we take you on a fascinating journey through the history of the internet, covering key milestones.
Visit our Learning Center to view more videos.
Curious about what a hard disk drive (HDD) is and how it works? In this video, we break down the basics of HDDs—an essential storage device for computers and electronics. Learn how HDDs store and retrieve data using spinning platters and magnetic heads, and discover the advantages of using HDDs for large-scale data storage.
Curious about what a hard disk drive (HDD) is and how it works? In this video, we break down the basics of HDDs—an essential storage device for computers and electronics. Learn how HDDs store and retrieve data using spinning platters and magnetic heads, and discover the advantages of using HDDs for large-scale data storage.
Visit our Learning Center to view more videos!
A solid-state drive (SSD) is a data storage device known for its speed, reliability, and efficiency. Unlike HDDs that use spinning disks, SSDs rely on flash memory chips to store data. This key difference results in faster performance and enhanced durability.
A solid-state drive (SSD) is a data storage device known for its speed, reliability, and efficiency. Unlike HDDs that use spinning disks, SSDs rely on flash memory chips to store data. This key difference results in faster performance and enhanced durability.
Visit our Learning Center to view more videos.
In today's digital age, choosing between cloud storage and local storage is crucial for managing and securing your data. With the ever-evolving cyberthreat landscape, understanding the key differences between these storage methods can help you make informed decisions.
In today's digital age, choosing between cloud storage and local storage is crucial for managing and securing your data. With the ever-evolving cyberthreat landscape, understanding the key differences between these storage methods can help you make informed decisions.
Visit our Learning Center to view more videos.
A Foundational IT Assessment is a critical step to ensure your business’s technology is secure, optimized, and prepared for the future. This non-invasive assessment covers four essential areas and around 50 detailed reports, with clear, actionable insights on how to improve your IT from both a business and security perspective.
A Foundational IT Assessment is a critical step to ensure your business’s technology is secure, optimized, and prepared for the future. This non-invasive assessment covers four essential areas and around 50 detailed reports, with clear, actionable insights on how to improve your IT from both a business and security perspective.
Visit our Learning Center to view more videos!
Feeling overwhelmed by a mountain of data and unsure where to start? You're not alone. This common issue, known as decision paralysis, can affect even the most seasoned professionals. Fortunately, Microsoft Copilot is here to help! What is Microsoft Copilot? Microsoft Copilot, integrated into Microsoft 365, acts as a virtual data expert
Feeling overwhelmed by a mountain of data and unsure where to start? You're not alone. This common issue, known as decision paralysis, can affect even the most seasoned professionals. Fortunately, Microsoft Copilot is here to help!What is Microsoft Copilot? Microsoft Copilot, integrated into Microsoft 365, acts as a virtual data expert
Visit our Learning Center to view more videos!
In today’s remote work world, accessing company data securely is more important than ever. But what’s the best way to do that—especially when you’re moving away from traditional office setups? Enter Microsoft’s Azure Virtual Desktop (AVD) and Windows 365. Both offer cloud-based workstations, but how do they differ?
In today’s remote work world, accessing company data securely is more important than ever. But what’s the best way to do that—especially when you’re moving away from traditional office setups? Enter Microsoft’s Azure Virtual Desktop (AVD) and Windows 365. Both offer cloud-based workstations, but how do they differ?
Visit our Learning Center to view more videos!
SMS is a text messaging service that allows the exchange of short messages—up to 160 characters—between mobile devices using cellular networks. Unlike messaging apps, SMS doesn’t require internet access; it only needs a cellular signal. This makes SMS incredibly useful in areas with poor or no internet coverage
SMS is a text messaging service that allows the exchange of short messages—up to 160 characters—between mobile devices using cellular networks. Unlike messaging apps, SMS doesn’t require internet access; it only needs a cellular signal. This makes SMS incredibly useful in areas with poor or no internet coverage
Visit our Learning Center to view more videos!
In today's digital landscape, securing sensitive information is more crucial than ever. You've likely heard the term "Multifactor Authentication" (MFA) multiple times, but what exactly does it mean, and why is it so important? In this video, we break down the different types of MFA—knowledge, possession, inherence, and location.
In today's digital landscape, securing sensitive information is more crucial than ever. You've likely heard the term "Multifactor Authentication" (MFA) multiple times, but what exactly does it mean, and why is it so important? In this video, we break down the different types of MFA—knowledge, possession, inherence, and location.
Visit our Learning Center to view more videos!
XML, or Extensible Markup Language, is a flexible and structured language designed for storing and transporting data. Unlike HTML, which focuses on displaying data, XML is all about the data itself. It uses tags to define different parts of the data, and the best part? You can define your own tags, making XML incredibly extensible.
XML, or Extensible Markup Language, is a flexible and structured language designed for storing and transporting data. Unlike HTML, which focuses on displaying data, XML is all about the data itself. It uses tags to define different parts of the data, and the best part? You can define your own tags, making XML incredibly extensible.
Visit our Learning Center to view more videos!
If you've been an IT client of ours for a while, you've probably asked yourself, "how does our windows patching work? There have been some questions about Windows Patching, especially about that little popup that shows up on your screen. Here’s the deal.
If you've been an IT client of ours for a while, you've probably asked yourself, "how does our windows patching work? There have been some questions about Windows Patching, especially about that little popup that shows up on your screen. Here’s the deal.
Visit our Learning Center to view more videos!
Missed our AI Showcase? Catch up on the key moments from the event! Attendees gained valuable insights into how AI can be leveraged to solve real business challenges, enhance decision-making, and unlock new opportunities.
Missed our AI Showcase? Catch up on the key moments from the event! Attendees gained valuable insights into how AI can be leveraged to solve real business challenges, enhance decision-making, and unlock new opportunities.
Visit our Learning Center to view more videos!
Are shiny new tech tools draining your business profits instead of boosting them? Investing in advanced technology promises increased efficiency and a competitive edge, but without proper employee training and change management, it can lead to costly mistakes and decreased productivity.
Are shiny new tech tools draining your business profits instead of boosting them? Investing in advanced technology promises increased efficiency and a competitive edge, but without proper employee training and change management, it can lead to costly mistakes and decreased productivity.
Visit our Learning Center to view more videos!
Simplex-IT specializes in delivering tailored IT solutions to businesses, with a strong focus on Managed Services and Co-Managed IT. Our Managed Services are ideal for organizations without an internal IT department and for those with an internal IT team, our Co-Managed IT services provides a flexible partnership.
Simplex-IT specializes in delivering tailored IT solutions to businesses, with a strong focus on Managed Services and Co-Managed IT. Our Managed Services are ideal for organizations without an internal IT department and for those with an internal IT team, our Co-Managed IT services provides a flexible partnership.
Visit our Learning Center to view more videos!
In this video, we explore Business Email Compromise (BEC), a modern-day digital con game posing a significant risk to organizations of all sizes. Learn how cybercriminals gain access to corporate email accounts and use them to conduct unauthorized transactions or extract sensitive information.
In this video, we explore Business Email Compromise (BEC), a modern-day digital con game posing a significant risk to organizations of all sizes. Learn how cybercriminals gain access to corporate email accounts and use them to conduct unauthorized transactions or extract sensitive information.
Visit our Learning Center to view more videos!
In today's digital world, smooth IT operations are crucial for businesses, but interruptions can pose challenges. High Availability addresses this by ensuring IT systems operate continuously and reliably, even during failures or heavy usage.
In today's digital world, smooth IT operations are crucial for businesses, but interruptions can pose challenges. High Availability addresses this by ensuring IT systems operate continuously and reliably, even during failures or heavy usage.
Visit our Learning Center to view more videos!
Explore how Microsoft is transforming small and medium-sized business productivity with Copilot for Microsoft 365! Initially exclusive to larger enterprises, Copilot is now available to businesses of all sizes using Microsoft 365 Business Standard or Business Premium.
Explore how Microsoft is transforming small and medium-sized business productivity with Copilot for Microsoft 365! Initially exclusive to larger enterprises, Copilot is now available to businesses of all sizes using Microsoft 365 Business Standard or Business Premium.
Visit our Learning Center to view more videos!
Discover the latest AI innovations in Microsoft Copilot and how they're revolutionizing productivity in Microsoft 365. From Word to Excel, PowerPoint to Teams, Copilot integrates smart features that enhance collaboration and efficiency. Learn how Copilot accelerates document creation
Discover the latest AI innovations in Microsoft Copilot and how they're revolutionizing productivity in Microsoft 365. From Word to Excel, PowerPoint to Teams, Copilot integrates smart features that enhance collaboration and efficiency. Learn how Copilot accelerates document creation
Visit our Learning Center to view more videos!
Every year, Simplex-IT hosts an epic anniversary celebration at Quarter Up Arcade Bar, and this year was no different. We had a fantastic time with drink tickets, delicious appetizers, and a great mix of clients, new faces, and old friends. A huge shoutout to the amazing Quarter Up staff for making this event memorable!
Every year, Simplex-IT hosts an epic anniversary celebration at Quarter Up Arcade Bar, and this year was no different. We had a fantastic time with drink tickets, delicious appetizers, and a great mix of clients, new faces, and old friends. A huge shoutout to the amazing Quarter Up staff for making this event memorable!
Visit our Learning Center to view more videos!
Discover the details behind the recent Microsoft outage linked to a CrowdStrike update. Bob Coppedge, CEO of Simplex-IT, breaks down the global impact, affecting airlines, businesses, and emergency services. Learn what this outage means for your organization and the steps you need to take to stay protected.
Discover the details behind the recent Microsoft outage linked to a CrowdStrike update. Bob Coppedge, CEO of Simplex-IT, breaks down the global impact, affecting airlines, businesses, and emergency services. Learn what this outage means for your organization and the steps you need to take to stay protected.
Visit our Learning Center to view more videos!
When evaluating the cost comparison between hiring internal IT staff versus outsourcing IT services to a managed service provider (MSP), several factors come into play. Here’s a breakdown of the key considerations- Salaries and Benefits, Training costs, Office Space and Equipment and more.
When evaluating the cost comparison between hiring internal IT staff versus outsourcing IT services to a managed service provider (MSP), several factors come into play. Here’s a breakdown of the key considerations- Salaries and Benefits, Training costs, Office Space and Equipment and more.
Visit our Learning Center to view more videos!
Imagine a business ecosystem where devices, machines, and systems interact seamlessly to perform various tasks. By connecting these devices to the internet, they can communicate, collect data, and make autonomous decisions. This interconnected network is what we call the Internet of Things (IoT). How Does IoT Work?
Imagine a business ecosystem where devices, machines, and systems interact seamlessly to perform various tasks. By connecting these devices to the internet, they can communicate, collect data, and make autonomous decisions. This interconnected network is what we call the Internet of Things (IoT). How Does IoT Work?
Visit our Learning Center to view more videos!
A Secure Email Gateway is a specialized software solution designed to monitor, filter, and protect email traffic entering and leaving an organization's ecosystem. It serves as a virtual checkpoint, sorting through every email to identify and neutralize potential threats before they reach their intended recipients.
A Secure Email Gateway is a specialized software solution designed to monitor, filter, and protect email traffic entering and leaving an organization's ecosystem. It serves as a virtual checkpoint, sorting through every email to identify and neutralize potential threats before they reach their intended recipients.
Visit our Learning Center to view more videos!
Microsoft Security Copilot is a generative AI-powered security solution. It provides tailored insights that empower your team to defend your network. It also works with other Microsoft security products. Microsoft Security Copilot helps security teams respond to cyber threats, process signals, and assess risk exposure.
Microsoft Security Copilot is a generative AI-powered security solution. It provides tailored insights that empower your team to defend your network. It also works with other Microsoft security products. Microsoft Security Copilot helps security teams respond to cyber threats, process signals, and assess risk exposure.
Visit our Learning Center to view more videos!
In the ever-evolving world of technology, securing our wireless networks is crucial to protecting our data and privacy. If you've ever wondered about those cryptic acronyms like WPA, WPA2, and WPA3, this video is here to help you understand the basics of wireless security.
