Amazon phones to become a reality soon

Amazon phones to become a reality soon

Amazon is setting its sights on the VoIP market again and will use its Alexa technology to launch a new phone system. Based on a new patent, users of Amazon’s artificial intelligence (AI) devices might soon be able to enjoy a smart speaker and phone in one.

Microsoft To-Do

Have you heard about the new little tool making it's debut? It's Microsoft To-Do! If you're looking for a quick and easy list making tool, this one is for you.

You can create multiple lists, such as various to-do's, grocery lists, packing lists, reminders, etc.

Office 365 Administrator webinar now Online

May 18th, 2017

What do you do to the Office 365 account when an employee leaves?  That's the topic of our most recent webinar, and it's now on YouTube.

Learn about Shared Mailboxes, forwarding email, licensing restrictions and more!  Keep the email, but without the licensing.

What is virtual “sandboxing”?

What is virtual “sandboxing”?

Virtualization comes with several benefits for small- and medium-sized businesses. One of the most important is cybersecurity, but even within that subset are several strategies for protecting your organization. One of such strategy is referred to as sandboxing, and it’s worth learning about.

Browsers leak sensitive info to hackers

Browsers leak sensitive info to hackers

The Autofill feature fills a void in the web browsing habits of many. It eliminates the need to enter all your details when logging on your social media accounts or when checking out your basket after e-shopping. On Chrome and Safari browsers, however, danger lurks when you rely too much on autofill.

Chaotic Business as Usual

May 1st, 2017

Last week, Vegas.  This week, Nashville.  More new people.  Saying goodbye.  Last months’ Security Lunchinar.  New workshop.  New webinar.  Salt mines.  IT Security.  Space Invaders.

You know.  Just another week.

Ok, Kevin Dutkiewicz (Tech Director) and I were in Las Vegas last week to participate in the annual Sophos Partner Conference.

New! IT Policies and Procedures Workshop

April 30th, 2017

Walk away with IT Policies and Procedures for your Organization!
New Workshop from Simplex-IT
Security is a huge issue.  Between Ransomware, Phishing attacks and good old fashioned malware, the bad guys are coming up with more and more creative ways to “do their thing.

The phishing craze that’s blindsiding users

The phishing craze that’s blindsiding users

Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam.