Learning Center: Videos

Our Learning Center Video Library is designed to provide answers to questions that we are most frequently asked.  Since we have so many videos, we have separated them out into categories to help you navigate to the video that will best answer your questions. We also have a search feature on each page.

Skip to Videos
  • Are QR Codes Safe? Tips for Using Them Securely

    Are QR Codes Safe? Tips for Using Them Securely

    QR codes are everywhere nowadays, right? You see them on menus, posters, flyers—pretty much everywhere. They're super handy too! Just whip out your phone, snap a pic, and bam! You're directed to a link, a discount, or even a video. But hold up, there's a sneaky side to these little squares.

    Play Video

  • Level up Your Team’s Cybersecurity Knowledge (and Test ‘em)

    Level up Your Team’s Cybersecurity Knowledge (and Test ‘em)

    Cybersecurity Training. Simulated Phishing. It's included with your Model '23 and '24 agreement. Learn how to track your employees and see if they're clicking where they shouldn't. This isn't just another training tool. It's a dynamic solution designed to engage and empower your team members with concise, entertaining videos packed with actionable insights.

    Play Video

  • What is Ransomware?

    What is Ransomware?

    Ransomware is a type of malware that hackers use to encrypt your files or lock you out of your own computer or device. Once your files are encrypted or your device is locked, the cybercriminals demand a ransom payment from you, usually in cryptocurrency like Bitcoin, in exchange for the key or code to unlock your files or device.

    Play Video

  • What is Innovation Debt?

    What is Innovation Debt?

    Innovation debt, also known as technical debt, is a term used to describe the costs that companies and organizations incur when they delay investing in new technologies or ideas that can help them remain competitive.

    Play Video

  • How Do You Submit a Service Ticket?

    How Do You Submit a Service Ticket?

    Submitting a service ticket is an important part of working with your IT provider, but it shouldn’t be complicated! Here at Simplex-IT we have an easy process for you! So how do you submit a service ticket? There are three options.

    Play Video

  • What is the difference between 3G, 4G, 5G?

    What is the difference between 3G, 4G, 5G?

    What is the difference between 3G, 4G, 5G? Let's break down the differences between 3G, 4G, and 5G in a simple way, without getting too technical. 3G was the third generation of mobile networks, providing faster data transfer speeds compared to its predecessor, 2G.

    Play Video

  • Elevate Your Team's Skills with Bigger Brains

    Elevate Your Team's Skills with Bigger Brains

    Bob explains the power of Bigger Brains' extensive library of over 200 eLearning courses, focusing on essential business productivity tools such as Microsoft 365, Excel, Outlook, Teams, and is tailored for professionals at all levels. Take you and your team’s skills to the next level

    Play Video

  • What is SPOF or Single Point of Failure?

    What is SPOF or Single Point of Failure?

    A Single Point of Failure is a potential risk caused by a flaw in the design, implementation, or configuration of a system. It’s the one fault that can shut down an entire system. This could be in your cybersecurity, networking, and similar aspects.

    Play Video

  • What To Do With Your Eclipse Glasses After The Eclipse?

    What To Do With Your Eclipse Glasses After The Eclipse?

    Wondering what to do with your eclipse glasses now that the eclipse is over?

    Check out the website: astronomerswithoutborders.org

    Play Video

  • What is Operating System?

    What is Operating System?

    So you have a computer, and you want to do various tasks like writing documents, browsing the internet, or playing games. To make these tasks possible, your computer needs something to manage and coordinate all the different parts inside it. This is where the operating system (OS) comes in.

    Play Video

  • Recap of Cybersecurity Event - Thank You for Joining!

    Recap of Cybersecurity Event - Thank You for Joining!

    Missed out on the incredible evening at Missing Falls Brewery? Don't worry! We've got you covered with an exclusive recap of the event that brought together cybersecurity experts, beer enthusiasts, and eclipse enthusiasts! A heartfelt thank you to all who joined us for this incredible event!

    Play Video

  • What is Firmware?

    What is Firmware?

    Ever received a "Firmware update available" notification and wondered what you're actually updating? In this video, we break down the concept of firmware, the unsung hero embedded in our devices. Firmware is a specialized type of software embedded in hardware devices, dictating how they function.

    Play Video

  • What is Network Monitoring?

    What is Network Monitoring?

    Network monitoring is the process of observing and analyzing the traffic and behavior of computer networks to ensure they are performing optimally and securely. They make sure everything is in order and there are no suspicious activities or potential threats.

    Play Video

  • New AI Service at Simplex-IT

    New AI Service at Simplex-IT

    Announcing Simplex-IT’s new AI service. AI has been all the buzz lately so we figured we would jump on the bandwagon and add on a new service for all of our clients. Don’t worry if you’re not already a client, for today only you can add this once in a lifetime service on to any agreement at no additional cost, just use the code APRIL FOOLS.

    Play Video

  • What is DomainKeys Identified Mail (DKIM)?

    What is DomainKeys Identified Mail (DKIM)?

    DKIM, DomainKeys Identified Mail, is used to authenticate an email. It uses a digital signature to let the email recipient know the message and content of the email was authorized by the domain owner. How does DKIM work? Actually it's fairly complicated in terms of generating public and private keys in order to verify the content of your email.