In the ever-evolving world of technology, securing our wireless networks is crucial to protecting our data and privacy. If you've ever wondered about those cryptic acronyms like WPA, WPA2, and WPA3, this video is here to help you understand the basics of wireless security.
Visit our Learning Center to view more videos!
You just submitted a service ticket and don’t know what’s next. Here’s what you can expect: Throughout the life of your ticket, you’ll receive emails when the ticket is updated. Sometimes these updates are automatically generated, and other times they are messages from real life technicians.
You just submitted a service ticket and don’t know what’s next. Here’s what you can expect: Throughout the life of your ticket, you’ll receive emails when the ticket is updated. Sometimes these updates are automatically generated, and other times they are messages from real life technicians
Visit our Learning Center to view more videos!
Think of the browser cache as a temporary memory storage system. When you visit a website for the first time, your browser downloads all the necessary files needed to display the webpage properly. These files can include HTML documents, images, CSS stylesheets, JavaScript files, and more.
Think of the browser cache as a temporary memory storage system. When you visit a website for the first time, your browser downloads all the necessary files needed to display the webpage properly. These files can include HTML documents, images, CSS stylesheets, JavaScript files, and more.
Visit our Learning Center to view more videos!
A smart city is a city that uses technology and data to improve the lives of its residents and make urban living more efficient, sustainable, and enjoyable. But what makes the city "smart?" and while technology improvements offer many benefits, what are the potential issues if safety measures aren't in place?
A smart city is a city that uses technology and data to improve the lives of its residents and make urban living more efficient, sustainable, and enjoyable. But what makes the city "smart?" and while technology improvements offer many benefits, what are the potential issues if safety measures aren't in place?
Visit our Learning Center to view more videos.
QR codes are everywhere nowadays, right? You see them on menus, posters, flyers—pretty much everywhere. They're super handy too! Just whip out your phone, snap a pic, and bam! You're directed to a link, a discount, or even a video. But hold up, there's a sneaky side to these little squares.
QR codes are everywhere nowadays, right? You see them on menus, posters, flyers—pretty much everywhere. They're super handy too! Just whip out your phone, snap a pic, and bam! You're directed to a link, a discount, or even a video. But hold up, there's a sneaky side to these little squares.
Visit our Learning Center to view more videos!
Cybersecurity Training. Simulated Phishing. It's included with your Model '23 and '24 agreement. Learn how to track your employees and see if they're clicking where they shouldn't. This isn't just another training tool. It's a dynamic solution designed to engage and empower your team members with concise, entertaining videos packed with actionable insights.
Cybersecurity Training. Simulated Phishing. It's included with your Model '23 and '24 agreement. Learn how to track your employees and see if they're clicking where they shouldn't. This isn't just another training tool. It's a dynamic solution designed to engage and empower your team members with concise, entertaining videos packed with actionable insights.
Visit our Learning Center to view more videos!
Ransomware is a type of malware that hackers use to encrypt your files or lock you out of your own computer or device. Once your files are encrypted or your device is locked, the cybercriminals demand a ransom payment from you, usually in cryptocurrency like Bitcoin, in exchange for the key or code to unlock your files or device.
Ransomware is a type of malware that hackers use to encrypt your files or lock you out of your own computer or device. Once your files are encrypted or your device is locked, the cybercriminals demand a ransom payment from you, usually in cryptocurrency like Bitcoin, in exchange for the key or code to unlock your files or device.
Visit our Learning Center to view more videos.
Innovation debt, also known as technical debt, is a term used to describe the costs that companies and organizations incur when they delay investing in new technologies or ideas that can help them remain competitive.
Innovation debt, also known as technical debt, is a term used to describe the costs that companies and organizations incur when they delay investing in new technologies or ideas that can help them remain competitive.
Visit our Learning Center to view more videos!
Submitting a service ticket is an important part of working with your IT provider, but it shouldn’t be complicated! Here at Simplex-IT we have an easy process for you! So how do you submit a service ticket? There are three options.
Submitting a service ticket is an important part of working with your IT provider, but it shouldn’t be complicated! Here at Simplex-IT we have an easy process for you! So how do you submit a service ticket? There are three options.
Visit our Learning Center to view more videos!
What is the difference between 3G, 4G, 5G? Let's break down the differences between 3G, 4G, and 5G in a simple way, without getting too technical. 3G was the third generation of mobile networks, providing faster data transfer speeds compared to its predecessor, 2G.
What is the difference between 3G, 4G, 5G? Let's break down the differences between 3G, 4G, and 5G in a simple way, without getting too technical. 3G was the third generation of mobile networks, providing faster data transfer speeds compared to its predecessor, 2G.
Visit our Learning Center to view more videos!
Bob explains the power of Bigger Brains' extensive library of over 200 eLearning courses, focusing on essential business productivity tools such as Microsoft 365, Excel, Outlook, Teams, and is tailored for professionals at all levels. Take you and your team’s skills to the next level
Bob explains the power of Bigger Brains' extensive library of over 200 eLearning courses, focusing on essential business productivity tools such as Microsoft 365, Excel, Outlook, Teams, and is tailored for professionals at all levels. Take you and your team’s skills to the next level by assigning courses & learning paths with this invaluable tool. The best part? It’s included with your Simplex-IT Model '23 and/or '24 services!
Visit our Learning Center to view more videos!
A Single Point of Failure is a potential risk caused by a flaw in the design, implementation, or configuration of a system. It’s the one fault that can shut down an entire system. This could be in your cybersecurity, networking, and similar aspects.
A Single Point of Failure is a potential risk caused by a flaw in the design, implementation, or configuration of a system. It’s the one fault that can shut down an entire system. This could be in your cybersecurity, networking, and similar aspects.
Visit our Learing Center to view more videos.
Wondering what to do with your eclipse glasses now that the eclipse is over?
Check out the website: astronomerswithoutborders.org
Wondering what to do with your eclipse glasses now that the eclipse is over?
Check out the website: astronomerswithoutborders.org
Visit our Learning Center to view more videos!
So you have a computer, and you want to do various tasks like writing documents, browsing the internet, or playing games. To make these tasks possible, your computer needs something to manage and coordinate all the different parts inside it. This is where the operating system (OS) comes in.
So you have a computer, and you want to do various tasks like writing documents, browsing the internet, or playing games. To make these tasks possible, your computer needs something to manage and coordinate all the different parts inside it. This is where the operating system (OS) comes in.
Visit our Learning Center to view more videos!
Missed out on the incredible evening at Missing Falls Brewery? Don't worry! We've got you covered with an exclusive recap of the event that brought together cybersecurity experts, beer enthusiasts, and eclipse enthusiasts! A heartfelt thank you to all who joined us for this incredible event!
Missed out on the incredible evening at Missing Falls Brewery? Don't worry! We've got you covered with an exclusive recap of the event that brought together cybersecurity experts, beer enthusiasts, and eclipse enthusiasts! A heartfelt thank you to all who joined us for this incredible event!
Visit our Learning Center to view more videos!
Ever received a "Firmware update available" notification and wondered what you're actually updating? In this video, we break down the concept of firmware, the unsung hero embedded in our devices. Firmware is a specialized type of software embedded in hardware devices, dictating how they function.
Ever received a "Firmware update available" notification and wondered what you're actually updating? In this video, we break down the concept of firmware, the unsung hero embedded in our devices. Firmware is a specialized type of software embedded in hardware devices, dictating how they function.
Visit our Learning Center to view more videos!
Network monitoring is the process of observing and analyzing the traffic and behavior of computer networks to ensure they are performing optimally and securely. They make sure everything is in order and there are no suspicious activities or potential threats.
Network monitoring is the process of observing and analyzing the traffic and behavior of computer networks to ensure they are performing optimally and securely. They make sure everything is in order and there are no suspicious activities or potential threats.
Pleae visit our Learning Center to view more videos!
Announcing Simplex-IT’s new AI service. AI has been all the buzz lately so we figured we would jump on the bandwagon and add on a new service for all of our clients. Don’t worry if you’re not already a client, for today only you can add this once in a lifetime service on to any agreement at no additional cost, just use the code APRIL FOOLS.
Announcing Simplex-IT’s new AI service. AI has been all the buzz lately so we figured we would jump on the bandwagon and add on a new service for all of our clients. Don’t worry if you’re not already a client, for today only you can add this once in a lifetime service on to any agreement at no additional cost, just use the code APRIL FOOLS.
Visit our Learning Center for more videos!
DKIM, DomainKeys Identified Mail, is used to authenticate an email. It uses a digital signature to let the email recipient know the message and content of the email was authorized by the domain owner. How does DKIM work? Actually it's fairly complicated in terms of generating public and private keys in order to verify the content of your email.
DKIM, DomainKeys Identified Mail, is used to authenticate an email. It uses a digital signature to let the email recipient know the message and content of the email was authorized by the domain owner. How does DKIM work? Actually it's fairly complicated in terms of generating public and private keys in order to verify the content of your email.
Visit our Learning Center to view more videos!
In this webinar, we will show you the basics of Keeper, a security vault that allows you to securely access and manage your passwords across devices. Kurt and Bob will tell you how to use this tool to increase security on your accounts without having to memorize dozens of complicated passwords. Keeper is included for your management team in our new Model Year ’24 agreement!
In this webinar, we will show you the basics of Keeper, a security vault that allows you to securely access and manage your passwords across devices. Kurt and Bob will tell you how to use this tool to increase security on your accounts without having to memorize dozens of complicated passwords. Keeper is included for your management team in our new Model Year ’24 agreement!
Visit our Learning Center to view more videos!
Sophos MDR expert, Christopher Glick, gives an eye-opening session on Managed Detection and Response (MDR). Picture this: a fully managed 24/7 service delivered by top-notch experts who constantly detect and respond to cyberattacks targeting every facet of your digital infrastructure.
Sophos MDR expert, Christopher Glick, gives an eye-opening session on Managed Detection and Response (MDR). Picture this: a fully managed 24/7 service delivered by top-notch experts who constantly detect and respond to cyberattacks targeting every facet of your digital infrastructure.
Visit our Learning Center to view more videos!
Sender Policy Framework (SPF) is an email authentication protocol designed to prevent email spoofing and spam. It restricts who can use an organization's domain as the sender of the email. In most phishing attacks, threat actors usually spoof the sender's email address to look official. SPF prevents that from being received.
Sender Policy Framework (SPF) is an email authentication protocol designed to prevent email spoofing and spam. It restricts who can use an organization's domain as the sender of the email. In most phishing attacks, threat actors usually spoof the sender's email address to look official. SPF prevents that from being received.
Visit our Learning Center to view more videos!
Today is one of our favorite holidays – it's Pi Day! For those of you who don't know, March 14th is Pi Day and celebrates the famous never-ending number. And since we're a bunch of IT nerds, we take this day very seriously. Every year on Pi Day, we take the time to thank our clients and some other local businesses by delivering a pie to their offices.
Today is one of our favorite holidays – it's Pi Day! For those of you who don't know, March 14th is Pi Day and celebrates the famous never-ending number. And since we're a bunch of IT nerds, we take this day very seriously. Every year on Pi Day, we take the time to thank our clients and some other local businesses by delivering a pie to their offices.
Visit our Learnng Center for more videos!
DMARC, Domain-based Message Authentication, Reporting & Conformance, is an email security protocol that verifies email senders by building on the DNS services and the SPF, and DKIM protocols. It was created to block the threat of email spoofing, domain spoofing, email phishing, business email compromise, and other email-based attacks.
DMARC, Domain-based Message Authentication, Reporting & Conformance, is an email security protocol that verifies email senders by building on the DNS services and the SPF, and DKIM protocols. It was created to block the threat of email spoofing, domain spoofing, email phishing, business email compromise, and other email-based attacks.
Visit our Learning Center to view more videos!
