Learning Center: Videos

Our Learning Center Video Library is designed to provide answers to questions that we are most frequently asked.  Since we have so many videos, we have separated them out into categories to help you navigate to the video that will best answer your questions. We also have a search feature on each page.

Skip to Videos
  • What is a Browser Cache?

    What is a Browser Cache?

    Think of the browser cache as a temporary memory storage system. When you visit a website for the first time, your browser downloads all the necessary files needed to display the webpage properly. These files can include HTML documents, images, CSS stylesheets, JavaScript files, and more.

    Play Video

  • How Do I Use The Phin Admin Portal?

    How Do I Use The Phin Admin Portal?

    Welcome to our Phin Admin Introduction tutorial! In this brief video, we'll guide you through the Phin Admin portal, the hub for managing your cybersecurity training and simulated phishing attacks.

    Play Video

  • How Do I Assign Courses in Bigger Brains?

    How Do I Assign Courses in Bigger Brains?

    In this step-by-step guide, we'll walk you through the process of assigning courses in Bigger Brains. Whether you're an admin or a new user, this video will provide all the insights you need to effectively assign courses to your learners.

    Play Video

  • How Do I Create Learning Paths in Bigger Brains?

    How Do I Create Learning Paths in Bigger Brains?

    Welcome to our step-by-step tutorial on creating learning paths in Bigger Brains! 🎓 In this video, we’ll guide you through the process of setting up customized learning paths to enhance your training programs.

    Play Video

  • What is a Smart City?

    What is a Smart City?

    A smart city is a city that uses technology and data to improve the lives of its residents and make urban living more efficient, sustainable, and enjoyable. But what makes the city "smart?" and while technology improvements offer many benefits, what are the potential issues if safety measures aren't in place?

    Play Video

  • Are QR Codes Safe? Tips for Using Them Securely

    Are QR Codes Safe? Tips for Using Them Securely

    QR codes are everywhere nowadays, right? You see them on menus, posters, flyers—pretty much everywhere. They're super handy too! Just whip out your phone, snap a pic, and bam! You're directed to a link, a discount, or even a video. But hold up, there's a sneaky side to these little squares.

    Play Video

  • Level up Your Team’s Cybersecurity Knowledge (and Test ‘em)

    Level up Your Team’s Cybersecurity Knowledge (and Test ‘em)

    Cybersecurity Training. Simulated Phishing. It's included with your Model '23 and '24 agreement. Learn how to track your employees and see if they're clicking where they shouldn't. This isn't just another training tool. It's a dynamic solution designed to engage and empower your team members with concise, entertaining videos packed with actionable insights.

    Play Video

  • What is Ransomware?

    What is Ransomware?

    Ransomware is a type of malware that hackers use to encrypt your files or lock you out of your own computer or device. Once your files are encrypted or your device is locked, the cybercriminals demand a ransom payment from you, usually in cryptocurrency like Bitcoin, in exchange for the key or code to unlock your files or device.

    Play Video

  • What is Innovation Debt?

    What is Innovation Debt?

    Innovation debt, also known as technical debt, is a term used to describe the costs that companies and organizations incur when they delay investing in new technologies or ideas that can help them remain competitive.

    Play Video

  • How Do You Submit a Service Ticket?

    How Do You Submit a Service Ticket?

    Submitting a service ticket is an important part of working with your IT provider, but it shouldn’t be complicated! Here at Simplex-IT we have an easy process for you! So how do you submit a service ticket? There are three options.

    Play Video

  • What is the difference between 3G, 4G, 5G?

    What is the difference between 3G, 4G, 5G?

    What is the difference between 3G, 4G, 5G? Let's break down the differences between 3G, 4G, and 5G in a simple way, without getting too technical. 3G was the third generation of mobile networks, providing faster data transfer speeds compared to its predecessor, 2G.

    Play Video

  • Elevate Your Team's Skills with Bigger Brains

    Elevate Your Team's Skills with Bigger Brains

    Bob explains the power of Bigger Brains' extensive library of over 200 eLearning courses, focusing on essential business productivity tools such as Microsoft 365, Excel, Outlook, Teams, and is tailored for professionals at all levels. Take you and your team’s skills to the next level

    Play Video

  • What is SPOF or Single Point of Failure?

    What is SPOF or Single Point of Failure?

    A Single Point of Failure is a potential risk caused by a flaw in the design, implementation, or configuration of a system. It’s the one fault that can shut down an entire system. This could be in your cybersecurity, networking, and similar aspects.

    Play Video

  • What To Do With Your Eclipse Glasses After The Eclipse?

    What To Do With Your Eclipse Glasses After The Eclipse?

    Wondering what to do with your eclipse glasses now that the eclipse is over?

    Check out the website: astronomerswithoutborders.org

    Play Video

  • What is Operating System?

    What is Operating System?

    So you have a computer, and you want to do various tasks like writing documents, browsing the internet, or playing games. To make these tasks possible, your computer needs something to manage and coordinate all the different parts inside it. This is where the operating system (OS) comes in.

    Play Video

  • Recap of Cybersecurity Event - Thank You for Joining!

    Recap of Cybersecurity Event - Thank You for Joining!

    Missed out on the incredible evening at Missing Falls Brewery? Don't worry! We've got you covered with an exclusive recap of the event that brought together cybersecurity experts, beer enthusiasts, and eclipse enthusiasts! A heartfelt thank you to all who joined us for this incredible event!

    Play Video

  • What is Firmware?

    What is Firmware?

