Learning Center: Videos
Our Learning Center Video Library is designed to provide answers to questions that we are most frequently asked. Since we have so many videos, we have separated them out into categories to help you navigate to the video that will best answer your questions. We also have a search feature on each page.
-

What’s the Difference Between an MSP, MCP, MITP, MNP, MSSP, and MIP?
Confused by all the IT acronyms floating around—MSP, MCP, MITP, MNP, MSSP, and now MIP? You’re not alone! In this video, Bob Coppedge, CEO of Simplex-IT, breaks down what these terms mean, why they keep changing, and what really matters for your business.

What is Software?
If you’ve ever used a computer, smartphone, or tablet—you’ve used software. But what is it really? In this video, we break down what software actually is, how it works, and why it’s the invisible backbone of your technology.

What Are the Downsides of Outsourcing IT?
Outsourcing your IT can be a smart move. You get expert support, predictable costs, and less day-to-day management. But before you hand over the keys to your network, it’s important to understand the potential downsides. In this video, we break down the most common challenges of outsourcing IT.

How To Avoid The Downsides of Outsourcing IT
Outsourcing your IT can save time, reduce stress, and give your business access to expert support, but only if you choose the right partner. In this video, we’ll show you how to avoid common outsourcing headaches like hidden fees, slow response times, and unclear contracts.

What is an Endpoint Firewall?
What’s an endpoint firewall and why does your business need one? Endpoints, like laptops, desktops, tablets, and smartphones, are the doors into your network. Without protection, these devices can become easy targets for hackers and malware.

What is a Packet Sniffer?
Ever wondered what a packet sniffer is and why IT teams use it? Think of it like a traffic camera for your network, capturing tiny packets of data as they move between devices. Packet sniffers can help diagnose slow connections, monitor performance, and even detect potential cyber threats.

What is a White Hat Hacker?
When most people hear the word hacker, they picture criminals breaking into systems and stealing data. But not all hackers are bad. Some are the good guys—and businesses actually hire them to keep data safe. These are white hat hackers, also known as ethical hackers.

What is DNS (Domain Name System)?
Ever wondered how typing a web address like https://www.simplex-it.com magically brings you to the right website? The answer is DNS, the internet’s phone book. In this video, we’ll break down, what DNS is and how it works behind the scenes, why it’s critical for websites, emails, business operations and more!

Are Some Excel Links Getting Blocked?
Starting October 2025, Microsoft Excel will begin blocking links to certain risky file types. Why? Because cybercriminals have been exploiting these links to sneak malware into systems. That innocent-looking spreadsheet with a link? It could have been a hacker’s favorite tool.

The Claims That Matter Most To Our Clients
If you’ve been researching Managed Service Providers (MSPs), you’ve probably noticed they all sound the same: “tailored IT services,” “complete coverage,” “exceptional support.” At Simplex-IT, we’re here to show you why we’re not your standard MSP, we’re the IT partner you’ve been searching for.

When is Co-Managed NOT Co-Managed?
Are you looking for a Co-Managed IT partner but don’t know exactly what a co-managed partner should look like? In this video, Bob explains what co-managed IT really means and what makes a good vs. bad co-managed partner.

What is the Difference Between a Server and a Desktop/PC?
A desktop PC and a server may look similar on the surface, but they serve very different purposes and are built with different priorities in mind. While both servers and desktop PCs are integral to computing environments, they are optimized for different purposes.

What is a Brute Force Attack?
A brute force attack is one of the oldest and most common cyberattack methods, where attackers try every possible password or key until they break in. With modern tools, they can test thousands of combinations in a short time. In this video, we’ll cover the different types of brute force attacks and how to prevent them.

What is Shadow AI?
Shadow AI isn’t a Marvel villain—it’s the unsanctioned AI tools your employees are already using at work. Think ChatGPT, Claude, or whatever new tool they found online. If it’s not approved, not secured, and not monitored, that’s Shadow AI.

When Did AI Become New ERP?
Remember the 1990s ERP craze? Companies thought installing software would magically fix everything and up to 60% of implementations failed. Fast forward to today, and AI is following the same path. According to a recent MIT report highlighted by Fortune, 95% of generative AI pilots fail. Why?