Domain-based Message Authentication, Reporting & Conformance. It’s actually a 4 letter acronym that really takes advantage of a 3 letter and a 4 letter acronym, SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail). So together we have an 11 letter acronym. And if you want emails from your company to be safely delivered, better pay attention.
Domain-based Message Authentication, Reporting & Conformance. It’s actually a 4 letter acronym that really takes advantage of a 3 letter and a 4 letter acronym, SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail). So together we have an 11 letter acronym. And if you want emails from your company to be safely delivered, better pay attention.
Visit our Learning Center to view more videos!
RAM, or Random Access Memory, is a dynamic player in the world of computer memory. Unlike storage devices, RAM is volatile and acts as the computer's short-term memory, storing actively used and processed data. Imagine your computer's RAM as a desk – the larger it is, the more tasks and processes it can handle simultaneously.
RAM, or Random Access Memory, is a dynamic player in the world of computer memory. Unlike storage devices, RAM is volatile and acts as the computer's short-term memory, storing actively used and processed data. Imagine your computer's RAM as a desk – the larger it is, the more tasks and processes it can handle simultaneously.
Visit our Learning Center to view more videos!
An insider threat refers to the risk or potential harm posed to an organization's data, systems, or security by individuals who have authorized access to the organization's resources. These individuals could be current/ former employees, contractors, or business partners…
An insider threat refers to the risk or potential harm posed to an organization's data, systems, or security by individuals who have authorized access to the organization's resources. These individuals could be current/ former employees, contractors, or business partners who possess knowledge, privileges, and/or access rights within the organization's systems and networks.
Visit our Learning Center to view more videos.
A CIO (Chief Information Officer) is a high-level executive responsible for overseeing a company's information technology (IT) strategy and operations. On the other hand, a vCIO (virtual Chief Information Officer) is a consultant or an outsourced service provider who provides similar services as a CIO, but on a part-time or project basis.
Play Video
A CIO (Chief Information Officer) is a high-level executive responsible for overseeing a company's information technology (IT) strategy and operations. On the other hand, a vCIO (virtual Chief Information Officer) is a consultant or an outsourced service provider who provides similar services as a CIO, but on a part-time or project basis.
Visit our Learning Center to view more videos!
In recent years, technology has rapidly changed the way we interact with the digital world. There are two terms that have been used over the past few years that may sound familiar. VR, Virtual Reality, and AR, or Augmented Reality. One you probably haven’t heard of as much is MR, or Mixed Reality.
In recent years, technology has rapidly changed the way we interact with the digital world. There are two terms that have been used over the past few years that may sound familiar. VR, Virtual Reality, and AR, or Augmented Reality. One you probably haven’t heard of as much is MR, or Mixed Reality.
Visit our Learning Center to view more videos!
What is a cookie? Besides being a wonderful little dessert, a cookie is also a tech term. Imagine you're at a party, and the host gives you a sticker with your name on it. This sticker helps the host remember your name throughout the party, so they can greet you by name and offer you things you might like.
What is a cookie? Besides being a wonderful little dessert, a cookie is also a tech term. Imagine you're at a party, and the host gives you a sticker with your name on it. This sticker helps the host remember your name throughout the party, so they can greet you by name and offer you things you might like.
Visit our Learning Center to view more videos!
A BCDR device stands for Business Continuity and Disaster Recovery device. It's a specialized tool that helps businesses protect their data and IT infrastructure in case of unexpected events like natural disasters, power outages, cyber attacks, and hardware failures.
A BCDR device stands for Business Continuity and Disaster Recovery device. It's a specialized tool that helps businesses protect their data and IT infrastructure in case of unexpected events like natural disasters, power outages, cyber attacks, and hardware failures.
Visit our Learning Center to view more videos.
CMMC Proposed Rule Published with Bob Coppedge, CEO @simplex-it and Tim Golden CEO @compliancescorecard . What's Impacted? What to do? Need to Know More?
CMMC Proposed Rule Published with Bob Coppedge, CEO @simplex-it and Tim Golden CEO @compliancescorecard . What's Impacted? What to do? Need to Know More?
Visit our Learning Center to view more videos!
A server, in the IT world, is a specialized, powerful computer that serves a specific purpose. A server is a super-smart, super-organized computer that does important jobs for other devices, like your regular home computer or phone. It's not meant for browsing the internet, playing games, or watching videos.
A server, in the IT world, is a specialized, powerful computer that serves a specific purpose. A server is a super-smart, super-organized computer that does important jobs for other devices, like your regular home computer or phone. It's not meant for browsing the internet, playing games, or watching videos.
Visit our Learning Center to view more videos.
When talking about cybersecurity solutions, there’s a ton of different acronyms and abbreviations. You’ve probably heard about EDR, MDR, MTR, and XDR. But what do all of these mean? Let’s dive in.
When talking about cybersecurity solutions, there’s a ton of different acronyms and abbreviations. You’ve probably heard about EDR, MDR, MTR, and XDR. But what do all of these mean? Let’s dive in.
Visit our Learning Center to view more videos!
Are you a business owner or manager looking to select a reputable IT provider but not sure where to start? In this video, we will discuss some key factors you should consider when selecting a reputable IT provider.
Are you a business owner or manager looking to select a reputable IT provider but not sure where to start? Well, you're not alone! In today's world, technology plays a crucial role in running a successful business. And finding the right IT support company can make all the difference. In this video, we will discuss some key factors you should consider when selecting a reputable IT provider.
Visit our Learning Center to view more videos!
Think of your home or office as a city, and the internet as a vast network of roads connecting different cities. Now, think of a router as the traffic cop for your city. A router is a device that helps your computer or other devices connect to the internet. Here's how it works!
Think of your home or office as a city, and the internet as a vast network of roads connecting different cities. Now, think of a router as the traffic cop for your city. A router is a device that helps your computer or other devices connect to the internet. Here's how it works.
Visit our Learning Center to view more videos!
“Bring Your Own Device” - or BYOD – is a policy where employees use their personal devices (phones, laptops, tablets, etc.) for work, rather than company-provided devices. It has become more popular recently for a number of reasons, not the least of which is the desire for reduction in device maintenance for companies – and the associated cost.
“Bring Your Own Device” - or BYOD – is a policy where employees use their personal devices (phones, laptops, tablets, etc.) for work, rather than company-provided devices. It has become more popular recently for a number of reasons, not the least of which is the desire for reduction in device maintenance for companies – and the associated cost.
Visit our Learning Center to view more videos!
Cheers to unforgettable moments and festive celebrations! Wishing you all a joyous holiday season filled with warmth and happiness from all of us at Simplex-IT!
Cheers to unforgettable moments and festive celebrations! Wishing you all a joyous holiday season filled with warmth and happiness from all of us at Simplex-IT!
TSP stands for Technology Success Partner. Some will argue that this is necessary. That a TSP encompasses support for all of your IT. Including your Cloud, security, and…umm…IT. I think the concept is that an MSP has a more sophisticated view of IT than an MSP. Somehow. By some arbitrary measure. An All-in-one IT solution.
TSP stands for Technology Success Partner. Some will argue that this is necessary. That a TSP encompasses support for all of your IT. Including your Cloud, security, and…umm…IT. I think the concept is that an MSP has a more sophisticated view of IT than an MSP. Somehow. By some arbitrary measure. An All-in-one IT solution.
Visit our Learning Center to view more videos!
Working with an IT Managed Service Provider, MSP, can sound like a daunting task if you don't have any prior knowledge about IT. Instead of trying to go in blind, here are some tips to help you get started.
Working with an IT Managed Service Provider, MSP, can sound like a daunting task if you don't have any prior knowledge about IT. Instead of trying to go in blind, here are some tips to help you get started.
Visit our Learning Center to view more videos!
At Simplex-IT, we have the privilege of meeting with numerous businesses in Northeast Ohio each year to discuss their IT outsourcing needs. With our extensive experience and expertise in the IT industry, as well as our willingness to share our honest thoughts and feelings….
At Simplex-IT, we have the privilege of meeting with numerous businesses in Northeast Ohio each year to discuss their IT outsourcing needs. With our extensive experience and expertise in the IT industry, as well as our willingness to share our honest thoughts and feelings…
Visit our Learning Center to view more videos!
Here at Simplex-IT, we understand looking for a new IT provider isn't fun. Pushy salespeople. Condescending IT jerks. We take a consultative approach, because we’re genuinely interested in supporting the success of your business through IT.
Here at Simplex-IT, we understand looking for a new IT provider isn't fun. Pushy salespeople. Condescending IT jerks. We take a consultative approach, because we’re genuinely interested in supporting the success of your business through IT.
Visit our Learning Center to view more videos!
Microsoft Teams Exploratory is essentially a 12 month free license for your organization to use Teams. 12 months later Microsoft is going to tell you how it's expiring and you should do something about it. What they don't do is they don't bother to take a look and see whether or not the organization is already using Teams.
Microsoft Teams Exploratory is essentially a 12 month free license for your organization to use Teams. 12 months later Microsoft is going to tell you how it's expiring and you should do something about it. What they don't do is they don't bother to take a look and see whether or not the organization is already using Teams.
Visit our Learning Center to view more videos!
Managed service providers (MSPs) and managed security services providers (MSSPs) are two terms that are often used interchangeably in the IT industry, but they are not the same thing. While there may be some overlap in the services they provide, there are significant differences between the two.
Managed service providers (MSPs) and managed security services providers (MSSPs) are two terms that are often used interchangeably in the IT industry, but they are not the same thing. While there may be some overlap in the services they provide, there are significant differences between the two.
Visit our Learning Center to view more videos!
A tabletop exercise is an opportunity for your organization to practice what happens in the event of an incident. The most common tabletop exercises are incident response and disaster recovery. This is where people within your organization can work in a simulated environment to resolve a problem using the process and procedures that you should have in place.
A tabletop exercise is an opportunity for your organization to practice what happens in the event of an incident. The most common tabletop exercises are incident response and disaster recovery. This is where people within your organization can work in a simulated environment to resolve a problem using the process and procedures that you should have in place.
Visit our Learning Center to view more videos!
In today's digital age, data security has become a top priority for organizations across industries. With the increasing frequency and sophistication of cyber attacks, it's critical for businesses to have a dedicated professional responsible for their overall information security. This is where the Chief Information Security Officer (CISO) comes in.
In today's digital age, data security has become a top priority for organizations across industries. With the increasing frequency and sophistication of cyber attacks, it's critical for businesses to have a dedicated professional responsible for their overall information security. This is where the Chief Information Security Officer (CISO) comes in.
Visit our Learning Center to view more videos!
Business impact analysis (BIA) is an essential component of a company's risk management process. It involves assessing and analyzing potential risks that could disrupt the organization's operations and result in financial or reputational losses.
Business impact analysis (BIA) is an essential component of a company's risk management process. It involves assessing and analyzing potential risks that could disrupt the organization's operations and result in financial or reputational losses.
Visit our Learning Center to view more videos!
Windows end of life is a critical aspect that every individual and organization should be aware of to ensure the safety and security of their systems and sensitive data. In simple terms, Windows end of life refers to the point when Microsoft stops supporting a version of Windows.
Windows end of life is a critical aspect that every individual and organization should be aware of to ensure the safety and security of their systems and sensitive data. In simple terms, Windows end of life refers to the point when Microsoft stops supporting a version of Windows.
Visit our Learning Center for more videos!
We’ve all been there, going about our day and then we receive the notification ‘An update is available for your software, install now?’ This can be annoying, but it’s actually a critical item to maintain the security of your applications.
We’ve all been there, going about our day and then we receive the notification ‘An update is available for your software, install now?’ This can be annoying, but it’s actually a critical item to maintain the security of your applications.
Visit our Learning Center to view more videos.
In today’s connected world we often have dozens of online accounts – whether it be for banking, shopping, work, or entertainment. But it often seems like every time we turn around another service was compromised or there’s an attempt to hack into accounts. So what can you do to keep your accounts safe and secure?
In today’s connected world we often have dozens of online accounts – whether it be for banking, shopping, work, or entertainment. But it often seems like every time we turn around another service was compromised or there’s an attempt to hack into accounts. So what can you do to keep your accounts safe and secure?