    Play Video

  • Managing Your Passwords the Safe way with Keeper

    Managing Your Passwords the Safe way with Keeper

    In this webinar, we will show you the basics of Keeper, a security vault that allows you to securely access and manage your passwords across devices. Kurt and Bob will tell you how to use this tool to increase security on your accounts without having to memorize dozens of complicated passwords. Keeper is included for your management team in our new Model Year ’24 agreement!

    Play Video

  • Securing Your Tomorrow: An Intro To Our Advanced MDR Solution Webinar

    Securing Your Tomorrow: An Intro To Our Advanced MDR Solution Webinar

    Sophos MDR expert, Christopher Glick, gives an eye-opening session on Managed Detection and Response (MDR). Picture this: a fully managed 24/7 service delivered by top-notch experts who constantly detect and respond to cyberattacks targeting every facet of your digital infrastructure.

    Play Video

  • What is Sender Policy Framework or SPF?

    What is Sender Policy Framework or SPF?

    Sender Policy Framework (SPF) is an email authentication protocol designed to prevent email spoofing and spam. It restricts who can use an organization's domain as the sender of the email. In most phishing attacks, threat actors usually spoof the sender's email address to look official. SPF prevents that from being received.

    Play Video

  • Happy Pi Day 🥧

    Happy Pi Day 🥧

    Today is one of our favorite holidays – it's Pi Day! For those of you who don't know, March 14th is Pi Day and celebrates the famous never-ending number. And since we're a bunch of IT nerds, we take this day very seriously. Every year on Pi Day, we take the time to thank our clients and some other local businesses by delivering a pie to their offices.

    Play Video

  • What is DMARC?

    What is DMARC?

    DMARC, Domain-based Message Authentication, Reporting & Conformance, is an email security protocol that verifies email senders by building on the DNS services and the SPF, and DKIM protocols. It was created to block the threat of email spoofing, domain spoofing, email phishing, business email compromise, and other email-based attacks.

    Play Video

  • What is DMARC the Simplified Version?

    What is DMARC the Simplified Version?

    Domain-based Message Authentication, Reporting & Conformance. It’s actually a 4 letter acronym that really takes advantage of a 3 letter and a 4 letter acronym, SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail). So together we have an 11 letter acronym. And if you want emails from your company to be safely delivered, better pay attention.

    Play Video

  • What is RAM?

    What is RAM?

    RAM, or Random Access Memory, is a dynamic player in the world of computer memory. Unlike storage devices, RAM is volatile and acts as the computer's short-term memory, storing actively used and processed data. Imagine your computer's RAM as a desk – the larger it is, the more tasks and processes it can handle simultaneously.

    Play Video

  • What is an Insider Threat?

    What is an Insider Threat?

    An insider threat refers to the risk or potential harm posed to an organization's data, systems, or security by individuals who have authorized access to the organization's resources. These individuals could be current/ former employees, contractors, or business partners…

    Play Video

  • What is the Difference Between a CIO & a vCIO?

    What is the Difference Between a CIO & a vCIO?

    A CIO (Chief Information Officer) is a high-level executive responsible for overseeing a company's information technology (IT) strategy and operations. On the other hand, a vCIO (virtual Chief Information Officer) is a consultant or an outsourced service provider who provides similar services as a CIO, but on a part-time or project basis.
    Play Video

  • What is the Difference Between Virtual Reality, Augmented Reality, and Mixed Reality?

    What is the Difference Between Virtual Reality, Augmented Reality, and Mixed Reality?

    In recent years, technology has rapidly changed the way we interact with the digital world. There are two terms that have been used over the past few years that may sound familiar. VR, Virtual Reality, and AR, or Augmented Reality. One you probably haven’t heard of as much is MR, or Mixed Reality.

    Play Video

  • What is a Cookie?

    What is a Cookie?

    What is a cookie? Besides being a wonderful little dessert, a cookie is also a tech term. Imagine you're at a party, and the host gives you a sticker with your name on it. This sticker helps the host remember your name throughout the party, so they can greet you by name and offer you things you might like.

    Play Video

  • What is a BCDR device?

    What is a BCDR device?

    A BCDR device stands for Business Continuity and Disaster Recovery device. It's a specialized tool that helps businesses protect their data and IT infrastructure in case of unexpected events like natural disasters, power outages, cyber attacks, and hardware failures.

    Play Video

  • CMMC Proposed Rules

    CMMC Proposed Rules

    CMMC Proposed Rule Published with Bob Coppedge, CEO @simplex-it and Tim Golden CEO @compliancescorecard . What's Impacted? What to do? Need to Know More?

    Play Video

  • What is a Server?

    What is a Server?

    A server, in the IT world, is a specialized, powerful computer that serves a specific purpose. A server is a super-smart, super-organized computer that does important jobs for other devices, like your regular home computer or phone. It's not meant for browsing the internet, playing games, or watching videos.

    Play Video

  • What do the Abbreviations EDR, MDR, MTR, and XDR Mean?

    What do the Abbreviations EDR, MDR, MTR, and XDR Mean?

    When talking about cybersecurity solutions, there’s a ton of different acronyms and abbreviations. You’ve probably heard about EDR, MDR, MTR, and XDR. But what do all of these mean? Let’s dive in.

    Play Video