    Ever received a "Firmware update available" notification and wondered what you're actually updating? In this video, we break down the concept of firmware, the unsung hero embedded in our devices. Firmware is a specialized type of software embedded in hardware devices, dictating how they function.

    Play Video

  • What is Network Monitoring?

    What is Network Monitoring?

    Network monitoring is the process of observing and analyzing the traffic and behavior of computer networks to ensure they are performing optimally and securely. They make sure everything is in order and there are no suspicious activities or potential threats.

    Play Video

  • New AI Service at Simplex-IT

    New AI Service at Simplex-IT

    Announcing Simplex-IT’s new AI service. AI has been all the buzz lately so we figured we would jump on the bandwagon and add on a new service for all of our clients. Don’t worry if you’re not already a client, for today only you can add this once in a lifetime service on to any agreement at no additional cost, just use the code APRIL FOOLS.

    Play Video

  • What is DomainKeys Identified Mail (DKIM)?

    What is DomainKeys Identified Mail (DKIM)?

    DKIM, DomainKeys Identified Mail, is used to authenticate an email. It uses a digital signature to let the email recipient know the message and content of the email was authorized by the domain owner. How does DKIM work? Actually it's fairly complicated in terms of generating public and private keys in order to verify the content of your email.

    Play Video

  • Managing Your Passwords the Safe way with Keeper

    Managing Your Passwords the Safe way with Keeper

    In this webinar, we will show you the basics of Keeper, a security vault that allows you to securely access and manage your passwords across devices. Kurt and Bob will tell you how to use this tool to increase security on your accounts without having to memorize dozens of complicated passwords. Keeper is included for your management team in our new Model Year ’24 agreement!

    Play Video

  • Securing Your Tomorrow: An Intro To Our Advanced MDR Solution Webinar

    Securing Your Tomorrow: An Intro To Our Advanced MDR Solution Webinar

    Sophos MDR expert, Christopher Glick, gives an eye-opening session on Managed Detection and Response (MDR). Picture this: a fully managed 24/7 service delivered by top-notch experts who constantly detect and respond to cyberattacks targeting every facet of your digital infrastructure.

    Play Video

  • What is Sender Policy Framework or SPF?

    What is Sender Policy Framework or SPF?

    Sender Policy Framework (SPF) is an email authentication protocol designed to prevent email spoofing and spam. It restricts who can use an organization's domain as the sender of the email. In most phishing attacks, threat actors usually spoof the sender's email address to look official. SPF prevents that from being received.

    Play Video

  • Happy Pi Day 🥧

    Happy Pi Day 🥧

    Today is one of our favorite holidays – it's Pi Day! For those of you who don't know, March 14th is Pi Day and celebrates the famous never-ending number. And since we're a bunch of IT nerds, we take this day very seriously. Every year on Pi Day, we take the time to thank our clients and some other local businesses by delivering a pie to their offices.

    Play Video

  • What is DMARC?

    What is DMARC?

    DMARC, Domain-based Message Authentication, Reporting & Conformance, is an email security protocol that verifies email senders by building on the DNS services and the SPF, and DKIM protocols. It was created to block the threat of email spoofing, domain spoofing, email phishing, business email compromise, and other email-based attacks.

    Play Video

  • What is DMARC the Simplified Version?

    What is DMARC the Simplified Version?

    Domain-based Message Authentication, Reporting & Conformance. It’s actually a 4 letter acronym that really takes advantage of a 3 letter and a 4 letter acronym, SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail). So together we have an 11 letter acronym. And if you want emails from your company to be safely delivered, better pay attention.

    Play Video

  • What is RAM?

    What is RAM?

    RAM, or Random Access Memory, is a dynamic player in the world of computer memory. Unlike storage devices, RAM is volatile and acts as the computer's short-term memory, storing actively used and processed data. Imagine your computer's RAM as a desk – the larger it is, the more tasks and processes it can handle simultaneously.

    Play Video

  • What is an Insider Threat?

    What is an Insider Threat?

    An insider threat refers to the risk or potential harm posed to an organization's data, systems, or security by individuals who have authorized access to the organization's resources. These individuals could be current/ former employees, contractors, or business partners…

    Play Video

  • What is the Difference Between a CIO & a vCIO?

    What is the Difference Between a CIO & a vCIO?

    A CIO (Chief Information Officer) is a high-level executive responsible for overseeing a company's information technology (IT) strategy and operations. On the other hand, a vCIO (virtual Chief Information Officer) is a consultant or an outsourced service provider who provides similar services as a CIO, but on a part-time or project basis.
    Play Video

  • What is the Difference Between Virtual Reality, Augmented Reality, and Mixed Reality?

    What is the Difference Between Virtual Reality, Augmented Reality, and Mixed Reality?

    In recent years, technology has rapidly changed the way we interact with the digital world. There are two terms that have been used over the past few years that may sound familiar. VR, Virtual Reality, and AR, or Augmented Reality. One you probably haven’t heard of as much is MR, or Mixed Reality.

    Play Video

  • What is a Cookie?

    What is a Cookie?

    What is a cookie? Besides being a wonderful little dessert, a cookie is also a tech term. Imagine you're at a party, and the host gives you a sticker with your name on it. This sticker helps the host remember your name throughout the party, so they can greet you by name and offer you things you might like.

    Play Video

  • What is a BCDR device?

    What is a BCDR device?

    A BCDR device stands for Business Continuity and Disaster Recovery device. It's a specialized tool that helps businesses protect their data and IT infrastructure in case of unexpected events like natural disasters, power outages, cyber attacks, and hardware failures.

