Blog

Beware of watering hole attacks!

Beware of watering hole attacks!

Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasingly popular hacking method is a watering hole attack.

The management drawbacks of virtualization

The management drawbacks of virtualization

IT managers turn to virtualization to effectively scale down on cost, boost efficiency, and maximize space in their server rooms. Yet, what they didn’t expect were the drawbacks involved in this technology solution. It’s therefore essential that you’re aware of the following management issues before going all in:
Backup
Incorporating a robust backup system in a virtualized setting can become a huge challenge.

Preventing theft of service in VoIP

Preventing theft of service in VoIP

VoIP phone systems use the internet just like any PC. Therefore, hackers can gain access to your servers and data network through VoIP phones. Understanding how to combat theft of service in VoIP is critical, and if you want to learn how to do it, read on.

How to get virtualization working

How to get virtualization working

Virtualization is available in every modern computer. It allows you to create additional virtual environments that run on your actual hardware. Sometimes, though, it won’t work right and results in errors. Here are steps to get it working properly.

How to prevent your laptop from overheating

How to prevent your laptop from overheating

Laptops may be more affordable than ever, but we’re also using them for more advanced tasks than ever. This means you run the risk of overheating your laptop and causing long-term damage. Here’s how to avoid that.
Causes of overheating
Laptops create heat during their normal operation.

Don’t give social media hackers a chance

Don’t give social media hackers a chance

Pranksters, malicious attackers, extremists — hackers come in different forms, but they all have one thing in mind: compromising your online privacy and security. Some of them specialize in hacking social media, but don’t fret; there are several things you can do to protect your Facebook or Twitter account.

How WP security updates impact your site

How WP security updates impact your site

WordPress (WP) websites require routine updates to keep up with user demands. Some of WP’s most critical updates are security patches, which protect sites from various cyberattacks. But why does your website sometimes act up when you finish running an update, and how can you prevent it?
Be cautious with updates
In 2017, WP issued 21 updates and 33% of these focused on security.

5 new features for Outlook

5 new features for Outlook

Lately, Microsoft has given some love to Outlook — not just the desktop app, but also the web and app versions. In fact, they just released a bunch of new and improved features. Let’s take a look.

#1 RSVP
Outlook makes it fairly simple to invite people to a meeting, but now it will also keep tabs on who’s coming.

New faces, New lives, hellos and goodbyes…

June 1st, 2018

Sometimes I need to take a breath and look at how far we’ve come. The list of names here at Simplex-IT seems to be growing by leaps and bounds. You’ll see a couple of new faces (and a returning one) in the eNewsletter for this month. But there are a couple other ones we decided to save until next month.

Welcome Angus Nietert

Hi, my name is Angus Nietert and I am an intern here at Simplex-IT. Prior to this internship, I worked at Nike, NOCO and Anna Maria Nursing Home. Although none of my previous jobs dealt with IT, I was still able to take valuable lessons away from them.