Learning Center: Videos

Our Learning Center Video Library is designed to provide answers to questions that we are most frequently asked.  Since we have so many videos, we have separated them out into categories to help you navigate to the video that will best answer your questions. We also have a search feature on each page.

Skip to Videos
  • Case Weatherhead Award 2022

    Case Weatherhead Award 2022

    The Case Weatherhead awards are honestly the premier business awards in Northeast Ohio. And for the sixth year, Simplex-IT has been recognized by those fine folks. Yup, Simplex-IT is a winner of the Weatherhead 100 award for 2022.

    Play Video

  • How do you select the right MSP?

    How do you select the right MSP?

    Hiring a Managed Service Provider (MSP) for your organization shouldn't be a hasty decision. Here are six important factors to keep in mind:

    Play Video

  • D2P Show

    D2P Show

    Simplex-IT will be at the Design2Part show at the John S. Knight Center in Akron, Ohio, October 26th and 27th, 2022.

    Play Video

  • What is the Cost of Downtime?

    What is the Cost of Downtime?

    How expensive is downtime? "The Server is down." Yeah, we hate to hear that. Because downtime is expensive. But how expensive? That's a really important number that we ignore way too much. Downtime.

    Play Video

  • Manufacturing and Technology Show

    Manufacturing and Technology Show

    Hey, if you're in manufacturing and have some time October 18-20, come visit the Manufacturing & Technology show at the Huntington Convention Center here in Cleveland. Simplex-IT is proud to be one of the folks exhibiting there. So obviously you should attend.

    Play Video

  • What is Authentication?

    What is Authentication?

    Authentication is a process to validate the identity of someone (or something). For this conversation we’re talking strictly in the cyber world.

    Play Video

  • Are Cyber Criminals Entrepreneurs?

    Are Cyber Criminals Entrepreneurs?

    Think about the bad guys behind cybercrime. Do you think of the evil genius writing evil stuff living in moms basement? Or the head of an organization with employees, products and marketing strategies making millions of dollars?

    Play Video

  • How Can I Tell If an Email Is a Scam?

    How Can I Tell If an Email Is a Scam?

    I want to show you something that we just received that is actually kind of funny. Spoiler alert it's bad guys trying to get us to give them money and we foiled it. We will show you how!

    Play Video

  • What Should You Do If Your Organization Has Been Breached?

    What Should You Do If Your Organization Has Been Breached?

    Does your organization have data backups or an incident response plan? If you already have an organization with a strong cybersecurity background, contact them immediately and follow their lead. If you’re on your own, here are some steps you can follow.

    Play Video

  • What Makes Simplex-IT Unique?

    What Makes Simplex-IT Unique?

    Four unique things about Simplex-IT, MSP first and foremost, the industry recognized leader in Co-Managed IT services, ever evolving solutions with a focus on security, and empowering clients and community with open knowledge sharing.

    Play Video

  • IT Budgeting 101 Webinar

    IT Budgeting 101 Webinar

    IT Budgeting is a planning tool. The budget helps us see down the road and around corners. Budgets drive lifecycle management and are a critical component of strategic planning. Planning expenses and values behind them is key to creating a strong, healthy IT resource for any organization.

    Play Video

  • Should You Care About Uber Being Hacked?

    Should You Care About Uber Being Hacked?

    Should You Care About Uber Being Hacked? The quick answer is yes-ish. So far Uber has not come forward with any claims of any meaningful user data but the jury is still out to a certain degree. So what should you do?

    Play Video

  • How Do You Keep Your Services Up to Date?

    How Do You Keep Your Services Up to Date?

    IT changes. A lot. And often. So how do we keep up in terms of IT support and cybersecurity services? Here at Simplex-IT we've developed our services around an annual cycle. We consistently watch the market for emerging technologies, evaluate, and then select the best options for our clients.

    Play Video

  • Am I Too Small For Cybercriminals?

    Am I Too Small For Cybercriminals?

    The bottom line is you’re “big enough” to warrant attention. Everyone is. And your organization is “big enough” to warrant the same attention from the bad guys. All organizations are. It’s time for you to take security seriously!