What is a URL?
You use them every day, but do you really know what a URL is? In this video, we explain URLs and why having clear, secure, and user-friendly URLs is essential for maintaining a strong online presence—and how it can impact your customers’ experience.

How Do I Manage Microsoft Licenses for my Business?
Managing Microsoft 365 licenses doesn’t have to be overwhelming. Whether you’re running a startup or scaling your business, understanding how Microsoft licensing works is key to saving money, boosting security, and giving your team the tools they need to succeed.

What is an AI Acceptable Use Policy?
As AI tools like ChatGPT become more common in the workplace, it’s essential for organizations to set clear rules around how these tools are used. That’s where an AI Acceptable Use Policy (AUP) comes in.

What is a Data Breach?
A data breach happens when someone accesses your sensitive information without permission like a digital break-in. In this video, we explain what a data breach is, how it happens, and why it's such a serious threat to your business.

Is AI Taking Your Job?
Everybody knows AI is the next big thing, and it's huge. It's going to have a heavy impact on the job market. But are there examples in history that give us an idea of how things could play out? Turns out, yes. Let's talk about telephone operators and bank tellers.

What is Bloatware?
Bloatware is the annoying software that comes pre-installed on new computers, phones, and tablets often without your permission. In this video, we break down what bloatware is, why it can slow down your device, and how to remove it for good.

What is a Proxy Server?
In this video, we break down the basics of proxy servers, how they function, and why they’re important for online privacy and security. Whether you're an IT professional or just curious about internet infrastructure, this is a great place to start.

What Windows 10 End of Life Means For Your Business
Windows 10 is officially reaching end of support on October 14, 2025. After that date, Microsoft will no longer provide security updates, patches, or support for any version of Windows 10. Continuing to use Windows 10 after the deadline exposes your business to major risks

What is a USB-C?
USB-C is a small, oval-shaped port designed to replace older USB connections. For businesses and everyday users, that means fewer cables, faster charging, and smoother workflows. Whether you’re backing up data, running presentations, or just charging your phone, USB-C makes the process simpler and more efficient.

What is a USB?
If you’ve ever plugged in a digital camera, printer, or external hard drive to your computer, you’ve probably used a USB connection. But what exactly is a USB, and why has it become such an essential part of our modern tech lives?

What is RCS?
In this video, we break down Rich Communication Services (RCS), the modern evolution of text messaging that’s changing the way we communicate. Whether you're a curious smartphone user or a business owner looking to upgrade customer engagement, this guide is for you.

Windows 11 Performance Guide: Uninstalling Bloatware, Improving Speed, and Fixing Slow Performance
Is Windows 11 running slow? Wondering how to speed it up or what bloatware to remove? This video is your complete Windows 11 Performance Guide, we’ll walk you through how to uninstall unnecessary apps, fix slow performance, and optimize your PC for speed and reliability.

What is the Microsoft Windows 365 Link Device?
MSPs, you know the pain. New tech that promises simplicity but delivers setup marathons and firmware purgatory. Not this time. We got our hands on the Microsoft Windows 365 Link and were fully expecting the usual frustrations. But to our surprise? It. Just. Worked.

How to Select the Right Co-Managed Provider
Thinking about co-managed IT but not sure where to start? This video breaks down what to look for in a co-managed provider and how to tell if your business is truly ready for one. We’ll cover what co-managed IT really means, how to know if your internal IT team could use backup or added expertise, and more!

2025 Arcade Party
Simplex-IT just turned 18, and we celebrated the milestone in style at our favorite spot, Quarter Up Arcade Bar! From drink tickets and tasty appetizers to classic games and great conversations, this year’s birthday bash was one for the books. Huge thanks to the awesome Quarter Up staff and everyone who came out to celebrate with us!

What is a Domain Name? Understanding the Basics
Ever wonder what a domain name really is and why it’s such a big deal? In this video, we explain domain names in simple, relatable terms. You’ll learn what they do, why they’re important, and how to choose one that strengthens your business's online presence.

Why Are Printers So Hard to Fix?
Printers are essential in every office, but fixing them can feel impossible. Why are printers so hard to deal with? In this video, we break down the reasons printers often cause frustration. Printers may be complicated, but with a little extra care, you can avoid many common issues and keep things running smoothly.