    Play Video

  • CMMC Proposed Rules

    CMMC Proposed Rules

    CMMC Proposed Rule Published with Bob Coppedge, CEO @simplex-it and Tim Golden CEO @compliancescorecard . What's Impacted? What to do? Need to Know More?

    Play Video

  • What is a Server?

    What is a Server?

    A server, in the IT world, is a specialized, powerful computer that serves a specific purpose. A server is a super-smart, super-organized computer that does important jobs for other devices, like your regular home computer or phone. It's not meant for browsing the internet, playing games, or watching videos.

    Play Video

  • What do the Abbreviations EDR, MDR, MTR, and XDR Mean?

    What do the Abbreviations EDR, MDR, MTR, and XDR Mean?

    When talking about cybersecurity solutions, there’s a ton of different acronyms and abbreviations. You’ve probably heard about EDR, MDR, MTR, and XDR. But what do all of these mean? Let’s dive in.

    Play Video

  • What is a Router?

    What is a Router?

    Think of your home or office as a city, and the internet as a vast network of roads connecting different cities. Now, think of a router as the traffic cop for your city. A router is a device that helps your computer or other devices connect to the internet. Here's how it works:

    Play Video

  • What is Bring Your Own Device or BYOD?

    What is Bring Your Own Device or BYOD?

    “Bring Your Own Device” - or BYOD – is a policy where employees use their personal devices (phones, laptops, tablets, etc.) for work, rather than company-provided devices. It has become more popular recently for a number of reasons, not the least of which is the desire for reduction in device maintenance for companies – and the associated cost.

    Play Video

  • Simplex-IT Holiday Party

    Simplex-IT Holiday Party

    Cheers to unforgettable moments and festive celebrations! Wishing you all a joyous holiday season filled with warmth and happiness from all of us at Simplex-IT!

    Play Video

  • What is a TSP?

    What is a TSP?

    TSP stands for Technology Success Partner. Some will argue that this is necessary. That a TSP encompasses support for all of your IT. Including your Cloud, security, and…umm…IT. I think the concept is that an MSP has a more sophisticated view of IT than an MSP. Somehow. By some arbitrary measure. An All-in-one IT solution.

    Play Video

  • What If I'm Not Tech-Savvy but I Need IT Services?

    What If I'm Not Tech-Savvy but I Need IT Services?

    Working with an IT Managed Service Provider, MSP, can sound like a daunting task if you don't have any prior knowledge about IT. Instead of trying to go in blind, here are some tips to help you get started.

    Play Video

  • Who Are Some Other IT Outsourcing Companies in Northeast Ohio?

    Who Are Some Other IT Outsourcing Companies in Northeast Ohio?

    At Simplex-IT, we have the privilege of meeting with numerous businesses in Northeast Ohio each year to discuss their IT outsourcing needs. With our extensive experience and expertise in the IT industry, as well as our willingness to share our honest thoughts and feelings….

    Play Video

  • How Do I Get Started with Simplex-IT?

    How Do I Get Started with Simplex-IT?

    Here at Simplex-IT, we understand looking for a new IT provider isn't fun. Pushy salespeople. Condescending IT jerks. We take a consultative approach, because we’re genuinely interested in supporting the success of your business through IT.

    Play Video

  • Microsoft Teams Exploratory

    Microsoft Teams Exploratory

    Microsoft Teams Exploratory is essentially a 12 month free license for your organization to use Teams. 12 months later Microsoft is going to tell you how it's expiring and you should do something about it. What they don't do is they don't bother to take a look and see whether or not the organization is already using Teams.

    Play Video

  • What's the Difference Between an MSP and an MSSP?

    What's the Difference Between an MSP and an MSSP?

    Managed service providers (MSPs) and managed security services providers (MSSPs) are two terms that are often used interchangeably in the IT industry, but they are not the same thing. While there may be some overlap in the services they provide, there are significant differences between the two.

    Play Video

  • What is a Tabletop Exercise?

    What is a Tabletop Exercise?

    A tabletop exercise is an opportunity for your organization to practice what happens in the event of an incident. The most common tabletop exercises are incident response and disaster recovery. This is where people within your organization can work in a simulated environment to resolve a problem using the process and procedures that you should have in place.

    Play Video

  • What is a Chief Information Security Officer (CISO)?

    What is a Chief Information Security Officer (CISO)?

    In today's digital age, data security has become a top priority for organizations across industries. With the increasing frequency and sophistication of cyber attacks, it's critical for businesses to have a dedicated professional responsible for their overall information security. This is where the Chief Information Security Officer (CISO) comes in.

    Play Video

  • What Is a Business Impact Analysis?

    What Is a Business Impact Analysis?

    Business impact analysis (BIA) is an essential component of a company's risk management process. It involves assessing and analyzing potential risks that could disrupt the organization's operations and result in financial or reputational losses.

    Play Video

  • What Is Windows End of Life?

    What Is Windows End of Life?

    Windows end of life is a critical aspect that every individual and organization should be aware of to ensure the safety and security of their systems and sensitive data. In simple terms, Windows end of life refers to the point when Microsoft stops supporting a version of Windows.

    Play Video

  • Why Do I Need to Update my Technology?

    Why Do I Need to Update my Technology?

    We’ve all been there, going about our day and then we receive the notification ‘An update is available for your software, install now?’ This can be annoying, but it’s actually a critical item to maintain the security of your applications.

