Learning Center: Videos
Our Learning Center Video Library is designed to provide answers to questions that we are most frequently asked. Since we have so many videos, we have separated them out into categories to help you navigate to the video that will best answer your questions. We also have a search feature on each page.
-
Case Weatherhead Award 2022
The Case Weatherhead awards are honestly the premier business awards in Northeast Ohio. And for the sixth year, Simplex-IT has been recognized by those fine folks. Yup, Simplex-IT is a winner of the Weatherhead 100 award for 2022.
How do you select the right MSP?
Hiring a Managed Service Provider (MSP) for your organization shouldn't be a hasty decision. Here are six important factors to keep in mind:
D2P Show
Simplex-IT will be at the Design2Part show at the John S. Knight Center in Akron, Ohio, October 26th and 27th, 2022.
What is the Cost of Downtime?
How expensive is downtime? "The Server is down." Yeah, we hate to hear that. Because downtime is expensive. But how expensive? That's a really important number that we ignore way too much. Downtime.
Manufacturing and Technology Show
Hey, if you're in manufacturing and have some time October 18-20, come visit the Manufacturing & Technology show at the Huntington Convention Center here in Cleveland. Simplex-IT is proud to be one of the folks exhibiting there. So obviously you should attend.
What is Authentication?
Authentication is a process to validate the identity of someone (or something). For this conversation we’re talking strictly in the cyber world.
Are Cyber Criminals Entrepreneurs?
Think about the bad guys behind cybercrime. Do you think of the evil genius writing evil stuff living in moms basement? Or the head of an organization with employees, products and marketing strategies making millions of dollars?
How Can I Tell If an Email Is a Scam?
I want to show you something that we just received that is actually kind of funny. Spoiler alert it's bad guys trying to get us to give them money and we foiled it. We will show you how!
What Should You Do If Your Organization Has Been Breached?
Does your organization have data backups or an incident response plan? If you already have an organization with a strong cybersecurity background, contact them immediately and follow their lead. If you’re on your own, here are some steps you can follow.
What Makes Simplex-IT Unique?
Four unique things about Simplex-IT, MSP first and foremost, the industry recognized leader in Co-Managed IT services, ever evolving solutions with a focus on security, and empowering clients and community with open knowledge sharing.
IT Budgeting 101 Webinar
IT Budgeting is a planning tool. The budget helps us see down the road and around corners. Budgets drive lifecycle management and are a critical component of strategic planning. Planning expenses and values behind them is key to creating a strong, healthy IT resource for any organization.
Should You Care About Uber Being Hacked?
Should You Care About Uber Being Hacked? The quick answer is yes-ish. So far Uber has not come forward with any claims of any meaningful user data but the jury is still out to a certain degree. So what should you do?
How Do You Keep Your Services Up to Date?
IT changes. A lot. And often. So how do we keep up in terms of IT support and cybersecurity services? Here at Simplex-IT we've developed our services around an annual cycle. We consistently watch the market for emerging technologies, evaluate, and then select the best options for our clients.
Am I Too Small For Cybercriminals?
The bottom line is you’re “big enough” to warrant attention. Everyone is. And your organization is “big enough” to warrant the same attention from the bad guys. All organizations are. It’s time for you to take security seriously!
When should I use an MSP?
We've discussed what a Managed Service Provider (aka MSP) is before and we've even talked about when you shouldn't use an MSP to support the IT for your organization. So we still need to cover when you should use an MSP, right?
What is Break Fix?
Break Fix is a simple concept. It's not limited to IT. The bottom line for Break Fix is this: "When it breaks...fix it. Otherwise, leave it alone." But if you get bit by just a couple break-fix vulnerabilities, the savings you think that break-fix brings are likely gone.
Why shouldn't everyone have access to everything?
The principle of least access is the idea that an employee only should have access to the bare minimum amount of technology systems they need to do their job. Applying the principle of least access will limit the amount of information that is compromised during an attack.
Why Can't We Pick and Choose Only the IT Services We Want?
We are trying to create the best and most productive and secure IT environment for your organization and there is a lot that goes into every one of these aspects that are critical to your organization’s success. And it’s kind of like Jenga.
Should I Be Concerned About LastPass And Their Data Breach?
So, you've heard us (and lots of other folks) warn you over and over again...use a password manager to protect your...ummm...passwords. Like LastPass. You know, the cloud-based password manager that was hacked two weeks ago.
Types of Phishing Attacks and How to Avoid Them
Here are a few types of phishing campaigns and how they work. And the best way to protect against phishing is to protect your information and your technology by using multifactor authentication, and train your employees.
Who Are NIST and CISA and Why Do They Matter?
NIST stands for National Institutes of Standards and Technology and they're the ones that define all these industry standard practices. They're the ones that define what exactly is a pound, but they also write cybersecurity frameworks and compliance frameworks.
Should Users Have Admin Rights?
What are “Local Admin Rights” for computers, and do I want my end users to have them? Every time you log onto your computer, you’re doing so with your “User Account”. That’s not just your user name and password. It’s all of the setting specific to your account.
5 Ways to Cut IT Costs Webinar
In this webinar, we discussed 5 actionable ways that you may be able to save money without compromising the value, productivity and security that IT brings to your organization (and your clients). We also talked about things like Shadow IT, training, financing and more.
Simplex-IT's 15th anniversary Party Recap!
Thanks everyone for coming out, we had such a great time! Thank you to Quarter Up for hosting us again!
What is a Pen Test?
Pen testing is short for penetration testing, which is where you hire the good guys to act like the bad guys and break into your network. A good pen tester will do some information gathering, which is referred to as reconnaissance, ahead of time.
What is the Dark Web?
Technically, the “Dark Web” is simply areas on the Internet that require specific credentials or software or configurations to access. Resources on the Dark Web do their best *not* to show up on search engines.
When NOT to use an MSP?
5 reasons why your organization might not want to use an MSP for their IT support needs.
What is Shadow IT?
Shadow IT is a term given to IT resources...hardware, software, subscriptions, services...that are used by an organization without the knowledge of whoever’s handling IT or cybersecurity for the organization.
Summer in Scotland Recap
We had the best time getting to attend and sponsor another @Manufacturing Works networking event.