Is Your PC Ready for Windows 11?
Wondering why your PC won’t upgrade to Windows 11or if it even can? In this video, we walk you through exactly how to check your computer's compatibility using Microsoft’s PC Health Check tool. Plus, we explain common issues like unsupported processors, missing TPM 2.0, Secure Boot problems, and more.

What is a Browser? Understanding the Basics of Web Navigation
A browser is software that’s used to access the internet. The most popular web browsers are Chrome, Firefox, Safari, Internet Explorer, and Edge Ever wondered what a browser actually is and why it matters? In this video, we break down the basics of internet browsers and which one might be best for you.

1,000 Subscribers & Behind-the-Scenes Tour
We just hit 1,000 subscribers. Thank you to everyone that has helped us reach this milestone! In this special video, we’re taking you behind the scenes at Simplex-IT to show you how we plan, film, and produce our IT educational content.

Cloud vs. Local Storage: What Happens When You Delete Your Data?
Think hitting "delete" means your files are gone forever? Not quite. In this video, we break down what really happens when you delete data, both on your local devices and in the cloud. If you’re storing personal or business data, understanding the truth behind file deletion is essential.

What is a Data Server and How Does It Work?
Ever wonder what a data server actually does, or if you need one? A data server is like a digital file cabinet that stores and shares your most important information, customer records, financial data, inventory, and more. Servers make sure everyone has access to what they need, when they need it.

What is a Network?
If you've ever heard the term "network" and felt your eyes start to glaze over, you're not alone! But understanding what a network is doesn't have to be complicated. At its core, a network is just two or more computers (or other electronic devices) connected together so they can share resources

What is a Black Hat?
In this video, we break down what the term "black hat" means in cybersecurity. These are hackers who break into systems for personal gain or to cause damage, very different from white hats who work to protect you.

What is HTML?
Ever wonder how websites are built? At the core of nearly every page you visit is HTML—Hypertext Markup Language. It’s the essential code that gives structure and meaning to web content. Whether you’re brand new to web development or just curious about how websites work, this video is the perfect place to start.

How to Recognize and Prevent Cyberbullying in the Workplace
Cyberbullying isn’t just a problem for teenagers it can happen in professional environments, too. In this video, we break down what workplace cyberbullying is, how to recognize it, and what employers and employees can do to prevent it.

What is a Border Firewall?
Not all firewalls are created equal! A border firewall (or perimeter firewall) is your business’s first line of defense against cyber threats, stopping malicious traffic before it reaches your internal network. But how is it different from other firewalls?

What is SQL Injection (SQLI)?
SQL Injection (SQLI) is a dangerous cyberattack where hackers manipulate your website’s database to steal sensitive data. Imagine someone slipping a fake document into your filing system, tricking you into revealing confidential information—that’s exactly what SQLI does in the digital world.

What's The Difference Between USB 2.0 and USB 3.0?
USB 2.0 and USB 3.0 are two versions of the Universal Serial Bus (USB) standard that differ significantly in performance, power, and overall functionality. Understanding the nuances between these two standards can help you make better decisions when purchasing or using devices that require USB connections.

What is Active and Passive in IT?
When talking about IT infrastructure, we often use the terms active and passive but what do they actually mean? Active components are dynamic, requiring power to process, manage, or transmit data. They actively control, monitor, or secure IT environments. Here are some common examples:

What is Operational Technology?
Operational Technology (OT) is the hardware and software that control physical devices and processes within a business. From manufacturing robots to utility control systems and medical devices, OT is what keeps industries running smoothly. How is OT Different from IT?

What Is IT Support Outsourcing, and How Can It Help Your Business?
Running a business today means juggling a lot of responsibilities, and one of the most critical yet often overlooked areas is IT. Whether you’re trying to manage your network, keep your data secure, or simply ensure that your computers are running smoothly, it can be a challenge, especially if you don’t have a dedicated IT team.

What is the Difference Between Vulnerability Assessment and Vulnerability Management?
Before we dive into the difference, it’s important to understand what we mean by a "vulnerability." In the world of IT, a vulnerability is like a weak spot in your business’s technology – a flaw that hackers could potentially use to break in and cause damage.

