Blog

How consumer habits changed the web

How consumer habits changed the web

The average web user’s attention span gets shorter every day. People don’t want to spend hours sifting through a website to find the information they need; they want it as soon as the page loads. To keep up with the times businesses have drastically changed how they develop their websites.

Energy saving tips for your PC

Energy saving tips for your PC

You want to save energy, but you need to use your PC every day. So maybe you just resort to turning off your computer when you’re not using it. But a plugged-in PC or electrical appliance, even when turned off, consumes standby power. Here are some tips on how you can save energy with your PC.
1. Disconnect your external devices
Devices that connect to your PC like printers, sound systems, and webcams consume power, too.

Consider the security risks of your software

Consider the security risks of your software

Cybersecurity is an issue that hounds businesses of all types. Sometimes organizations invest in security software without realizing the risks that come with it. Here’s why identifying threats before buying cybersecurity products is paramount.
Uncover threats and vulnerabilities
Every business should evaluate the current state of its cybersecurity by running a risk assessment.

Microsoft expands Bing’s Visual Search

Microsoft expands Bing’s Visual Search

How many times have you wanted to search the internet for something you didn’t know the name of? It’s a common problem that Microsoft helps solve with AI features included in its search engine, Bing. Visual Search allows users to replace text queries with images for more nuanced results and it’s now available on your smartphone.

A Geek Looks at 60

July 2nd, 2018

I’m starting this while on a plane with Julie (the missus) heading to Cancun for a 5-day jaunt.  For those of you who aren’t aware, her birthday is the 2nd, mine is the 3rd.  And our anniversary is on the 4th.  Yup, makes the whole concept of celebrating much easier and forgetting (which, alas, I’m sure I would) dates near impossible.

Simplex-IT’s goals for Q3 2018

July 2nd, 2018

It's Goal time again!
Ok, it’s time for our 3rd installment of our quarterly goals.  I’ve been increasingly moving our goal settings into our day-to-day operations, and I think we’re seeing positive results.  Spoiler alert:  We’re not reaching 100% of our goals.

Anatomy of a CyberSecurity Exploit (webinar)

July 1st, 2018

What's an Exploit?
If you’ve been reading anything about cybersecurity, a term gets tossed around.  Exploit.  Sometimes they’ll use the more pedestrian term vulnerability, but c’mon…exploit sounds cooler.

Simply put, an exploit is a discovery of a method to compromise some aspect of Information Technology in a way for a party to gain unauthorized access to some (or all) parts of an otherwise protected network (or device).

An example of a recently discovered exploit would be the Spectre exploit, which exposed a vulnerability to all systems using most Intel, ARM or AMD processors, allowing malware applications to access data from other applications.

Stealing your Office Credentials Webinar Recording Now Available

Check out the recording of Bob's webinar on "Stealing your Office Credentials." It's a half hour overview of the more insidious ways the bad guys are getting into our data and applications. Well-formed emails sent to unsuspecting end users conning them into sharing their Office 365 credentials.

Congrats to Jeff!!

Congrats to Jeff!!

Congratulations Jeff Buskirk, for putting up with us here at Simplex-IT for 5 YEARS! Jeff has been a Network and Systems Administrator with Simplex-IT since 2013 (I did the math for ya, you're welcome ;-)) You can read all about Jeff on our team page at: www.