Visit our Learning Center to view more videos.
It’s easy to just say “inflation” when someone asks why there’s a price increase for what seems to be the same service from one year to the next. And boy, there's truth there. But it can be more complicated than that.
It’s easy to just say “inflation” when someone asks why there’s a price increase for what seems to be the same service from one year to the next. And boy, there's truth there. But it can be more complicated than that.
Visit our Learning Center to view more videos!
Short answer, it depends. Some common policies that are important for all companies to have are: - An acceptable use policy that defines what employees are allowed to do and not to do in the organization – especially around how they use technology.
Short answer, it depends. Some common policies that are important for all companies to have are: - An acceptable use policy that defines what employees are allowed to do and not to do in the organization – especially around how they use technology.
Visit our Learning Center to view more videos!
When you’re shopping for IT services, It’s important to understand the different pricing models that MSPs and IT providers use. Not only do you want your provider to be transparent in their pricing and their model in general, but you need to know when you’re comparing providers as well.
When you’re shopping for IT services, It’s important to understand the different pricing models that MSPs and IT providers use. Not only do you want your provider to be transparent in their pricing and their model in general, but you need to know when you’re comparing providers as well.
Visit our Learning Center to view more videos!
Not really. There's always going to be some inherent risk in everything we do. But there are different responses that you can take to reduce that risk. For instance, you can mitigate the risk by putting appropriate controls and safeguards in place to decrease the impact of that risk.
Not really. There's always going to be some inherent risk in everything we do. But there are different responses that you can take to reduce that risk. For instance, you can mitigate the risk by putting appropriate controls and safeguards in place to decrease the impact of that risk.
Visit our Learning Center to view more videos.
You can submit a support ticket in a number of different ways, give a call, send an email, use our portal. However you decide to submit it, we handle them all with the same process. As soon as our service desk receives your ticket, it’s assigned a tracking number and triaged for impact and severity.
You can submit a support ticket in a number of different ways, give a call, send an email, use our portal. However you decide to submit it, we handle them all with the same process. As soon as our service desk receives your ticket, it’s assigned a tracking number and triaged for impact and severity.
Visit our Learning Center to view more videos!
Have you ever wondered how we make our videos? Well Hayley is here to explain just how we do it and even share some tips on how you can get started making videos for your business.
Have you ever wondered how we make our videos? Well Hayley is here to explain just how we do it and even share some tips on how you can get started making videos for your business.
Visit our Learning Center to view more videos!
Security awareness training is a critical component of any organization's security strategy. It involves training employees on common security risks and how to recognize and avoid them. This includes identifying phishing emails, scam calls, and text messages, as well as learning how to follow electronic funds transfer and more.
Security awareness training is a critical component of any organization's security strategy. It involves training employees on common security risks and how to recognize and avoid them. This includes identifying phishing emails, scam calls, and text messages, as well as learning how to follow electronic funds transfer and more.
Visit our Learning Center to view more videos!
BI stands for “Business Intelligence”. Like all acronyms in IT, the definition varies. But I like this definition: BI is a collection of software that allows organizations to analyze existing data and receive meaningful results. Think for a minute about your organization. How it collects data as part of its business.
BI stands for “Business Intelligence”. Like all acronyms in IT, the definition varies. But I like this definition: BI is a collection of software that allows organizations to analyze existing data and receive meaningful results. Think for a minute about your organization. How it collects data as part of its business.
Visit our Learning Center to view more videos!
On July 19th, 2023, we hosted our 16th annual anniversary party with an astonishing turnout of around 70 people. Thank you to everyone who made it out to celebrate 16 years of Simplex-IT! If you couldn’t make it this year, check out next year, that'll be the 17th annual because that's how things work around here.
On July 19th, 2023, we hosted our 16th annual anniversary party with an astonishing turnout of around 70 people. Thank you to everyone who made it out to celebrate 16 years of Simplex-IT! If you couldn’t make it this year, check out next year, that'll be the 17th annual because that's how things work around here.
Visit our Learning Center to view more videos!
This question is tougher than it sounds. The simple answer is “try running your organization without IT”. But that’s lazy. Here are several types of improvements that IT can bring to most organizations. Of course, your mileage may vary.
This question is tougher than it sounds. The simple answer is “try running your organization without IT”. But that’s lazy. Here are several types of improvements that IT can bring to most organizations. Of course, your mileage may vary.
Visit our Learning Center to view more videos!
As technology continues to advance, businesses of all sizes rely on their IT to support their success. With this growing reliance on technology comes the need for expert IT support, leading many businesses to turn to IT Managed Service Providers (MSPs). However, not all MSPs are created equal, and choosing the wrong one can be a costly mistake.
As technology continues to advance, businesses of all sizes rely on their IT to support their success. With this growing reliance on technology comes the need for expert IT support, leading many businesses to turn to IT Managed Service Providers (MSPs). However, not all MSPs are created equal, and choosing the wrong one can be a costly mistake.
Visit our Learning Center to view more videos!
CMMC stands for Cybersecurity Maturity Model Certification. CMMC is a program that the Department of Defense is implementing to ensure the confidentiality of sensitive information.
CMMC stands for Cybersecurity Maturity Model Certification. CMMC is a program that the Department of Defense is implementing to ensure the confidentiality of sensitive information. It's an overall organizational process that involves administrative controls, HR processes, budgeting, and various elements of business planning and management.
Visit our Learning Center to view more videos!
If you're a business owner looking to partner with an IT provider, there are a few important questions you need to ask before signing up. In this video, we'll explore five crucial questions that will help you find the right IT partner.
If you're a business owner looking to partner with an IT provider, there are a few important questions you need to ask before signing up. In this video, we'll explore five crucial questions that will help you find the right IT partner for your business.
Visit our Learning Center to view more videos!
Backing up data is a critical process for any business to ensure the continuity of its operations in the event of a disaster. The frequency of backups, however, depends on several factors that are unique to each organization.
Backing up data is a critical process for any business to ensure the continuity of its operations in the event of a disaster. The frequency of backups, however, depends on several factors that are unique to each organization. One of the most critical factors is the recovery point objective (RPO), which sets the benchmark for the maximum amount of data that could be lost in case of a disaster.
Visit our Learning Center to view more videos!
While MSPs are excellent for ongoing IT support and management, they may not always be the best fit for your organization. We discuss various alternatives such as Staff Augmentation/Temp Agencies, Project-Based Services, Cloud Service Providers, Freelance IT Consultants, and IT Outsourcing/Break-Fix Companies.
While MSPs are excellent for ongoing IT support and management, they may not always be the best fit for your organization. We discuss various alternatives such as Staff Augmentation/Temp Agencies, Project-Based Services, Cloud Service Providers, Freelance IT Consultants, and IT Outsourcing/Break-Fix Companies.
Visit our Learning Center to view more videos!
Last month, the hardware company MSI was compromised by a malicious entity. These bad guys were able to steal source code, development code, and private keys. The big concern comes from the theft of those private keys. What do private keys do?
Last month, the hardware company MSI was compromised by a malicious entity. These bad guys were able to steal source code, development code, and private keys. The big concern comes from the theft of those private keys. What do private keys do?
Visit our Learning Center to view more videos!
So, you just got an email. We get so many every day, but how can we be sure they’re legitimate? Let’s talk about how to identify a malicious email. The first thing that you need to know is that malicious actors often rely on urgency. No matter what the situation is take your time…
So, you just got an email. We get so many every day, but how can we be sure they’re legitimate? Let’s talk about how to identify a malicious email. The first thing that you need to know is that malicious actors often rely on urgency. No matter what the situation is – and even if the email is real – take your time,
Visit our Learning Center to view more videos!
Does your organization have an unsupported version of Exchange (2013 or older), or you’re not keeping up with patching? If so, you might be looking at some problems delivering emails to MS 365 in the near future.
Does your organization have an unsupported version of Exchange (2013 or older), or you’re not keeping up with patching? If so, you might be looking at some problems delivering emails to MS 365 in the near future.
Visit our Learning Center to view more videos!
There are a couple of different ways. The most common is via the web. It can be from a malicious ad that you click on, a redirect that takes you to somewhere you didn’t expect to be, or even just from clicking on the wrong link in your search results.
There are a couple of different ways. The most common is via the web. It can be from a malicious ad that you click on, a redirect that takes you to somewhere you didn’t expect to be, or even just from clicking on the wrong link in your search results.
Visit our Learning Center to view more videos.
Hackers are using AI the same way businesses are starting to use AI. They're looking at those repeatable tasks that that are being done and seeing if there's more effective ways to do it. But we're also seeing it lowering that barrier to entry.
Hackers are using AI the same way businesses are starting to use AI. They're looking at those repeatable tasks that that are being done and seeing if there's more effective ways to do it. But we're also seeing it lowering that barrier to entry. One thing that security researchers have noted with ChatGPT is asking it "can you write malware for me", or "can you write up a malicious program to do something for me like this?"
Visit our Learning Center to view more videos!
Thank you to everyone who attended our recent IT Self-Assessment Workshop. Your presence and participation made it a great success! We hope it provided you with new insights and ideas for improving your organization's IT capabilities.
Thank you to everyone who attended our recent IT Self-Assessment Workshop. Your presence and participation made it a great success! We hope it provided you with new insights and ideas for improving your organization's IT capabilities.
Visit our Learning Center to view more videos!
These are just a few examples of how AI can be used in manufacturing. By leveraging the power of AI, manufacturers can gain insights into their operations that might otherwise go unnoticed, and make more informed decisions to improve their processes and products.
These are just a few examples of how AI can be used in manufacturing. By leveraging the power of AI, manufacturers can gain insights into their operations that might otherwise go unnoticed, and make more informed decisions to improve their processes and products.
Visit our Learning Center to view more videos!
DNS, or “Domain Naming Services or System or Server”, is why stuff works on the internet. When you go to our website, “Simplex-IT.com”, how does your browser know what server actually hosts that web site? DNS..
DNS, or “Domain Naming Services or System or Server”, is why stuff works on the internet. When you go to our website, “Simplex-IT.com”, how does your browser know what server actually hosts that web site? DNS..
Visit our Learning Center to view more videos!
To tackle this topic, we're going to break the managed service providers (MSP for short) into three tiers. On the low end are MSP's that almost exclusively compete on price. How can they be so inexpensive? Simple. They don't include a lot of services that either protect you or increase your productivity.
To tackle this topic, we're going to break the managed service providers (MSP for short) into three tiers. On the low end are MSP's that almost exclusively compete on price. How can they be so inexpensive? Simple. They don't include a lot of services that either protect you or increase your m/video-resource-library/v/productivity.
Visit our Learning Center to view more videos!
A Virtual CIO (Chief Information Officer) is a third-party consultant who provides strategic IT guidance to organizations on a part-time or project basis. As the title suggests, a Virtual CIO performs many of the same functions as a traditional, in-house CIO, but without being a full-time employee.
A Virtual CIO (Chief Information Officer) is a third-party consultant who provides strategic IT guidance to organizations on a part-time or project basis. As the title suggests, a Virtual CIO performs many of the same functions as a traditional, in-house CIO, but without being a full-time employee.
Visit our Learning Center to view more videos!
At Simplex-IT, we believe that clarity is key to building strong relationships with our clients. Our monthly IT agreements cover everything that maintains the status quo of your business operations. That means you can rely on our services for ongoing maintenance and support without worrying about additional charges for every little thing.
At Simplex-IT, we believe that clarity is key to building strong relationships with our clients. Our monthly IT agreements cover everything that maintains the status quo of your business operations. That means you can rely on our services for ongoing maintenance and support without worrying about additional charges for every little thing.
Visit our Learning Center to view more videos!
A static IP address is a fixed address assigned to a computer or other device by an Internet service provider (ISP). It does not change and is used to provide the same address every time a device connects to the internet.
A static IP address is a fixed address assigned to a computer or other device by an Internet service provider (ISP). It does not change and is used to provide the same address every time a device connects to the internet. A dynamic IP address is an address that is assigned to a device by the ISP when it connects to the internet. It changes each time the device connects, so the address is different each time.
Visit our Learning Center to view more videos.
Ok, you’ve hired a company to create and maintain your web site. Everything is going great. They’re creating a web site that represents your organization properly, there’s all sorts of graphics some videos, you’re getting close to public release! And suddenly…they reach out to you with a request.
Ok, you’ve hired a company to create and maintain your web site. Everything is going great. They’re creating a web site that represents your organization properly, there’s all sorts of graphics some videos, you’re getting close to public release! And suddenly…they reach out to you with a request. They want to host and control the DNS for your organization. Good idea? NO!
Visit our Learning Center to view more videos!
Are you always the victim of sarcastic people and never have a comeback? Well, fear not because your friends here at Simplex-IT have you covered! Introducing our latest service offering, SaaS - Sarcasm as a Service.
Are you always the victim of sarcastic people and never have a comeback? Well, fear not because your friends here at Simplex-IT have you covered! Introducing our latest service offering, SaaS - Sarcasm as a Service.
Visit our Learning Center for more videos!
Ok, you may have heard something about the 3CX hack. Lets talk about this. First of all, this video was recorded less than 24 hours after the public disclosure of the compromise. So we might be out of date already. And a shout out to our Voip partner BVoip for keeping us up to date on things.
Ok, you may have heard something about the 3CX hack. Lets talk about this. First of all, this video was recorded less than 24 hours after the public disclosure of the compromise. So we might be out of date already. And a shout out to our Voip partner BVoip for keeping us up to date on things. And this is going to be a very general 30,000 foot view of the situation.
Visit our Learning Center for more videos!
WiFi is a wireless technology that allows devices to connect to the internet or other networks without the need for physical cables. It uses radio waves to transmit data between devices, similar to how a radio station broadcasts music.
WiFi is a wireless technology that allows devices to connect to the internet or other networks without the need for physical cables. It uses radio waves to transmit data between devices, similar to how a radio station broadcasts music. WiFi is typically used in homes, offices, and public spaces to provide internet access to smartphones, laptops, tablets, and other devices.
Visit our Learning Center to view more videos!
We’ve done a couple of videos about what an MSP (Managed Service Provider) is. Bottom line is it’s an organization that you outsource a majority (if not all) of your IT support to. And that’s what Simplex-IT is.
We’ve done a couple of videos about what an MSP (Managed Service Provider) is. Bottom line is it’s an organization that you outsource a majority (if not all) of your IT support to. And that’s what Simplex-IT is.
Visit our Learning Center to view more videos!
An IP address, short for Internet Protocol address, is a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. This Protocol was created by the Internet Gods back around 1985.
An IP address, short for Internet Protocol address, is a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. This Protocol was created by the Internet Gods back around 1985.
Visit our Learning Center to view more videos!
We wrote the only two books on the topic, so we can definitely talk about this. Plus videos. Yup we got a bunch of videos on it. Keep in mind we’re going to talk about Co-Managed IT from the perspective of the client side, not the service providers.
We wrote the only two books on the topic, so we can definitely talk about this. Plus videos. Yup we got a bunch of videos on it. Keep in mind we’re going to talk about Co-Managed IT from the perspective of the client side, not the service providers.
Visit our Learning Center to view more videos!
Laptop encryption is an important security measure for businesses that want to ensure their data is safe and secure. It prevents unauthorized access to files in the event that a laptop is lost or stolen. It also allows business owners to easily recover any lost data.
Laptop encryption is an important security measure for businesses that want to ensure their data is safe and secure. It prevents unauthorized access to files in the event that a laptop is lost or stolen. It also allows business owners to easily recover any lost data. Additionally, laptop encryption helps to protect confidential information from cybercriminals.
Visit our Learning Center to view more videos!
There’s a reason that browsers like Edge have added breached password notifications. Data breaches are an unfortunate part of life and can have costly consequences for individuals. Hackers can steal things like identities and compromise bank accounts, to name a couple.
There’s a reason that browsers like Edge have added breached password notifications. Data breaches are an unfortunate part of life and can have costly consequences for individuals. Hackers can steal things like identities and compromise bank accounts, to name a couple.
Visit our Learning Center to view more videos!
It’s at the core of our name. “Simplex-IT.” Face it. You want to succeed at something, so you need to understand it. But only to the appropriate level of detail. The rest you leave to trusted experts.
It’s at the core of our name. “Simplex-IT.” Face it. You want to succeed at something, so you need to understand it. But only to the appropriate level of detail. The rest you leave to trusted experts.
Visit our Learning Center to view more videos!
There are three flavors of CoMITs. We break it down based on what part of IT the Internal IT folks are responsible for versus what we handle. They are: Full CoMITs, Desktop CoMITs, and Server CoMITs.
There are three flavors of CoMITs. We break it down based on what part of IT the Internal IT folks are responsible for versus what we handle. They are: Full CoMITs, Desktop CoMITs, and Server CoMITs.
Visit our Learning Center to view more videos!
Virtual Private Network (VPN) is a secure connection between two or more computers or devices that allows data to be transmitted and received over the internet without being exposed to malicious actors. It is commonly used to protect personal information, such as passwords and financial data.
Virtual Private Network (VPN) is a secure connection between two or more computers or devices that allows data to be transmitted and received over the internet without being exposed to malicious actors. It is commonly used to protect personal information, such as passwords and financial data, and provide access to restricted networks and websites. VPNs also bypass geographical restrictions, allowing users to access content that may be blocked in their country or region.
Visit our Learning Center to view more videos!
Microsoft states that their “backup” goal is the availability of data. So it ensures that your 365 data is stored in at least two data centers located in geographically different places. Now if something happens to the servers in one data center (or the entire center or geographic region), there’s another copy.
Microsoft states that their “backup” goal is the availability of data. So it ensures that your 365 data is stored in at least two data centers located in geographically different places.
Now if something happens to the servers in one data center (or the entire center or geographic region), there’s another copy.
But is that a true backup? Nope.
Visit our Learning Center to view more videos!
Here is the list of 7 Ways to Increase Productivity Through IT. What you do with it is up to you. Need help? Email us at BobC@Simplex-IT.com to schedule a call. And feel free to share this with your internal IT department.
Here is the list of 7 Ways to Increase Productivity Through IT. What you do with it is up to you. Need help? Email us at BobC@Simplex-IT.com to schedule a call. And feel free to share this with your internal IT department.
Visit our Learning Center to view more videos!
Conditional access is also known as contextual access. It is a method of controlling user access. You can think of it as several “if/then” statements, meaning “if” this thing is present, “then” do this. Conditional access allows you to add many conditions to the process of user access to a system. It is typically used with MFA.
Conditional access is also known as contextual access. It is a method of controlling user access. You can think of it as several “if/then” statements, meaning “if” this thing is present, “then” do this. Conditional access allows you to add many conditions to the process of user access to a system. It is typically used with MFA.
Visit our Learning Center for more videos!
Ok, this one is mostly an excuse to tell a true story that happened to me back in the mid-80’s. Because…well, I’m old.
What’s my point here? It’s great to create processes and procedures to use in an emergency. Documents that identify processes to be followed and resources to be involved.
Ok, this one is mostly an excuse to tell a true story that happened to me back in the mid-80’s. Because…well, I’m old. What’s my point here? It’s great to create processes and procedures to use in an emergency. Documents that identify processes to be followed and resources to be involved. But if you don’t, make sure your people use them. You may end up calling my mom.
Visit our Learning Center Page to view more videos!
Let’s start by saying that phishing is a way of contacting someone by posing to be someone else, usually in the form of an email, text message or even phone call. But what is "simulated" phishing? Organizations use simulated phishing attempts to identify employees that may require additional training.
Let’s start by saying that phishing is a way of contacting someone by posing to be someone else, usually in the form of an email, text message or even phone call.
But what is "simulated" phishing? Organizations use simulated phishing attempts to identify employees that may require additional training. Unlike your average phishing attacks, simulated phishing attempts are perfectly safe. They are designed to look like real phishing emails or even text messages. Nothing terrible happens if a user ‘falls’ for it.
Visit our Learning Center for more videos!
Adobe Flash was an add-on to most web browsers back in the day. It really enabled web sites to do a lot. It especially makes it easier for bad guys to do bad things. In fact, both Microsoft and Adobe (and honestly everybody else in the industry strongly recommended removing Flash from all computers and web sites.
Adobe Flash was an add-on to most web browsers back in the day. It really enabled web sites to do a lot. It especially makes it easier for bad guys to do bad things. In fact, both Microsoft and Adobe (and honestly everybody else in the industry strongly recommended removing Flash from all computers and web sites.
And yet...there are still millions of users, especially in the web-based game world, still using Flash.
Visit our Learning Center for more videos!
Everyone – and I mean everyone – can fall victim to a hack! Hacking attempts are an issue that should be taken seriously. Why? Well, 43% of cyber hacks are aimed at small businesses. And 60% of companies who fall prey to a hack experience a complete crash in the following six months.
Everyone – and I mean everyone – can fall victim to a hack! Hacking attempts are an issue that should be taken seriously. Why? Well, 43% of cyber hacks are aimed at small businesses. And 60% of companies who fall prey to a hack experience a complete crash in the following six months.
And that’s just for starters.
Now, there are a lot of things you can do to avoid becoming a victim of hackers. But it all starts with understanding what those cyber attackers are after.
Visit our Learning Center for more videos!
Simplex-IT was created in 2007 as a managed service provider, to handle the IT services for our clients. Depending on the client needs that can mean we handle everything or partner with them to provide additional support with what we call Co-Managed IT.
Simplex-IT was created in 2007 as a managed service provider, essentially as a managed service provider we handle the IT services for our clients. Depending on the client needs that can mean we handle everything or with organizations that have internal IT we partner with them to provide additional support with what we call Co-Managed IT. We want your organization to be as successful and we do that by working together we all understand how IT supports the business.
Visit our Learning Center for more videos!
So you want to learn a little more about how we come up with our pricing? That’s great! Our SiMS (Simplex-IT Managed Services) offering includes a compilation all of the products and services your organization needs to have the most effective IT for your clients.
So you want to learn a little more about how we come up with our pricing? That’s great! Our SiMS (Simplex-IT Managed Services) offering includes a compilation all of the products and services your organization needs to have the most effective IT for your clients.
Do we charge a fixed cost per workstation or user, like a lot of MSPs do? Nope. We tried, believe me. But the costs are the kicker here. And although our offering is standardized, the costs are significantly different from client to client. Take servers, for example. Our costs to maintain each server is significant, whether it be virtual or physical, on premise or cloud based. Same with backup costs depending on the size of the servers.
Visit our Learning Center for more videos!
Keyloggers are programs that capture everything you type. Passwords, credit card numbers, the webpages, answers to security questions – all by logging your keyboard strokes. The program is installed on your computer, usually through some form of spyware, and records what you type.
Keyloggers are programs that capture everything you type. Passwords, credit card numbers, the webpages, answers to security questions – all by logging your keyboard strokes. The program is installed on your computer, usually through some form of spyware, and records what you type. All of this is then sent to the the bad guys use it to in a number of their bad guys ways.
Visit our Learning Center for more videos!
So we talked about the security vendor, basically a password vault, LastPass was breached. At that time, both LastPass and we said it was not that big of a deal because they didn't get much. Well, it turned out not entirely accurate.
So we talked about the security vendor, basically a password vault, LastPass was breached. At that time, both LastPass and we said it was not that big of a deal because they didn't get much. Well, it turned out not entirely accurate.
LastPass recently has said the bad guys did get more, and they pulled out data vaults. Data vaults are basically the containers with all the credentials and information that LastPass clients were holding, but they didn't have the credentials. So it was all heavily encrypted. So no problem, right? Well, no, not really, because they can try to attack it.
Visit our Learning Center for more videos!