Is Microsoft enforcing DMARC?
Starting May 5, 2025, Microsoft is enforcing stricter DMARC compliance for domains sending more than 5,000 emails a day. And if you're not ready, your messages could end up in the Junk folder, or worse, get blocked entirely. Don’t wait until emails start bouncing. Now’s the time to prepare and protect your deliverability.

How to Choose the Right AI Platform for Your Business | A Step-by-Step Guide
In today's world, businesses are turning to artificial intelligence tools to boost productivity, improve customer service, and gain a competitive edge. But with so many options available, how do you know which AI platform or tool is the best fit for your business?

What is Microsoft's Startup Boost?
Remember when Microsoft automatically upgraded Outlook? Well, they’re back at it, this time with a new Windows feature called Startup Boost, rolling out in May. It promises faster launch times for apps like Edge, Word, and Excel by preloading them in the background when your PC starts up. Is this feature a performance booster or just more bloat?

What is Antivirus Software?
Antivirus software is like a security guard for your computer—it works 24/7 to prevent, detect, and remove malware threats like viruses, spyware, and ransomware. Small to medium-sized businesses (SMBs) are prime targets for cybercriminals because they often lack the security measures of larger corporations.

Simplex IT presents — Real Techs of Genuis
Simplex-IT’s team finally cleaned out the tech room and stumbled across a tape of commercials from the early 2000s. These never-before-seen commercials feature epic narration, over-the-top 80s rock vocals, celebrating the unsung champions of IT like Mr. Colossal Backpack Tech, Mr. IT Over Explainer, and Mr. Snack Stasher.

What’s the Difference Between a Pen Test and a Vulnerability Scan?
When it comes to protecting your business from cyber threats, you might have heard terms like “pen test” and “vulnerability scan” thrown around. But what do they mean? And more importantly, what’s the difference between the two?

What Is a Critical Update? Essential Tips for Keeping Your Business Software Running Smoothly
A critical update is essential for fixing serious software issues that disrupt functionality but aren’t related to security. Your software plays a vital role in daily business tasks like managing finances, tracking customer data, and team communication. Ignoring critical updates can lead to frequent software crashes, slower performance and more!

Delivering Pies, Spreading Smiles
Happy Pi Day from Simplex-IT! To celebrate 3.14, we hit the road to deliver pies to our clients and friends. Because what’s Pi Day without actual pie? Join Cassie and Hayley on this fun delivery adventure as they spread some sweetness and smiles.

Simplex-IT Takes on the Pie Face Challenge!
Happy Pi Day from Simplex-IT! What better way to celebrate 3.14 than with a Pie Face Challenge? Watch as our team tests their luck in this hilarious game—who will stay clean, and who will get a face full of whipped cream?

Why Can't I Have My Favorite Tech Handle All My IT Tickets?
Ever wondered why you can’t have your favorite technician handle all your IT tickets? This video unpacks the concept of “latch-a-tech” and explains why relying on a single technician might not be the best choice for your business. We dive into the collaborative nature of IT support.

What is Microsoft Teams? How Can My Business Use It?
Looking for a better way to communicate and collaborate with your team? Meet Microsoft Teams – your all-in-one solution for messaging, video calls, file sharing, and project collaboration! With so many apps out there, keeping your team connected can feel overwhelming. But Microsoft Teams brings everything together in one place.

What is Break Fix in IT? Pros, Cons, and Hidden Costs Explained
Break Fix is a simple IT support model: you only pay for help when something goes wrong—no monthly fees, no ongoing commitments. It’s like calling a mechanic only when your car breaks down. This approach can save money upfront and offers flexibility for businesses with minimal IT needs. But is it always the best choice? Let’s dive into the pros, cons, and hidden costs.

Should Your IT Team Invest in Certifications?
Are IT certifications truly worth the investment for your tech team? The short answer: yes. Certifications like CompTIA and Cisco hold immense value for IT professionals and businesses alike. Investing in certifications isn’t just a checkbox—it’s a strategy for building a more capable, motivated, and credible IT team.

