Make Sure Your Business Technology Covers These 2 Areas

All businesses need to use some sort of technology to keep their operations moving forward. Yet, it’s often difficult to gauge how new solutions will function with your current systems. You need to take your options into careful consideration before making such an important choice, and only an analysis of your current setup will help you ensure the success of your new technology.

New Grandkid, Swordplay, Geek Raffle

So. November. You played me. In so many ways, by so many methods. Some wonderful. Some reaaally annoying. Some…so close. So very, very close. But it’s time to say goodbye.

But we also need to say hello to my latest grandson, Alexander Locke Shonk.

Tip of the Week: 4 Ways to Resolve the Blue Screen of Death

It’s quite possibly the most infamous screen image in computing: the Blue Screen of Death. Encountering this screen will often cause two thoughts to run through a user’s mind: what just happened, and how can I fix it?

The BSOD is the result that Windows resorts to when it experiences an error critical enough to require a reboot.

Working Remotely

Do you work remotely? Also known as working from home, teleworking, etc. What’s your corporate policy on this? As needed, like in a snowstorm or recovering from surgery, or whenever, wherever? What’s your opinion on this?

Here at Simplex-IT, we have the flexibility of working remotely.

3 Reasons Why Hackers Like to Target Small Businesses

b2ap3_thumbnail_network_security_400.jpgThis October is Cybersecurity Month! Some businesses think that they’re immune to hacking attacks because they’re “low profile” compared to huge corporations. However, the truth of the matter is that your organization is just as much at risk as they are. This month, take measures to keep your organization’s data safe, or risk losing everything in the fallout of a hacking attack.

Windows 10 Presentation Available

Hopefully you're able to watch Bob Coppedge present to the OhioCPA group this morning about Windows 10.  Here's a link to the presentation materials (availble to all!):

Click here for the materials.

Warning: Malicious Adware Finds New Way to Spread on Android Devices

b2ap3_thumbnail_security_for_your_it_400.jpgWith many organizations heavily relying on mobile computing, malicious operators have begun targeting the “low-lying fruit” of a business’ IT infrastructure, which is often a company’s mobile devices. Kemoge, a malicious adware strain designed to corrupt Android mobile operating systems, is the latest mobile threat that your business needs to protect itself against.

Things That Go Bump in the Server Closet

b2ap3_thumbnail_spooky_technology_400.jpgHalloween is a time to conjure up things that give people the creeps. Scary sounds are just one way to send shivers up the spine. Sounds like, howling werewolves, zombie groans, chainsaws, and bloodcurdling screams are enough to make you want to run and hide. Yet, there’s one sound that’s the most terrifying of them all, and it’s coming from your server room!