A DDoS attack stands for “denial of service” attack, where the bad guys try to overwhelm a network or server with a ton of traffic. This will typically cause whatever they hit, like your website, online platform, or application, to crash.
A DDoS attack stands for “denial of service” attack, where the bad guys try to overwhelm a network or server with a ton of traffic. This will typically cause whatever they hit, like your website, online platform, or application, to crash.
The server can’t handle the traffic, resulting in total system shutdown, corrupted data, and exhausted or misdirected resources. It becomes unavailable, thereby restricting legitimate users’ access.
Visit our Learning Center to view more videos!
What is a botnet? We talked recently about what a bot (short for robot) is (usually a computer that’s been compromised to do bad things quietly in the background). But what’s a botnet?
What is a botnet? We talked recently about what a bot (short for robot) is (usually a computer that’s been compromised to do bad things quietly in the background). But what’s a botnet? They’re both related. A botnet is…wait for it…a network of bots. Yup, it’s a collection of computers that could be on entirely different networks (heck, different continents), all running the bots, the same forms of malware.
Visit our Learning Center to view more videos!
What is a bot? A bot is short for robot, but that part you probably knew. These days the term “bot” is used most often for cyber security.
What is a bot? A bot is short for robot, but that part you probably knew. These days the term “bot” is used most often for cyber security. In cyber security, a bot refers to a computer that’s been compromised to push out spam or DDOS attacks or one with specific instructions to do something equally evil, such as stealing passwords or exploiting other vulnerabilities.
Visit our Learning Center to view more videos!
Simplex-IT has had a busy year this year, from Tradeshows to our big office move, to our Annual Party at Quarter Up to our new Content Creation Team to our Awards, here are the Top 10 Moments of 2022.
Simplex-IT has had a busy year this year, from Tradeshows to our big office move, to our Annual Party at Quarter Up to our new Content Creation Team to our Awards, here are the Top 10 Moments of 2022.
Visit our Learning Center to view more videos!
Cloud9 is the name of a lot of things. Unfortunately, it is now the name of a new botnet. Oh, that’s a network of computers all running malware applications, usually without the knowledge or permission of the computer owner.
Cloud9 is the name of a lot of things. Unfortunately, it is now the name of a new botnet. Oh, that’s a network of computers all running malware applications, usually without the knowledge or permission of the computer owner.
Visit our Learning Center to view more videos!
You’ve just discovered there are compromised employee credentials or other sensitive data of your company exposed and available on the Dark Web. Your company should immediately start taking appropriate steps and measures to correct or minimize the risks and potential damages associated with this exposed data.
You’ve just discovered there are compromised employee credentials or other sensitive data of your company exposed and available on the Dark Web. The reality is, once exposed on the Dark Web, your information cannot ever be completely removed or hidden. Your company should immediately start taking appropriate steps and measures to correct or minimize the risks and potential damages associated with this exposed data.
Visit our Learning Center to view more videos!
OneDrive is a Microsoft cloud storage service that lets you store your personal files in one place, share them with others, and get to them from any device connected to the internet. There are personal and business versions of OneDrive.
OneDrive is a Microsoft cloud storage service that lets you store your personal files in one place, share them with others, and get to them from any device connected to the internet. There are personal and business versions of OneDrive. Let’s focus on the business version.
Visit our Learning Center to view more videos!
Don’t you just wish you had an album to throw on and reminisce about the good ol’ days? Well, here at Simplex-IT we have curated a list of over 30 classic holiday songs we all know and love, Simplex-IT's Songs of the Season.
Don’t you just wish you had an album to throw on and reminisce about the good ol’ days? Well, here at Simplex-IT we have curated a list of over 30 classic holiday songs we all know and love, Simplex-IT's Songs of the Season. Featuring classics such as Working in a Wi-Fi Wonderland, It’s Beginning to Look a lot like Malware, and Twelve Days of Updates.
Visit our Learning Center to view more videos!
We’ve talked about both Break Fix and Managed Services in other videos. Now, let’s compare them against each other (with plusses and minuses). Of course we’re specifically talking as these concepts relate to IT resources for organizations.
We’ve talked about both Break Fix and Managed Services in other videos. Now, let’s compare them against each other (with plusses and minuses). Of course we’re specifically talking as these concepts relate to IT resources for organizations.
Visit our Learning Center to view more videos!
Loads of fun! It's easy to get started with Simplex-IT. Once you've agreed to our proposal, the next 30-45 days will be spent transitioning your organization over to our services, or welcoming you into our family as I like to say.
Loads of fun! It's easy to get started with Simplex-IT. Once you've agreed to our proposal, the next 30-45 days will be spent transitioning your organization over to our services, or welcoming you into our family as I like to say.
Visit our Learning Center to view more videos!
I started Simplex-IT in 2007 and at that time the MSP industry was just getting started. I was then dealing with being a consultant and working with a lot of companies on primarily database, development and infrastructure work. But I wanted to have a company that was based on relationships.
I started Simplex-IT in 2007 and at that time the MSP industry was just getting started. I was then dealing with being a consultant and working with a lot of companies on primarily database, some CIO stuff, development work, and infrastructure work. But I wanted to have a company that was based on relationships.
Visit our Learning Center to view more videos!
Empowering Clients and Community with open Knowledge Sharing IT is hard. That's why in the first 8 months of '22 we created over 60 videos and held half a dozen webinars aimed at helping explain IT concepts, buzzwords, current happenings, and have some fun. All minimal (usually none) sales tactics.
Empowering Clients and Community with open Knowledge Sharing IT is hard. That's why in the first 8 months of '22 we created over 60 videos and held half a dozen webinars aimed at helping explain IT concepts, buzzwords, current happenings, and have some fun. All minimal (usually none) sales tactics.
Visit our Learning Center to view more videos!
IT changes. This is especially true with security. Simplex-IT has developed an annual process we call SiMS (for Simplex-IT Managed Services) that involve each year evaluating our Software, Tools, Methodologies and Processes (we call them "STMPs", pronounced "Stamps").
IT changes. This is especially true with security. Simplex-IT has developed an annual process we call SiMS (for Simplex-IT Managed Services) that involve each year evaluating our Software, Tools, Methodologies and Processes (we call them "STMPs", pronounced "Stamps").
Visit our Learning Center to view more videos!
You may have heard the term "Tech Debt", aka "Technology Debt", "design debt" or "code debt". It's a term that is commonly used to describe a situation where an organization is using a technology solution that...well, isn't the best available. But what does it mean, and is it a specific definition?
You may have heard the term "Tech Debt", aka "Technology Debt", "design debt" or "code debt". It's a term that is commonly used to describe a situation where an organization is using a technology solution that...well, isn't the best available. But what does it mean, and is it a specific definition?
Visit our Learning Center to view more videos.
Simplex-IT has spoken at nearly every MSP conference about Co-Managed Services. CEO Bob Coppedge has written the only two books on the topic (both best sellers on Amazon).
Simplex-IT has spoken at nearly every MSP conference about Co-Managed Services. CEO Bob Coppedge has written the only two books on the topic (both best sellers on Amazon). He also created the largest online community dedicated to helping MSP's develop Co-Managed offerings, with over 1,500 members.
Visit our Learning Center to view more videos!
First it must be protected by end-to-end encryption. This means even if your data is intercepted, no one can read it. Next, make sure the manager works across all applications.
How to Choose the Right Password Manager? First it must be protected by end-to-end encryption. This means even if your data is intercepted, no one can read it. Next, make sure the manager works across all applications and browsers on all devices. And finally, make sure you retain central control over your business's password manager.
Visit our Learning Center to view more videos!
Simplex-IT was formed in 2007 as a Managed Service Provider. To this date well over 80% of our revenue comes from either MSP or Co-Managed MSP agreements or projects with clients.
Why is MSP First and Foremost unique for Simplex-IT? MSP First and Foremost Simplex-IT was formed in 2007 as a Managed Service Provider. To this date well over 80% of our revenue comes from either MSP or Co-Managed MSP agreements or projects with clients that have an agreement with us.
Visit our Learning Center to view more videos!
An algorithm is simply a set of instructions given to precisely define a sequence of some kind. That's pretty much it! Usually, we're talking about instructions given to computer systems to allow them to do their thing.
An algorithm is simply a set of instructions given to precisely define a sequence of some kind. That's pretty much it! Usually, we're talking about instructions given to computer systems to allow them to do their thing. Web sites, applications, and even malware.
Visit our Learning Center to view more videos!
CoMITs is actually a made-up term. And I should know, since I'm the guy who made it up. Co-Managed IT is a collaborative relationship between a Managed Service Provider and the Internal IT resources for an organization.
CoMITs is actually a made-up term. And I should know, since I'm the guy who made it up. Co-Managed IT is a collaborative relationship between a Managed Service Provider and the Internal IT resources for an organization.
Visit our Learning Center to view more videos!
Each year Channel Futures has created a list of the top 501 Managed Service Providers in the world based on the largest and most comprehensive survey and ranking of IT companies that provide managed services in the technology industry. And once again, Simplex-IT has been recognized within this list.
Each year Channel Futures has created a list of the top 501 Managed Service Providers in the world based on the largest and most comprehensive survey and ranking of IT companies that provide managed services in the technology industry. Y'know, like Simplex-IT. And once again, Simplex-IT has been recognized within this list.
Visit our Learning Center to view more videos!
The Case Weatherhead awards are honestly the premier business awards in Northeast Ohio. And for the sixth year, Simplex-IT has been recognized by those fine folks. Yup, Simplex-IT is a winner of the Weatherhead 100 award for 2022.
The Case Weatherhead awards are honestly the premier business awards in Northeast Ohio. And for the sixth year, Simplex-IT has been recognized by those fine folks. Yup, Simplex-IT is a winner of the Weatherhead 100 award for 2022. According to Case, we're a member of a "group of companies who are the best example of leadership, growth and success in our region".
Visit our Learning Center to view more videos!
Hiring a Managed Service Provider (MSP) for your organization shouldn't be a hasty decision. Here are six important factors to keep in mind:
Hiring a Managed Service Provider (MSP) for your organization shouldn't be a hasty decision. Here are six important factors to keep in mind:
1. THE MSP'S TRACK RECORD
2. THE RANGE OF SERVICES IT PROVIDES
3. SUPPORT
4. RESPONSE TIME
5. SECURITY AND BACKUP
6. GUIDANCE ON WORKFLOW OPTIONS
With high expertise, customized services, and an understanding of threats, a reputable team can help you stay ahead of your competitors.
Visit our Learning Center for more videos!
Simplex-IT will be at the Design2Part show at the John S. Knight Center in Akron, Ohio, October 26th and 27th, 2022.
Simplex-IT will be at the Design2Part show at the John S. Knight Center in Akron, Ohio, October 26th and 27th, 2022. The exhibitors are regional and national contract manufacturers and job shops that offer manufacturing and service capabilities for the metal, plastics, rubber, and electronics industries. And Simplex-IT.
Visit our Learning Center to view more videos!
How expensive is downtime? "The Server is down." Yeah, we hate to hear that. Because downtime is expensive. But how expensive? That's a really important number that we ignore way too much. Downtime.
How expensive is downtime? "The Server is down." Yeah, we hate to hear that. Because downtime is expensive. But how expensive? That's a really important number that we ignore way too much. Downtime. Suddenly going Amish. The thought drives a chill into the heart of CEO's everywhere.
Visit our Learning Center to view more videos!
Hey, if you're in manufacturing and have some time October 18-20, come visit the Manufacturing & Technology show at the Huntington Convention Center here in Cleveland. Simplex-IT is proud to be one of the folks exhibiting there. So obviously you should attend.
Hey, if you're in manufacturing and have some time October 18-20, come visit the Manufacturing & Technology show at the Huntington Convention Center here in Cleveland. Simplex-IT is proud to be one of the folks exhibiting there. So obviously you should attend.
Visit our Learning Center to view more videos!
Authentication is a process to validate the identity of someone (or something). For this conversation we’re talking strictly in the cyber world.