What is Endpoint Detection and Response (EDR) and Why Do Businesses Need It?
In today's digital age, businesses face an increasing number of cyber threats. That's why Endpoint Detection and Response (EDR) is becoming a crucial tool for companies looking to stay ahead of hackers. But what exactly is EDR, and why do businesses need it? In this video, we break down the fundamentals of EDR, explain how it works, and show you why it's a must-have.

What Should You Do If Your Business Gets Hacked?
In this video, we provide a comprehensive guide to help businesses manage a cyberattack effectively. Acting methodically after a data breach is crucial to protect your business and reduce future risks. Whether you have a plan in place or are starting from scratch, this video gives you actionable steps to respond to a cyberattack effectively.

What is Bluetooth and How Does It Benefit Your Business?
At its core, Bluetooth is a wireless technology that enables devices to communicate over short distances, acting like an invisible cable connecting your phone, headphones, or car stereo. It facilitates seamless data transfers, such as music or files, without the need for physical connections.

Why Survey Feedback Is Crucial for Improving Your IT Service Experience?
Why is survey feedback so important to Simplex-IT? You’ve likely seen the post-service survey pop up after closing a ticket — but have you ever wondered why it matters? The truth is, your feedback helps us improve! Whether it's positive, negative, or neutral, every comment is read and used to better our service to you.

Public vs. Private IP Address Explained: What's the Difference?
While most people have heard of IP addresses, many aren’t aware of the crucial distinctions between public and private IPs. A public IP address is your device’s unique identifier on the internet, and visible to the world. In contrast, a private IP address is used within a local network.

How to Effectively Prompt AI: A Guide to Getting Better Results
Effectively prompting AI is crucial for getting the results you want, and it’s more than just typing in a simple question or request. To get tailored, accurate responses, it's important to craft your AI prompts with clarity and structure.

Should All Businesses Adopt Multi-Factor Authentication (MFA)?
If you’re relying on just a username and password, your business is at risk. Multi-Factor Authentication (MFA) is a game-changer in cybersecurity, adding an extra layer of protection to keep unauthorized users out. In this video, we’ll explain what MFA is, and why it’s essential.

Is Buying the Cheapest IT Equipment a Smart Choice for Your Business?
The temptation to cut costs by purchasing low-priced IT products is common, especially for businesses trying to stick to a budget. But while saving money upfront might seem like a win, the truth is that opting for the cheapest IT products can end up costing your business more in the long run.

What’s the difference between Windows 10 and Windows 11? Should I upgrade?
Windows 11 launched in October 2021 with several exciting changes, including a modern, streamlined design and performance improvements. Windows 10 remains supported until October 2025, but after that, Microsoft will no longer provide security updates or bug fixes.

What is Cyber Insurance and Do You Really Need It?
In today’s digital landscape, cyber threats are everywhere—from ransomware attacks to data breaches, and everything in between. Businesses of all sizes are under constant threat of these costly incidents, so how do you prepare for the worst? This is where cyber insurance comes into play.

Can I Use OST and PST Files in the New Outlook?
Are you wondering if you can continue using OST and PST files in the new Microsoft Outlook? Historically, these file types were used by Microsoft Outlook to store data locally (PST files) or synchronize with the cloud (OST files). However, with the transition to Outlook 365, Microsoft has moved away from these older formats.

Simplex-IT’s 2024 Year in Review: Milestones, Growth & Fun!
2024 has been an incredible year for Simplex-IT, filled with achievements, milestones, and memories worth celebrating. We’re proud of the hard work, dedication, and support from our fantastic team, clients, and partners that made this year unforgettable. Here’s to an even bigger and better 2025! Join us as we recap the highlights of our year.

Why Isn't Bob in All of Our Videos Anymore?
Wondering why Bob isn't hogging the spotlight in Simplex-IT's videos anymore? Well, here's the scoop: Bob was the face of our videos for a while, but the truth is, Simplex-IT isn’t "The Bob Show"—and trust us, nobody wants that. We’ve got a whole team of brilliant people and now they’re stepping up to share their expertise on camera.

What is Social Engineering?
Social engineering is a type of cyberattack that relies on psychological manipulation rather than advanced hacking tools. Hackers use these tactics to trick individuals into revealing sensitive information. This video explains how social engineering works, common tactics used by attackers, and why business owners should care.