    Play Video

  • What Are Good Password Habits?

    What Are Good Password Habits?

    In today’s connected world we often have dozens of online accounts – whether it be for banking, shopping, work, or entertainment. But it often seems like every time we turn around another service was compromised or there’s an attempt to hack into accounts. So what can you do to keep your accounts safe and secure?

    Play Video

  • What Is Endpoint Detection and Response?

    What Is Endpoint Detection and Response?

    At its core, EDR is an evolution of antivirus software. Whereas traditional antivirus tools rely on signature-based scanning to detect known malicious files, EDR takes a more comprehensive approach.

    Play Video

  • Why Might an MSP's Pricing Change Year to Year?

    Why Might an MSP's Pricing Change Year to Year?

    It’s easy to just say “inflation” when someone asks why there’s a price increase for what seems to be the same service from one year to the next. And boy, there's truth there. But it can be more complicated than that.

    Play Video

  • What Technology Policies Should I Have For My Organization?

    What Technology Policies Should I Have For My Organization?

    Short answer, it depends. Some common policies that are important for all companies to have are: - An acceptable use policy that defines what employees are allowed to do and not to do in the organization – especially around how they use technology.

    Play Video

  • How do MSP’s Charge for their Services?

    How do MSP’s Charge for their Services?

    When you’re shopping for IT services, It’s important to understand the different pricing models that MSPs and IT providers use. Not only do you want your provider to be transparent in their pricing and their model in general, but you need to know when you’re comparing providers as well.

    Play Video

  • Can I Eliminate Risk?

    Can I Eliminate Risk?

    Not really. There's always going to be some inherent risk in everything we do. But there are different responses that you can take to reduce that risk. For instance, you can mitigate the risk by putting appropriate controls and safeguards in place to decrease the impact of that risk.

    Play Video

  • What Happens When I Submit a Support Ticket?

    What Happens When I Submit a Support Ticket?

    You can submit a support ticket in a number of different ways, give a call, send an email, use our portal. However you decide to submit it, we handle them all with the same process. As soon as our service desk receives your ticket, it’s assigned a tracking number and triaged for impact and severity.

    Play Video

  • How do we Create Our Videos?

    How do we Create Our Videos?

    Have you ever wondered how we make our videos? Well Hayley is here to explain just how we do it and even share some tips on how you can get started making videos for your business.

    Play Video

  • What Is Security Awareness Training?

    What Is Security Awareness Training?

    Security awareness training is a critical component of any organization's security strategy. It involves training employees on common security risks and how to recognize and avoid them. This includes identifying phishing emails, scam calls, and text messages, as well as learning how to follow electronic funds transfer and more.

    Play Video

  • What is Business Intelligence?

    What is Business Intelligence?

    BI stands for “Business Intelligence”. Like all acronyms in IT, the definition varies. But I like this definition: BI is a collection of software that allows organizations to analyze existing data and receive meaningful results. Think for a minute about your organization. How it collects data as part of its business.

    Play Video

  • Simplex-IT 2023 Annual Celebration Recap

    Simplex-IT 2023 Annual Celebration Recap

    On July 19th, 2023, we hosted our 16th annual anniversary party with an astonishing turnout of around 70 people. Thank you to everyone who made it out to celebrate 16 years of Simplex-IT! If you couldn’t make it this year, check out next year, that'll be the 17th annual because that's how things work around here.

    Play Video

  • How Can IT Create Value For Your Organization?

    How Can IT Create Value For Your Organization?

    This question is tougher than it sounds. The simple answer is “try running your organization without IT”. But that’s lazy. Here are several types of improvements that IT can bring to most organizations. Of course, your mileage may vary.

    Play Video

  • What is Cyber Insurance?

    What is Cyber Insurance?

    In today's digital age, businesses and individuals face a growing threat of cyber-attacks, data breaches, and other types of cyber incidents. These incidents can cause significant financial and reputational harm to those affected. Cyber insurance is a type of insurance designed to protect against these risks.

    Play Video

  • How Can I Prevent Getting Ripped Off by an MSP?

    How Can I Prevent Getting Ripped Off by an MSP?

    As technology continues to advance, businesses of all sizes rely on their IT to support their success. With this growing reliance on technology comes the need for expert IT support, leading many businesses to turn to IT Managed Service Providers (MSPs). However, not all MSPs are created equal, and choosing the wrong one can be a costly mistake.

    Play Video

  • Will Simplex-IT Make My Organization CMMC Compliant?

    Will Simplex-IT Make My Organization CMMC Compliant?

    CMMC stands for Cybersecurity Maturity Model Certification. CMMC is a program that the Department of Defense is implementing to ensure the confidentiality of sensitive information.

    Play Video

  • What Questions Should I Ask An IT Provider Before Signing Up?

    What Questions Should I Ask An IT Provider Before Signing Up?

    If you're a business owner looking to partner with an IT provider, there are a few important questions you need to ask before signing up. In this video, we'll explore five crucial questions that will help you find the right IT partner.

    Play Video

  • What If We're Hacked?

    What If We're Hacked?

    Ok, first of all, got a cyber response plan? Use it. If you don't? Then if you have cyber insurance, contact your insurance people. If you're not sure, contact your IT support folks. But don't start "fixing the problem. You actually could make it worse.

    Play Video

  • How Do I Select a Reputable IT Provider?

    How Do I Select a Reputable IT Provider?

    Are you a business owner or manager looking to select a reputable IT provider but not sure where to start? In this video, we will discuss some key factors you should consider when selecting a reputable IT provider.

    Play Video

  • How Frequently Should I Back Up My Data?

    How Frequently Should I Back Up My Data?

    Backing up data is a critical process for any business to ensure the continuity of its operations in the event of a disaster. The frequency of backups, however, depends on several factors that are unique to each organization.

    Play Video

  • What's the alternative to a Managed Service Provider?

    What's the alternative to a Managed Service Provider?

    While MSPs are excellent for ongoing IT support and management, they may not always be the best fit for your organization. We discuss various alternatives such as Staff Augmentation/Temp Agencies, Project-Based Services, Cloud Service Providers, Freelance IT Consultants, and IT Outsourcing/Break-Fix Companies.

    Play Video

  • MSI Firmware Risk

    MSI Firmware Risk

    Last month, the hardware company MSI was compromised by a malicious entity. These bad guys were able to steal source code, development code, and private keys. The big concern comes from the theft of those private keys. What do private keys do?

    Play Video

  • How Can I Tell If An Email Is A Scam?

    How Can I Tell If An Email Is A Scam?

    So, you just got an email. We get so many every day, but how can we be sure they’re legitimate? Let’s talk about how to identify a malicious email. The first thing that you need to know is that malicious actors often rely on urgency. No matter what the situation is take your time…

    Play Video

  • Should All Businesses Adopt MFA?

    Should All Businesses Adopt MFA?

    If you log into any of your devices and apps with just a username and a password, then you’re using one piece of ID – or one ‘authentication factor’. And that’s just not enough. We recommend using MFA.

    Play Video

  • Does My Old Exchange Still Work?

    Does My Old Exchange Still Work?

    Does your organization have an unsupported version of Exchange (2013 or older), or you’re not keeping up with patching? If so, you might be looking at some problems delivering emails to MS 365 in the near future.

    Play Video

  • How Does Malware Get Into My Company?

    How Does Malware Get Into My Company?

    There are a couple of different ways. The most common is via the web. It can be from a malicious ad that you click on, a redirect that takes you to somewhere you didn’t expect to be, or even just from clicking on the wrong link in your search results.

    Play Video

  • How Do Hackers Use AI?

    How Do Hackers Use AI?

    Hackers are using AI the same way businesses are starting to use AI. They're looking at those repeatable tasks that that are being done and seeing if there's more effective ways to do it. But we're also seeing it lowering that barrier to entry.

    Play Video

  • IT Self-Assessment Workshop Recap

    IT Self-Assessment Workshop Recap

    Thank you to everyone who attended our recent IT Self-Assessment Workshop. Your presence and participation made it a great success! We hope it provided you with new insights and ideas for improving your organization's IT capabilities.

    Play Video

  • How Can I Use AI In Manufacturing?

    How Can I Use AI In Manufacturing?

    These are just a few examples of how AI can be used in manufacturing. By leveraging the power of AI, manufacturers can gain insights into their operations that might otherwise go unnoticed, and make more informed decisions to improve their processes and products.

    Play Video

  • What is DNS?

    What is DNS?

    DNS, or “Domain Naming Services or System or Server”, is why stuff works on the internet. When you go to our website, “Simplex-IT.com”, how does your browser know what server actually hosts that web site? DNS..

    Play Video

  • How Much Do IT Services Cost?

    How Much Do IT Services Cost?

    To tackle this topic, we're going to break the managed service providers (MSP for short) into three tiers. On the low end are MSP's that almost exclusively compete on price. How can they be so inexpensive? Simple. They don't include a lot of services that either protect you or increase your productivity.

    Play Video

  • What is a Virtual CIO?

    What is a Virtual CIO?

    A Virtual CIO (Chief Information Officer) is a third-party consultant who provides strategic IT guidance to organizations on a part-time or project basis. As the title suggests, a Virtual CIO performs many of the same functions as a traditional, in-house CIO, but without being a full-time employee.

    Play Video

  • What Is Covered Under Your Managed Service Agreement?

    What Is Covered Under Your Managed Service Agreement?

    At Simplex-IT, we believe that clarity is key to building strong relationships with our clients. Our monthly IT agreements cover everything that maintains the status quo of your business operations. That means you can rely on our services for ongoing maintenance and support without worrying about additional charges for every little thing.

    Play Video

  • Should I let my web company host my DNS?

    Should I let my web company host my DNS?

    Ok, you’ve hired a company to create and maintain your web site. Everything is going great. They’re creating a web site that represents your organization properly, there’s all sorts of graphics some videos, you’re getting close to public release! And suddenly…they reach out to you with a request.

    Play Video

  • What's the difference between static and dynamic IP addresses?

    What's the difference between static and dynamic IP addresses?

    A static IP address is a fixed address assigned to a computer or other device by an Internet service provider (ISP). It does not change and is used to provide the same address every time a device connects to the internet.

    Play Video

  • Simplex-IT Now Offering SaaS

    Simplex-IT Now Offering SaaS

    Are you always the victim of sarcastic people and never have a comeback? Well, fear not because your friends here at Simplex-IT have you covered! Introducing our latest service offering, SaaS - Sarcasm as a Service.

    Play Video

  • Should I be worried about the 3CX compromise?

    Should I be worried about the 3CX compromise?

    Ok, you may have heard something about the 3CX hack. Lets talk about this. First of all, this video was recorded less than 24 hours after the public disclosure of the compromise. So we might be out of date already. And a shout out to our Voip partner BVoip for keeping us up to date on things.