Authentication is a process to validate the identity of someone (or something). For this conversation we’re talking strictly in the cyber world. So let’s say you’re using a computer and want to connect with and use a resource that’s…somewhere else. And it’s operated by a completely different organization. How do they verify that you’re…you?
Visit our Learning Center to view more videos!
Think about the bad guys behind cybercrime. Do you think of the evil genius writing evil stuff living in moms basement? Or the head of an organization with employees, products and marketing strategies making millions of dollars?
Think about the bad guys behind cybercrime. Do you think of the evil genius writing evil stuff living in moms basement? Or the head of an organization with employees, products and marketing strategies making millions of dollars?
Visit our Learning Center to view more videos!
I want to show you something that we just received that is actually kind of funny. Spoiler alert it's bad guys trying to get us to give them money and we foiled it. We will show you how!
So how can you tell when an email from a business could be fake? So, I want to show you something that we just received that is actually kind of funny. Spoiler alert it's bad guys trying to get us to give them money and we foiled it. We will show you how!
Visit our Learning Center to view more videos!
Does your organization have data backups or an incident response plan? If you already have an organization with a strong cybersecurity background, contact them immediately and follow their lead. If you’re on your own, here are some steps you can follow.
Does your organization have data backups or an incident response plan? If you already have an organization with a strong cybersecurity background, contact them immediately and follow their lead. If you’re on your own, here are some steps you can follow.
Visit our Learning Center to view more videos!
Four unique things about Simplex-IT, MSP first and foremost, the industry recognized leader in Co-Managed IT services, ever evolving solutions with a focus on security, and empowering clients and community with open knowledge sharing.
Four unique things about Simplex-IT, MSP first and foremost, the industry recognized leader in Co-Managed IT services, ever evolving solutions with a focus on security, and empowering clients and community with open knowledge sharing
Visit our Learning Center to view more videos!
IT Budgeting is a planning tool. The budget helps us see down the road and around corners. Budgets drive lifecycle management and are a critical component of strategic planning. Planning expenses and values behind them is key to creating a strong, healthy IT resource for any organization.
IT Budgeting is a planning tool. The budget helps us see down the road and around corners. Budgets drive lifecycle management and are a critical component of strategic planning. Planning expenses and values behind them is key to creating a strong, healthy IT resource for any organization.
Visit our Learning Center to view more videos!
Should You Care About Uber Being Hacked? The quick answer is yes-ish. So far Uber has not come forward with any claims of any meaningful user data but the jury is still out to a certain degree. So what should you do?
Should You Care About Uber Being Hacked? The quick answer is yes-ish. So far Uber has not come forward with any claims of any meaningful user data, credit card information, personal information, or trip history but the jury is still out to a certain degree. So what should you do?
Visit our Learning Center to view more videos!
IT changes. A lot. And often. So how do we keep up in terms of IT support and cybersecurity services? Here at Simplex-IT we've developed our services around an annual cycle. We consistently watch the market for emerging technologies, evaluate, and then select the best options for our clients.
IT changes. A lot. And often. So how do we keep up in terms of IT support and cybersecurity services? Here at Simplex-IT we've developed our services around an annual cycle. We consistently watch the market for emerging technologies, evaluate, and then select the best options for our clients.
Visit our Learning Center to view more videos!
The bottom line is you’re “big enough” to warrant attention. Everyone is. And your organization is “big enough” to warrant the same attention from the bad guys. All organizations are. It’s time for you to take security seriously!
Am I too small for cybercriminals? Amazon knows everything about you, but you're too small for a cyber attack? The bottom line is you’re “big enough” to warrant attention. Everyone is. And your organization is “big enough” to warrant the same attention from the bad guys. All organizations are. It’s time for you to take security seriously!
Visit our Learning Center to view more videos!
We've discussed what a Managed Service Provider (aka MSP) is before and we've even talked about when you shouldn't use an MSP to support the IT for your organization. So we still need to cover when you should use an MSP, right?
When should you use an MSP for your organization? We've discussed what a Managed Service Provider (aka MSP) is before and we've even talked about when you shouldn't use an MSP to support the IT for your organization. So we still need to cover when you should use an MSP, right?
Visit our Learning Center to view more videos!
Break Fix is a simple concept. It's not limited to IT. The bottom line for Break Fix is this: "When it breaks...fix it. Otherwise, leave it alone." But if you get bit by just a couple break-fix vulnerabilities, the savings you think that break-fix brings are likely gone.
What is Break Fix when it comes to IT? Break Fix is a simple concept. It's not limited to IT. The bottom line for Break Fix is this: "When it breaks...fix it. Otherwise, leave it alone." But if you get bit by just a couple break-fix vulnerabilities, the savings you think that break-fix brings are likely gone.
Visit our Learning Center to view more videos!
The principle of least access is the idea that an employee only should have access to the bare minimum amount of technology systems they need to do their job. Applying the principle of least access will limit the amount of information that is compromised during an attack.
The principle of least access is the idea that an employee only should have access to the bare minimum amount of technology systems they need to do their job. Applying the principle of least access will limit the amount of information that is compromised during an attack.
Visit our Learning Center to view more videos!
We are trying to create the best and most productive and secure IT environment for your organization and there is a lot that goes into every one of these aspects that are critical to your organization’s success. And it’s kind of like Jenga.
Why can't we pick and choose only the IT services we want? Why can't we pick and choose only the services we want?
We are trying to create the best and most productive and secure IT environment for your organization and there is a lot that goes into every one of these aspects that are critical to your organization’s success. And it’s kind of like Jenga.
Visit our Learning Center to view more videos!
So, you've heard us (and lots of other folks) warn you over and over again...use a password manager to protect your...ummm...passwords. Like LastPass. You know, the cloud-based password manager that was hacked two weeks ago.
Should I be concerned about LastPass? So, you've heard us (and lots of other folks) warn you over and over again...use a password manager to protect your...ummm...passwords. Like LastPass. You know, the cloud-based password manager that was hacked two weeks ago.
Visit our Learning Center to view more videos!
Here are a few types of phishing campaigns and how they work. And the best way to protect against phishing is to protect your information and your technology by using multifactor authentication, and train your employees.
Let's talk about some different types of phishing campaigns and how they work. Now hopefully you already understand that phishing, is essentially an attempt for bad guys to misrepresent themselves and trick you into giving away credentials or even worse. And the best way to protect against phishing is to protect your information and your technology by using multifactor authentication, and train your employees.
Visit our Learning Center to view more videos!
NIST stands for National Institutes of Standards and Technology and they're the ones that define all these industry standard practices. They're the ones that define what exactly is a pound, but they also write cybersecurity frameworks and compliance frameworks.
NIST stands for National Institutes of Standards and Technology and they're the ones that define all these industry standard practices. They're the ones that define what exactly is a pound, but they also write cybersecurity frameworks and compliance frameworks usually in the form of special publications with a string of numbers and letters attached to it. It’s important for people to be aware of them and especially if compliance obligations come into play, they may specifically say to reference a NIST standard.
CISA stands for the Cybersecurity and Infrastructure Security Agency; they are a division of the Department of Homeland defense and they're responsible for making sure cybersecurity infrastructure stays secure. They're managing those vulnerabilities especially for the federal government and saying what is important.
Visit our Learning Center to view more videos!
What are “Local Admin Rights” for computers, and do I want my end users to have them? Every time you log onto your computer, you’re doing so with your “User Account”. That’s not just your user name and password. It’s all of the setting specific to your account.
What are “Local Admin Rights” for computers, and do I want my end users to have them?
Every time you log onto your computer, you’re doing so with your “User Account”. That’s not just your user name and password. It’s all of the setting specific to your account. Some of it’s about how programs should behave. Some of it’s about security.
And one of the most important settings about your User Account? Whether you have…”Local Admin Rights”.
If your account has these rights, you can essentially do…anything…to your computer. Install and uninstall programs. Install other components. Change anything. Add other users. Oh, and delete other users as well. Change passwords. Patch and update pretty much any part of the system. Heck, nuke the entire system.
Visit our Learning Center to view more videos!
In this webinar, we discussed 5 actionable ways that you may be able to save money without compromising the value, productivity and security that IT brings to your organization (and your clients). We also talked about things like Shadow IT, training, financing and more.
In this webinar, we discussed 5 actionable ways that you may be able to save money without compromising the value, productivity and security that IT brings to your organization (and your clients). We also talked about things like Shadow IT, training, financing and more.
Visit our Learning Center to view more videos!
Thanks everyone for coming out, we had such a great time! Thank you to Quarter Up for hosting us again!
Thanks everyone for coming out, we had such a great time! Thank you to Quarter Up for hosting us again!
Visit our Learning Center to view more videos!
Pen testing is short for penetration testing, which is where you hire the good guys to act like the bad guys and break into your network. A good pen tester will do some information gathering, which is referred to as reconnaissance, ahead of time.
Pen testing is short for penetration testing, which is where you hire the good guys to act like the bad guys and break into your network. A good pen tester will do some information gathering, which is referred to as reconnaissance, ahead of time. Their goal is to figure out what their targets are in the network and how they're going to try to break in.
Visit our Learning Center to view more videos!
Technically, the “Dark Web” is simply areas on the Internet that require specific credentials or software or configurations to access. Resources on the Dark Web do their best *not* to show up on search engines.
Technically, the “Dark Web” is simply areas on the Internet that require specific credentials or software or configurations to access. Resources on the Dark Web do their best *not* to show up on search engines, and all resources on the Dark Web do their darndest to be anonymous. To anyone.
Visit our Learning Center to view more videos!
5 reasons why your organization might not want to use an MSP for their IT support needs.
When should you not use an MSP? 5 reasons why your organization might not want to use an MSP for their IT support needs.
Visit our Learning Center to view more videos!
Shadow IT is a term given to IT resources...hardware, software, subscriptions, services...that are used by an organization without the knowledge of whoever’s handling IT or cybersecurity for the organization.
What is Shadow IT? Shadow IT is a term given to IT resources...hardware, software, subscriptions, services...that are used by an organization without the knowledge of whoever’s handling IT or cybersecurity for the organization.
Visit our Learning Center to view more videos!
We had the best time getting to attend and sponsor another @Manufacturing Works networking event.
We had the best time getting to attend and sponsor another @Manufacturing Works networking event. Check out more on Manufacturing Works: https://www.mfgworkscle.org/
Visit our Learning Center to view more videos!
Insurance companies are getting stricter in what their clients need to do on the security front before offering a cyber security policy.
Do we have to tell the truth when it comes to Cyber Insurance?On July 5 in the U.S. District Court for the Central District of Illinois, Travelers said it would not have issued a cyber insurance policy earlier this year to an electronics manufacturing services company if the insurer (Travelers) knew the company was not using MFA as it said.
Visit our Learning Center to view more videos!
What is Co-Managed IT services, anyway? Great question. We’ve talked before about Managed Services, a relationship that organizations use to obtain IT services exclusively from a 3rd party, aka an MSP (Managed Service Provider).
What is Co-Managed IT services, anyway? Great question. We’ve talked before about Managed Services, a relationship that organizations use to obtain IT services exclusively from a 3rd party, aka an MSP (Managed Service Provider).
But is there a way to get the best of both worlds? A situation where an organization can have a combination of both internal IT employees and a Managed Service Provider that is cheaper and more effective (and secure) then an exclusive use of either?
Yup. And that’s Co-Managed IT services.
Visit our Learning Center to view more videos!
SSL stands for "Secure Socket Layer" and are important in IT. Companies purchase SSL Certs from 3rd party resellers like GoDaddy or Network Solutions. These 3rd parties verify that the company is who they say they are.
SSL stands for "Secure Socket Layer" and are important in IT. Companies purchase SSL Certs from 3rd party resellers like GoDaddy or Network Solutions. These 3rd parties verify that the company is who they say they are.
Visit our Learning Center to view more videos!
The simple answer is that computers aren't perfect. The bad guys are using low-tech emails from using common email addresses from a legit email provider like Gmail or Yahoo.