Microsoft’s New Outlook Update: Mandatory in 2025 & How to Switch Back
Is Microsoft forcing you to switch to the new Outlook? Yes, starting January 2025, the classic version of Outlook is getting a makeover—whether you like it or not. Here's what you need to know, including tips to navigate the transition smoothly, and if there are features you're missing or you just like the old version, how you can go back and forth to your heart's content.

What is IIOT? (Industrial Internet of Things)
Industrial Internet of Things (IIoT) refers to the use of smart sensors, devices, and systems in industrial environments to collect and analyze data in real-time. Unlike the consumer-focused IoT (Internet of Things), IIoT is designed specifically to improve efficiency, safety, and productivity in sectors like manufacturing, energy, and transportation.

Windows End of Life 2025: What Your Business Needs to Know Now
Time is running out! If you’re still using Windows 7, Windows 8.1, Windows Server 2008 R2, or Windows SBS 2011, this is your wake-up call. After March 31 2025, these operating systems will no longer receive critical security updates, leaving them vulnerable to cyber threats and exposing your business to potential risks.

What Are Business Critical Devices?
Business critical devices are the essential IT hardware that keeps your business running smoothly. Whether you're a business owner or IT professional, understanding these devices can help you mitigate risks, avoid costly downtime, and ensure your operations stay up and running.

Is Cloud Data Backed Up? | Understanding Cloud Data Protection
In this video, we explore the difference between cloud redundancy and traditional backups. Cloud providers like Microsoft, Google, and Amazon use redundancy to store your data across multiple servers and locations, protecting it from hardware failures and technical issues. But redundancy alone doesn’t equate to a full backup.

The History of the Internet: Key Moments That Shaped the Digital World
Ever wondered how the internet evolved into what it is today? From its early days as a military experiment to becoming an integral part of our daily lives, the internet has come a long way! In this video, we take you on a fascinating journey through the history of the internet, covering key milestones.

What is a Hard Disk Drive (HDD) and How Does it Work? | HDD vs SSD Explained
Curious about what a hard disk drive (HDD) is and how it works? In this video, we break down the basics of HDDs—an essential storage device for computers and electronics. Learn how HDDs store and retrieve data using spinning platters and magnetic heads, and discover the advantages of using HDDs for large-scale data storage.

What is a Solid-State Drive (SSD)?
A solid-state drive (SSD) is a data storage device known for its speed, reliability, and efficiency. Unlike HDDs that use spinning disks, SSDs rely on flash memory chips to store data. This key difference results in faster performance and enhanced durability.

Cloud Storage vs. Local Storage: What’s the Difference?
In today's digital age, choosing between cloud storage and local storage is crucial for managing and securing your data. With the ever-evolving cyberthreat landscape, understanding the key differences between these storage methods can help you make informed decisions.

What is a Foundational IT Assessment? | Secure & Optimize Your Business Technology
A Foundational IT Assessment is a critical step to ensure your business’s technology is secure, optimized, and prepared for the future. This non-invasive assessment covers four essential areas and around 50 detailed reports, with clear, actionable insights on how to improve your IT from both a business and security perspective.

How to Use Microsoft Copilot to Make Smarter Business Decisions
Feeling overwhelmed by a mountain of data and unsure where to start? You're not alone. This common issue, known as decision paralysis, can affect even the most seasoned professionals. Fortunately, Microsoft Copilot is here to help! What is Microsoft Copilot? Microsoft Copilot, integrated into Microsoft 365, acts as a virtual data expert

What is the Difference Between Windows 365 and Azure Virtual Desktop (AVD)?
In today’s remote work world, accessing company data securely is more important than ever. But what’s the best way to do that—especially when you’re moving away from traditional office setups? Enter Microsoft’s Azure Virtual Desktop (AVD) and Windows 365. Both offer cloud-based workstations, but how do they differ?

What is SMS? Explained | Short Message Service & Its Uses
SMS is a text messaging service that allows the exchange of short messages—up to 160 characters—between mobile devices using cellular networks. Unlike messaging apps, SMS doesn’t require internet access; it only needs a cellular signal. This makes SMS incredibly useful in areas with poor or no internet coverage

What Are The Different Types of MFA?
In today's digital landscape, securing sensitive information is more crucial than ever. You've likely heard the term "Multifactor Authentication" (MFA) multiple times, but what exactly does it mean, and why is it so important? In this video, we break down the different types of MFA—knowledge, possession, inherence, and location.