    Play Video

  • What is WIFI?

    What is WIFI?

    WiFi is a wireless technology that allows devices to connect to the internet or other networks without the need for physical cables. It uses radio waves to transmit data between devices, similar to how a radio station broadcasts music.

    Play Video

  • What are the Pros and Cons of Using a Managed Service Provider?

    What are the Pros and Cons of Using a Managed Service Provider?

    We’ve done a couple of videos about what an MSP (Managed Service Provider) is. Bottom line is it’s an organization that you outsource a majority (if not all) of your IT support to. And that’s what Simplex-IT is.

    Play Video

  • What is an IP Address Used For?

    What is an IP Address Used For?

    An IP address, short for Internet Protocol address, is a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. This Protocol was created by the Internet Gods back around 1985.

    Play Video

  • What are the Pros and Cons of Co-Managed IT Services?

    What are the Pros and Cons of Co-Managed IT Services?

    We wrote the only two books on the topic, so we can definitely talk about this. Plus videos. Yup we got a bunch of videos on it. Keep in mind we’re going to talk about Co-Managed IT from the perspective of the client side, not the service providers.

    Play Video

  • Should I Encrypt My Laptop?

    Should I Encrypt My Laptop?

    Laptop encryption is an important security measure for businesses that want to ensure their data is safe and secure. It prevents unauthorized access to files in the event that a laptop is lost or stolen. It also allows business owners to easily recover any lost data.

    Play Video

  • Has Your Data Been Exposed in A Recent Data Breach?

    Has Your Data Been Exposed in A Recent Data Breach?

    There’s a reason that browsers like Edge have added breached password notifications. Data breaches are an unfortunate part of life and can have costly consequences for individuals. Hackers can steal things like identities and compromise bank accounts, to name a couple.

    Play Video

  • What is “Simplify the Complex”?

    What is “Simplify the Complex”?

    It’s at the core of our name. “Simplex-IT.” Face it. You want to succeed at something, so you need to understand it. But only to the appropriate level of detail. The rest you leave to trusted experts.

    Play Video

  • What are the different versions of CoMITs?

    What are the different versions of CoMITs?

    There are three flavors of CoMITs. We break it down based on what part of IT the Internal IT folks are responsible for versus what we handle. They are: Full CoMITs, Desktop CoMITs, and Server CoMITs.

    Play Video

  • What is a VPN?

    What is a VPN?

    Virtual Private Network (VPN) is a secure connection between two or more computers or devices that allows data to be transmitted and received over the internet without being exposed to malicious actors. It is commonly used to protect personal information, such as passwords and financial data.

    Play Video

  • Is my Microsoft 365 data backed up?

    Is my Microsoft 365 data backed up?

    Microsoft states that their “backup” goal is the availability of data. So it ensures that your 365 data is stored in at least two data centers located in geographically different places. Now if something happens to the servers in one data center (or the entire center or geographic region), there’s another copy.

    Play Video

  • What Are 7 Ways to Increase Productivity Through IT?

    What Are 7 Ways to Increase Productivity Through IT?

    Here is the list of 7 Ways to Increase Productivity Through IT. What you do with it is up to you. Need help? Email us at BobC@Simplex-IT.com to schedule a call. And feel free to share this with your internal IT department.

    Play Video

  • What is Conditional Access?

    What is Conditional Access?

    Conditional access is also known as contextual access. It is a method of controlling user access. You can think of it as several “if/then” statements, meaning “if” this thing is present, “then” do this. Conditional access allows you to add many conditions to the process of user access to a system. It is typically used with MFA.

    Play Video

  • Should Emergency Contact Lists Be Used?

    Should Emergency Contact Lists Be Used?

    Ok, this one is mostly an excuse to tell a true story that happened to me back in the mid-80’s. Because…well, I’m old.

    What’s my point here? It’s great to create processes and procedures to use in an emergency. Documents that identify processes to be followed and resources to be involved.

    Play Video

  • What is a Simulated Phishing Attack?

    What is a Simulated Phishing Attack?

    Let’s start by saying that phishing is a way of contacting someone by posing to be someone else, usually in the form of an email, text message or even phone call. But what is "simulated" phishing? Organizations use simulated phishing attempts to identify employees that may require additional training.

    Play Video

  • Should I Get Rid of or Update Flash?

    Should I Get Rid of or Update Flash?

    Adobe Flash was an add-on to most web browsers back in the day. It really enabled web sites to do a lot. It especially makes it easier for bad guys to do bad things. In fact, both Microsoft and Adobe (and honestly everybody else in the industry strongly recommended removing Flash from all computers and web sites.

    Play Video

  • Can Anyone Fall Victim to a Hack?

    Can Anyone Fall Victim to a Hack?

    Everyone – and I mean everyone – can fall victim to a hack! Hacking attempts are an issue that should be taken seriously. Why? Well, 43% of cyber hacks are aimed at small businesses. And 60% of companies who fall prey to a hack experience a complete crash in the following six months.

    Play Video

  • So You Want to Get to Know Simplex-IT?

    So You Want to Get to Know Simplex-IT?

    Simplex-IT was created in 2007 as a managed service provider, to handle the IT services for our clients. Depending on the client needs that can mean we handle everything or partner with them to provide additional support with what we call Co-Managed IT.

    Play Video

  • How Do You Come Up With Your Pricing?

    How Do You Come Up With Your Pricing?

    So you want to learn a little more about how we come up with our pricing? That’s great! Our SiMS (Simplex-IT Managed Services) offering includes a compilation all of the products and services your organization needs to have the most effective IT for your clients.