Why Do I Still Get Spam if I Have a Spam Folder? The simple answer is that computers aren't perfect. The bad guys are using low-tech emails from using common email addresses from a legit email provider like Gmail or Yahoo.
Visit our Learning Center to view more videos!
Let's talk about IT certificates. There are 2 types: Vendor oriented and Vendor Neutral.
Let's talk about IT certificates. There are 2 types: Vendor oriented and Vendor Neutral.
Visit our Learning Center to view more videos!
Are IT Certifications worth it? Bob discusses advantanges for the individual, the hiring company and the employer for receiving IT Certifications.
Here at Simplex-IT we try to actively encourage our employees for developing new skills and certifications. We pay for the training, and we give bonuses and/or pay raises when they achieve their goals. We have employees here who hold certifications with Microsoft, Cisco, CompTIA, Sophos, Datto and more.
Visit our Learning Center to view more videos!
What is Infrastructure as a Service or IaaS, Software as a Service or SaaS, and Platform as a Service or PaaS?
In this video Kurt, our Senior Network Engineer, explains Infrastructure as a Service or IaaS, Software as a Service or SaaS, and Platform as a Service or PaaS?
Visit our Learning Center to view more videos!
What is the new exchange threat? Should I be worried about the new exchange threat? How can I protect myself against the new exchange threat?
What is the new exchange threat? Should I be worried about the new exchange threat? How can I protect myself against the new exchange threat?
Fear not, CyberMattLee and Bob Coppedge are here to save the day. Session Manager uses the same vulnerabilities that were discovered last year. Microsoft patched the Exchange server to protect against that vulnerability. So if your organization has kept up with patching your Exchange servers you're actually already protected from this threat.
Visit our Learning Center to view more videos!
What is the Difference Between Business Continuity and Disaster Recovery? And which would you want for your business?
What is the Difference Between Business Continuity and Disaster Recovery? And which would you want for your business?
Visit our Learning Center to view more videos!
So how much does the cloud cost? Well it depends on the size and complexity of what you want to use the cloud for. The price will increase when you start including things like VMs, replication, backups, and other applications.
So how much does the cloud cost? Well it depends on the size and complexity of what you want to use the cloud for. The price will increase when you start including things like VMs, replication, backups, and other applications.
Visit our Learning Center to view more videos!
In a nutshell Follina is where bad guys send a malicious document, usually as an email attachment. That document would open up a URL (a web address) and start executing code located on that web site to take control of the system that opened up the document.
In a nutshell Follina is where bad guys send a malicious document, usually as an email attachment. That document would open up a URL (a web address) and start executing code located on that web site to take control of the system that opened up the document.
You can read more about it here: https://www.huntress.com/blog/microsoft-office-remote-code-execution-follina-msdt-bug
Visit our Learning Center to view more videos!
What is the difference between CapEx and OpEx? This is a continuation of our Cloud series.
What is the difference between CapEx and OpEx?
CapEx is the capital expenditure where every five years a business will get an amount of money roughly $50,000 to $100,000 to buy a new physical server.
OpEx is an operational expenditure with predictable monthly costs. So instead of CapEx where you spend $50,000- $100,000 every five years, you will spend roughly $600 a month to run the cloud infrastructure.
Visit our Learning Center to view more videos!
Azure is Microsoft’s version of a cloud service. Other companies like Amazon and Google also have their own versions of cloud services to choose from.
Azure is Microsoft’s version of a cloud service. Other companies like Amazon and Google also have their own versions of cloud services to choose from.
Visit our Learning Center to view more videos!
So you’re wondering whether it’s time to replace your desktops and/or laptops. Or you’re buying new computers but want to save as much money as you can. Why should the term “TPM” mean anything to you?
So you’re wondering whether it’s time to replace your desktops and/or laptops. Or you’re buying new computers but want to save as much money as you can. Why should the term “TPM” mean anything to you?
Visit our Learning Center to view more videos!
Cybersecurity is complicated. As we’ve discussed before, every opportunity to get data flowing between applications, devices, organizations, anything…is an equal opportunity for a bad actor to access that data.
Cybersecurity is complicated. As we’ve discussed before, every opportunity to get data flowing between applications, devices, organizations, anything…is an equal opportunity for a bad actor to access that data. And by access, I mean steal, modify, encrypt, destroy. And they’re just as financially motivated as you or any other businessperson to come up with new ways to do this.
Visit our Learning Center to view more videos!
People are always asking us, "Why is IT so hard?". We love to make it as easy as possible by simplifying the complex. If all of these IT terms overwhelm you, then consider getting a partner for your organization to help you through it.
People are always asking us, "Why is IT so hard?". We love to make it as easy as possible by simplifying the complex. If all of these IT terms overwhelm you, then consider getting a partner for your organization to help you through it.
Visit our Learning Center to view more videos!
There are 3 types of clouds: Public- Private- Hybrid. Learn which option is best for you and your organization.
There are 3 types of clouds: Public, Private, and Hybrid. Learn which option is best for you and your organization.
Visit our Learning Center to view more videos!
Not all relationships last forever. We get that and although we hope that ours does, the cards might not agree. However it’s important to us that each month we can look at each other and say, “we got value out of this.”
Not all relationships last forever. We get that and although we hope that ours does, the cards might not agree. However it’s important to us that each month we can look at each other and say, “we got value out of this.”
Visit our Learning Center for more videos!
Why do I need to manage Passwords? Because passwords are a pain! Why do I need a Password Management system for my organization? Because passwords and users are a bigger pain!
Why do I need to manage Passwords? Because passwords are a pain! Why do I need a Password Management system for my organization? Because passwords and users are a bigger pain!
Visit our Learning Center for more videos!
So, what the heck is the cloud? In the tech industry, the joke is that the cloud is somebody else’s computer. But to break it down, the cloud is taking the server in your office and migrating it to a resilient data center that you access over a private network or internet.
So, what the heck is the cloud? In the tech industry, the joke is that the cloud is somebody else’s computer. But to break it down, the cloud is taking the server in your office and migrating it to a resilient data center that you access over a private network or internet.
Visit our Learning Center for more videos!
5 ways organizations can get IT support. Depending on the complexity of your organization, you actually might be using more than one! But if your organization uses Abdication or Seagulls, we need to talk.
5 ways organizations can get IT support. Depending on the complexity of your organization, you actually might be using more than one! But if your organization uses Abdication or Seagulls, we need to talk.
Visit our Learning Center for more videos!
So, why do we include a one-time onboarding fee to get the relationship started in addition to the monthly services?
That’s a good question, let’s talk about it.
So, why do we include a one-time onboarding fee to get the relationship started in addition to the monthly services?That's a good question, let's talk about it.
A Managed Service agreement means we’re taking full or co-managed responsibility for the entire IT strategy of an organization. That means we are monitoring, managing, securing and supporting a wide variety of IT resources for…well, everything IT. From end users end point. Firewalls. Backups including business continuity solutions. Supporting desktops, laptops and mobile devices. Servers. Cloud services. Security. Work from the office, home…anywhere.
What’s the alternative? “Figure it out as we go?” I don’t think so. You want to get the Strongest, Healthiest IT for your organization and all your stakeholders. To do that we need to make sure we have our ducks in a row.
That's where the onboarding project and one-time fee comes in. We’re positioning ourselves for a productive relationship.
Visit our Learning Center for more videos!
We had the best time getting to attend and sponsor the Manufacturing Works Talent and Technology Showcase Annual Meeting event.
We had the best time getting to attend and sponsor the Manufacturing Works Talent and Technology Showcase Annual Meeting event.
Visit our Learning Center for more videos!
Doesn't IT handle all cybersecurity? In a word no. This video is a great explanation as to why cybersecurity is more than just the IT department or MSPs responsibility.
Doesn't IT handle all cybersecurity? In a word no. This video is a great explanation as to why cybersecurity is more than just the IT department or MSPs responsibility.
Visit our Learning Center for more videos!
IT has developed incredible ways to increase productivity for organizations where they bring value throughout the organization and for all their customers and stakeholders.
IT has developed incredible ways to increase productivity for organizations where they bring value throughout the organization and for all their customers and stakeholders. However as companies have evolved to increase their use of IT, organized crime has also evolved.
Visit our Learning Center for more videos!
Silo IT is a form of IT services or support, usually as part of a Co-Managed IT relationship.
Silo IT is a form of IT services or support, usually as part of a Co-Managed IT relationship.
It could be database servers, like Microsoft SQL or Oracle. Or Business Intelligence. Actively manage Backup and Disaster Recovery, including Business Continuity solutions. Cloud services, like MS 365, Azure or Amazon Web Services. Phone Systems. Mobile devices. Linux boxes, Macs. Stuff that you can easily create a…what’s the word I’m looking for…silo around.
Visit our Learning Center for more videos!
We had a great time at the Channel Strong Tour meeting with other MSPs in the area as well as the various vendors that came! Thank you to our clients who also showed up!
We had a great time at the Channel Strong Tour meeting with other MSPs in the area as well as the various vendors that came! Thank you to our clients who also showed up! Channel Strong went all out with cornhole, delicious food, and plenty of beer! Thank you to Channel Strong as well as the many vendors who made this event so amazing!
Visit our Learning Center for more videos!
Multifactor authentication is another layer of security beyond a password and there are many ways to introduce additional authentication methods.
Multifactor authentication is another layer of security beyond a password and there are many ways to introduce additional authentication methods. Some examples are: a physical device like a fob or a software that can be installed on your phone or device, fingerprints, facial recognition, voice recognition, something that can not be replicated by the bad guys.
Visit our Learning Center for more videos!
Simplex-IT’s Cybersecurity Czar Adam Evans and CEO Bob Coppedge highlight 5 steps your organization can (relatively) quickly and easily implement towards protecting your organization.
Cyber security is a critical topic for all organizations and governments. Many organizations are caught up in the alphabet soups of “NIST”, “CMMC”, “MFA”.
Simplex-IT’s Cyber Security Czar Adam Evans and CEO Bob Coppedge highlight 5 steps your organization can (relatively) quickly and easily implement towards protecting your organization.
To be clear, this isn’t a full-fledged cyber security strategy. But this will get you started and significantly decrease the vulnerability of your organization.
Visit our Learning Center for more videos!
An MSP is a third-party company that a business can collaborate with to help manage part or all of the IT for a business, both locally (aka "on prem") or in the cloud.
What is a managed service provider?
That's actually kinda funny, because there actually isn't one standard definition that fits everyone. But that won't stop us!
An MSP is a third-party company that a business can collaborate with to help manage part or all of the IT for a business, both locally (aka "on prem") or in the cloud.
An MSP provides technology and expertise to boost the organization's ability to scale. Working with MSPs can have tremendous benefits for an enterprise. For instance, their understanding of cutting-edge technology can help improve performance, operations, and security while reducing overhead. In addition, they can offer several creative solutions to help navigate the evolving landscape of the big data world.
A successful MSP should be able to deliver tailor-made solutions that fit a company perfectly using tools and strategies that they're very familiar with. And let's talk about specialized skill. Some organizations might need specialized skills, but not enough for a full-time person. It's really hard, for example, to hire 20% of a Senior Database Analyst. Believe me, we've tried. That's especially true when it comes to strategic planning. If an organization isn't large enough to have a Chief Information Officer (CIO) position, the MSP should be able to fulfill that role. Often this is called a virtual or fractional CIO.
Visit our Learning Center for more videos!
Are IT certifications truly worth the investment for your tech team? The short answer: yes. Certifications like CompTIA and Cisco hold immense value for IT professionals and businesses alike. Investing in certifications isn’t just a checkbox—it’s a strategy for building a more capable, motivated, and credible IT team.
Play Video
Are IT certifications truly worth the investment for your tech team? The short answer: yes. Certifications like CompTIA and Cisco hold immense value for IT professionals and businesses alike. Investing in certifications isn’t just a checkbox—it’s a strategy for building a more capable, motivated, and credible IT team.
Visit our Learning Center to view more videos!