What is Extensible Markup Language (XML)?
XML, or Extensible Markup Language, is a flexible and structured language designed for storing and transporting data. Unlike HTML, which focuses on displaying data, XML is all about the data itself. It uses tags to define different parts of the data, and the best part? You can define your own tags, making XML incredibly extensible.

How Does Windows Patching Work?
If you've been an IT client of ours for a while, you've probably asked yourself, "how does our windows patching work? There have been some questions about Windows Patching, especially about that little popup that shows up on your screen. Here’s the deal.

AI Showcase Recap: Real-World Success Stories with Simplex-IT
Missed our AI Showcase? Catch up on the key moments from the event! Attendees gained valuable insights into how AI can be leveraged to solve real business challenges, enhance decision-making, and unlock new opportunities.

Is Your Business Losing Money Because Employees Can't Use Tech?
Are shiny new tech tools draining your business profits instead of boosting them? Investing in advanced technology promises increased efficiency and a competitive edge, but without proper employee training and change management, it can lead to costly mistakes and decreased productivity.

Is Simplex-IT the Right IT Partner for Your Business?
Simplex-IT specializes in delivering tailored IT solutions to businesses, with a strong focus on Managed Services and Co-Managed IT. Our Managed Services are ideal for organizations without an internal IT department and for those with an internal IT team, our Co-Managed IT services provides a flexible partnership.

What is Business Email Compromise (BEC)?
In this video, we explore Business Email Compromise (BEC), a modern-day digital con game posing a significant risk to organizations of all sizes. Learn how cybercriminals gain access to corporate email accounts and use them to conduct unauthorized transactions or extract sensitive information.

What is High Availability?
In today's digital world, smooth IT operations are crucial for businesses, but interruptions can pose challenges. High Availability addresses this by ensuring IT systems operate continuously and reliably, even during failures or heavy usage.

How to Leverage Copilot for your Business
Explore how Microsoft is transforming small and medium-sized business productivity with Copilot for Microsoft 365! Initially exclusive to larger enterprises, Copilot is now available to businesses of all sizes using Microsoft 365 Business Standard or Business Premium.

What are Microsoft Copilot's New AI Innovations?
Discover the latest AI innovations in Microsoft Copilot and how they're revolutionizing productivity in Microsoft 365. From Word to Excel, PowerPoint to Teams, Copilot integrates smart features that enhance collaboration and efficiency. Learn how Copilot accelerates document creation

Arcade 2024 Recap
Every year, Simplex-IT hosts an epic anniversary celebration at Quarter Up Arcade Bar, and this year was no different. We had a fantastic time with drink tickets, delicious appetizers, and a great mix of clients, new faces, and old friends. A huge shoutout to the amazing Quarter Up staff for making this event memorable!

Microsoft Outage Linked to CrowdStrike Update: Global Impact Explained
Discover the details behind the recent Microsoft outage linked to a CrowdStrike update. Bob Coppedge, CEO of Simplex-IT, breaks down the global impact, affecting airlines, businesses, and emergency services. Learn what this outage means for your organization and the steps you need to take to stay protected.

What is the Cost Comparison Between Hiring Internal IT Vs Outsourcing IT?
When evaluating the cost comparison between hiring internal IT staff versus outsourcing IT services to a managed service provider (MSP), several factors come into play. Here’s a breakdown of the key considerations- Salaries and Benefits, Training costs, Office Space and Equipment and more.

What is Internet of Things (IoT)?
Imagine a business ecosystem where devices, machines, and systems interact seamlessly to perform various tasks. By connecting these devices to the internet, they can communicate, collect data, and make autonomous decisions. This interconnected network is what we call the Internet of Things (IoT). How Does IoT Work?

What is a Secure Email Gateway?
A Secure Email Gateway is a specialized software solution designed to monitor, filter, and protect email traffic entering and leaving an organization's ecosystem. It serves as a virtual checkpoint, sorting through every email to identify and neutralize potential threats before they reach their intended recipients.