    Play Video

  • When should I use an MSP?

    When should I use an MSP?

    We've discussed what a Managed Service Provider (aka MSP) is before and we've even talked about when you shouldn't use an MSP to support the IT for your organization. So we still need to cover when you should use an MSP, right?

    Play Video

  • What is Break Fix?

    What is Break Fix?

    Break Fix is a simple concept. It's not limited to IT. The bottom line for Break Fix is this: "When it breaks...fix it. Otherwise, leave it alone." But if you get bit by just a couple break-fix vulnerabilities, the savings you think that break-fix brings are likely gone.

    Play Video

  • Why shouldn't everyone have access to everything?

    Why shouldn't everyone have access to everything?

    The principle of least access is the idea that an employee only should have access to the bare minimum amount of technology systems they need to do their job. Applying the principle of least access will limit the amount of information that is compromised during an attack.

    Play Video

  • Why Can't We Pick and Choose Only the IT Services We Want?

    Why Can't We Pick and Choose Only the IT Services We Want?

    We are trying to create the best and most productive and secure IT environment for your organization and there is a lot that goes into every one of these aspects that are critical to your organization’s success. And it’s kind of like Jenga.

    Play Video

  • Should I Be Concerned About LastPass And Their Data Breach?

    Should I Be Concerned About LastPass And Their Data Breach?

    So, you've heard us (and lots of other folks) warn you over and over again...use a password manager to protect your...ummm...passwords. Like LastPass. You know, the cloud-based password manager that was hacked two weeks ago.

    Play Video

  • Types of Phishing Attacks and How to Avoid Them

    Types of Phishing Attacks and How to Avoid Them

    Here are a few types of phishing campaigns and how they work. And the best way to protect against phishing is to protect your information and your technology by using multifactor authentication, and train your employees.

    Play Video

  • Who Are NIST and CISA and Why Do They Matter?

    Who Are NIST and CISA and Why Do They Matter?

    NIST stands for National Institutes of Standards and Technology and they're the ones that define all these industry standard practices. They're the ones that define what exactly is a pound, but they also write cybersecurity frameworks and compliance frameworks.

    Play Video

  • Should Users Have Admin Rights?

    Should Users Have Admin Rights?

    What are “Local Admin Rights” for computers, and do I want my end users to have them? Every time you log onto your computer, you’re doing so with your “User Account”. That’s not just your user name and password. It’s all of the setting specific to your account.

    Play Video

  • 5 Ways to Cut IT Costs Webinar

    5 Ways to Cut IT Costs Webinar

    In this webinar, we discussed 5 actionable ways that you may be able to save money without compromising the value, productivity and security that IT brings to your organization (and your clients). We also talked about things like Shadow IT, training, financing and more.

    Play Video

  • Simplex-IT's 15th anniversary Party Recap!

    Simplex-IT's 15th anniversary Party Recap!

    Thanks everyone for coming out, we had such a great time! Thank you to Quarter Up for hosting us again!

    Play Video

  • What is a Pen Test?

    What is a Pen Test?

    Pen testing is short for penetration testing, which is where you hire the good guys to act like the bad guys and break into your network. A good pen tester will do some information gathering, which is referred to as reconnaissance, ahead of time.

    Play Video

  • What is the Dark Web?

    What is the Dark Web?

    Technically, the “Dark Web” is simply areas on the Internet that require specific credentials or software or configurations to access. Resources on the Dark Web do their best *not* to show up on search engines.

    Play Video

  • When NOT to use an MSP?

    When NOT to use an MSP?

    5 reasons why your organization might not want to use an MSP for their IT support needs.

    Play Video

  • What is Shadow IT?

    What is Shadow IT?

    Shadow IT is a term given to IT resources...hardware, software, subscriptions, services...that are used by an organization without the knowledge of whoever’s handling IT or cybersecurity for the organization.

    Play Video

  • Summer in Scotland Recap

    Summer in Scotland Recap

    We had the best time getting to attend and sponsor another @Manufacturing Works networking event.

    Play Video