    Play Video

  • What is a Keylogger?

    What is a Keylogger?

    Keyloggers are programs that capture everything you type. Passwords, credit card numbers, the webpages, answers to security questions – all by logging your keyboard strokes. The program is installed on your computer, usually through some form of spyware, and records what you type.

    Play Video

  • LastPass Hack.... Worse Than We Thought?

    LastPass Hack.... Worse Than We Thought?

    So we talked about the security vendor, basically a password vault, LastPass was breached. At that time, both LastPass and we said it was not that big of a deal because they didn't get much. Well, it turned out not entirely accurate.

    Play Video

  • What is Distributed Denial of Service (DDoS)?

    What is Distributed Denial of Service (DDoS)?

    A DDoS attack stands for “denial of service” attack, where the bad guys try to overwhelm a network or server with a ton of traffic. This will typically cause whatever they hit, like your website, online platform, or application, to crash.

    Play Video

  • What is a Botnet?

    What is a Botnet?

    What is a botnet? We talked recently about what a bot (short for robot) is (usually a computer that’s been compromised to do bad things quietly in the background). But what’s a botnet?

    Play Video

  • What is a Bot?

    What is a Bot?

    What is a bot? A bot is short for robot, but that part you probably knew. These days the term “bot” is used most often for cyber security.

    Play Video

  • Our Top 10 Moments of 2022

    Our Top 10 Moments of 2022

    Simplex-IT has had a busy year this year, from Tradeshows to our big office move, to our Annual Party at Quarter Up to our new Content Creation Team to our Awards, here are the Top 10 Moments of 2022.

    Play Video

  • What is Cloud9?

    What is Cloud9?

    Cloud9 is the name of a lot of things. Unfortunately, it is now the name of a new botnet. Oh, that’s a network of computers all running malware applications, usually without the knowledge or permission of the computer owner.

    Play Video

  • What Should I Do When My Business Credentials Are Stolen?

    What Should I Do When My Business Credentials Are Stolen?

    You’ve just discovered there are compromised employee credentials or other sensitive data of your company exposed and available on the Dark Web. Your company should immediately start taking appropriate steps and measures to correct or minimize the risks and potential damages associated with this exposed data.

    Play Video

  • What are OneDrive and SharePoint?

    What are OneDrive and SharePoint?

    OneDrive is a Microsoft cloud storage service that lets you store your personal files in one place, share them with others, and get to them from any device connected to the internet. There are personal and business versions of OneDrive.

    Play Video

  • Simplex-IT's Songs of the Season

    Simplex-IT's Songs of the Season

    Don’t you just wish you had an album to throw on and reminisce about the good ol’ days? Well, here at Simplex-IT we have curated a list of over 30 classic holiday songs we all know and love, Simplex-IT's Songs of the Season.

    Play Video

  • What is the Difference Between MSP and Break Fix?

    What is the Difference Between MSP and Break Fix?

    We’ve talked about both Break Fix and Managed Services in other videos. Now, let’s compare them against each other (with plusses and minuses). Of course we’re specifically talking as these concepts relate to IT resources for organizations.

    Play Video

  • What to expect after signing up with Simplex-IT?

    What to expect after signing up with Simplex-IT?

    Loads of fun! It's easy to get started with Simplex-IT. Once you've agreed to our proposal, the next 30-45 days will be spent transitioning your organization over to our services, or welcoming you into our family as I like to say.

    Play Video

  • Why did I start Simplex-IT as an MSP?

    Why did I start Simplex-IT as an MSP?

    I started Simplex-IT in 2007 and at that time the MSP industry was just getting started. I was then dealing with being a consultant and working with a lot of companies on primarily database, development and infrastructure work. But I wanted to have a company that was based on relationships.

    Play Video

  • Why is Empowering Clients and Community with open Knowledge Sharing unique for Simplex-IT?

    Why is Empowering Clients and Community with open Knowledge Sharing unique for Simplex-IT?

    Empowering Clients and Community with open Knowledge Sharing IT is hard. That's why in the first 8 months of '22 we created over 60 videos and held half a dozen webinars aimed at helping explain IT concepts, buzzwords, current happenings, and have some fun. All minimal (usually none) sales tactics.

    Play Video

  • Why is Ever evolving solutions with a focus on security unique for Simplex IT?

    Why is Ever evolving solutions with a focus on security unique for Simplex IT?

    IT changes. This is especially true with security. Simplex-IT has developed an annual process we call SiMS (for Simplex-IT Managed Services) that involve each year evaluating our Software, Tools, Methodologies and Processes (we call them "STMPs", pronounced "Stamps").

    Play Video

  • What is Technical Debt?

    What is Technical Debt?

    You may have heard the term "Tech Debt", aka "Technology Debt", "design debt" or "code debt". It's a term that is commonly used to describe a situation where an organization is using a technology solution that...well, isn't the best available. But what does it mean, and is it a specific definition?

    Play Video

  • Why is The Industry Recognized Leader in Co-Managed IT services unique for Simplex-IT?

    Why is The Industry Recognized Leader in Co-Managed IT services unique for Simplex-IT?

    Simplex-IT has spoken at nearly every MSP conference about Co-Managed Services. CEO Bob Coppedge has written the only two books on the topic (both best sellers on Amazon).

    Play Video

  • How to Choose the Right Password Manager?

    How to Choose the Right Password Manager?