What Is Microsoft Security Copilot?
Microsoft Security Copilot is a generative AI-powered security solution. It provides tailored insights that empower your team to defend your network. It also works with other Microsoft security products. Microsoft Security Copilot helps security teams respond to cyber threats, process signals, and assess risk exposure.

How Do I Export Device Configuration & Information files in Auvik?
In this tutorial, we’ll guide you through the process of exporting device configuration and information files in Auvik. This video is part of a series created by Simplex-IT for our clients to better use the tools included in their service agreements.

What is the Difference Between WPA, WPA2, and WPA3?
In the ever-evolving world of technology, securing our wireless networks is crucial to protecting our data and privacy. If you've ever wondered about those cryptic acronyms like WPA, WPA2, and WPA3, this video is here to help you understand the basics of wireless security.

How Can I Stay Updated on my Service Ticket?
You just submitted a service ticket and don’t know what’s next. Here’s what you can expect: Throughout the life of your ticket, you’ll receive emails when the ticket is updated. Sometimes these updates are automatically generated, and other times they are messages from real life technicians.

How Do I Complete The Required Cybersecurity Training Through Phin?
In this brief video, we'll introduce you to Phin emails and guide you through the essential steps for taking the required cybersecurity training courses. Learn how to navigate your Phin emails, understand their importance in cybersecurity, and complete your training effectively.

What is a Browser Cache?
Think of the browser cache as a temporary memory storage system. When you visit a website for the first time, your browser downloads all the necessary files needed to display the webpage properly. These files can include HTML documents, images, CSS stylesheets, JavaScript files, and more.

How Do I Use The Phin Admin Portal?
Welcome to our Phin Admin Introduction tutorial! In this brief video, we'll guide you through the Phin Admin portal, the hub for managing your cybersecurity training and simulated phishing attacks.

How Do I Assign Courses in Bigger Brains?
In this step-by-step guide, we'll walk you through the process of assigning courses in Bigger Brains. Whether you're an admin or a new user, this video will provide all the insights you need to effectively assign courses to your learners.

How Do I Create Learning Paths in Bigger Brains?
Welcome to our step-by-step tutorial on creating learning paths in Bigger Brains! 🎓 In this video, we’ll guide you through the process of setting up customized learning paths to enhance your training programs.

What is a Smart City?
A smart city is a city that uses technology and data to improve the lives of its residents and make urban living more efficient, sustainable, and enjoyable. But what makes the city "smart?" and while technology improvements offer many benefits, what are the potential issues if safety measures aren't in place?

Are QR Codes Safe? Tips for Using Them Securely
QR codes are everywhere nowadays, right? You see them on menus, posters, flyers—pretty much everywhere. They're super handy too! Just whip out your phone, snap a pic, and bam! You're directed to a link, a discount, or even a video. But hold up, there's a sneaky side to these little squares.

Level up Your Team’s Cybersecurity Knowledge (and Test ‘em)
Cybersecurity Training. Simulated Phishing. It's included with your Model '23 and '24 agreement. Learn how to track your employees and see if they're clicking where they shouldn't. This isn't just another training tool. It's a dynamic solution designed to engage and empower your team members with concise, entertaining videos packed with actionable insights.

What is Ransomware?
Ransomware is a type of malware that hackers use to encrypt your files or lock you out of your own computer or device. Once your files are encrypted or your device is locked, the cybercriminals demand a ransom payment from you, usually in cryptocurrency like Bitcoin, in exchange for the key or code to unlock your files or device.

What is Innovation Debt?
Innovation debt, also known as technical debt, is a term used to describe the costs that companies and organizations incur when they delay investing in new technologies or ideas that can help them remain competitive.

How Do You Submit a Service Ticket?
Submitting a service ticket is an important part of working with your IT provider, but it shouldn’t be complicated! Here at Simplex-IT we have an easy process for you! So how do you submit a service ticket? There are three options.

What is the difference between 3G, 4G, 5G?
What is the difference between 3G, 4G, 5G? Let's break down the differences between 3G, 4G, and 5G in a simple way, without getting too technical. 3G was the third generation of mobile networks, providing faster data transfer speeds compared to its predecessor, 2G.