    First it must be protected by end-to-end encryption. This means even if your data is intercepted, no one can read it. Next, make sure the manager works across all applications.

    Play Video

  • Why is MSP First and Foremost unique for Simplex-IT?

    Why is MSP First and Foremost unique for Simplex-IT?

    Simplex-IT was formed in 2007 as a Managed Service Provider. To this date well over 80% of our revenue comes from either MSP or Co-Managed MSP agreements or projects with clients.

    Play Video

  • What is an Algorithm?

    What is an Algorithm?

    An algorithm is simply a set of instructions given to precisely define a sequence of some kind. That's pretty much it! Usually, we're talking about instructions given to computer systems to allow them to do their thing.

    Play Video

  • What is CoMITs?

    What is CoMITs?

    CoMITs is actually a made-up term. And I should know, since I'm the guy who made it up. Co-Managed IT is a collaborative relationship between a Managed Service Provider and the Internal IT resources for an organization.

    Play Video

  • Channel Futures MSP 501 Award 2022

    Channel Futures MSP 501 Award 2022

    Each year Channel Futures has created a list of the top 501 Managed Service Providers in the world based on the largest and most comprehensive survey and ranking of IT companies that provide managed services in the technology industry. And once again, Simplex-IT has been recognized within this list.

    Play Video

  • What is a Foundational IT Assessment?

    What is a Foundational IT Assessment?

    Our Foundational IT Assessment covers 4 key areas of your IT: Your network, Microsoft 365, Cyber Security, Cyber Insurance. It’s designed to give you a high-level snapshot about your IT environment.

    Play Video

  • Case Weatherhead Award 2022

    Case Weatherhead Award 2022

    The Case Weatherhead awards are honestly the premier business awards in Northeast Ohio. And for the sixth year, Simplex-IT has been recognized by those fine folks. Yup, Simplex-IT is a winner of the Weatherhead 100 award for 2022.

    Play Video

  • D2P Show

    D2P Show

    Simplex-IT will be at the Design2Part show at the John S. Knight Center in Akron, Ohio, October 26th and 27th, 2022.

    Play Video

  • What is the Cost of Downtime?

    What is the Cost of Downtime?

    How expensive is downtime? "The Server is down." Yeah, we hate to hear that. Because downtime is expensive. But how expensive? That's a really important number that we ignore way too much. Downtime.

    Play Video

  • Manufacturing and Technology Show

    Manufacturing and Technology Show

    Hey, if you're in manufacturing and have some time October 18-20, come visit the Manufacturing & Technology show at the Huntington Convention Center here in Cleveland. Simplex-IT is proud to be one of the folks exhibiting there. So obviously you should attend.

    Play Video

  • What is Authentication?

    What is Authentication?

    Authentication is a process to validate the identity of someone (or something). For this conversation we’re talking strictly in the cyber world.

    Play Video

  • Are Cyber Criminals Entrepreneurs?

    Are Cyber Criminals Entrepreneurs?

    Think about the bad guys behind cybercrime. Do you think of the evil genius writing evil stuff living in moms basement? Or the head of an organization with employees, products and marketing strategies making millions of dollars?

    Play Video

  • How Can I Tell If an Email Is a Scam?

    How Can I Tell If an Email Is a Scam?

    I want to show you something that we just received that is actually kind of funny. Spoiler alert it's bad guys trying to get us to give them money and we foiled it. We will show you how!

    Play Video

  • What Should You Do If Your Organization Has Been Breached?

    What Should You Do If Your Organization Has Been Breached?

    Does your organization have data backups or an incident response plan? If you already have an organization with a strong cybersecurity background, contact them immediately and follow their lead. If you’re on your own, here are some steps you can follow.

    Play Video

  • What Makes Simplex-IT Unique?

    What Makes Simplex-IT Unique?

    Four unique things about Simplex-IT, MSP first and foremost, the industry recognized leader in Co-Managed IT services, ever evolving solutions with a focus on security, and empowering clients and community with open knowledge sharing.

    Play Video

  • Who is Simplex-IT?

    Who is Simplex-IT?

    So who is Simplex-IT? We've also been called simplex it or my favorite simple exit. Simplex-IT was created in 2007 as a managed service provider. We try to help organizations to succeed.

  • IT Budgeting 101 Webinar

    IT Budgeting 101 Webinar

    IT Budgeting is a planning tool. The budget helps us see down the road and around corners. Budgets drive lifecycle management and are a critical component of strategic planning. Planning expenses and values behind them is key to creating a strong, healthy IT resource for any organization.

    Play Video

  • Should You Care About Uber Being Hacked?

    Should You Care About Uber Being Hacked?

    Should You Care About Uber Being Hacked? The quick answer is yes-ish. So far Uber has not come forward with any claims of any meaningful user data but the jury is still out to a certain degree. So what should you do?

    Play Video

  • How Do You Keep Your Services Up to Date?

    How Do You Keep Your Services Up to Date?

    IT changes. A lot. And often. So how do we keep up in terms of IT support and cybersecurity services? Here at Simplex-IT we've developed our services around an annual cycle. We consistently watch the market for emerging technologies, evaluate, and then select the best options for our clients.

    Play Video

  • Am I Too Small For Cybercriminals?

    Am I Too Small For Cybercriminals?

    The bottom line is you’re “big enough” to warrant attention. Everyone is. And your organization is “big enough” to warrant the same attention from the bad guys. All organizations are. It’s time for you to take security seriously!

    Play Video

  • When should I use an MSP?

    When should I use an MSP?

    We've discussed what a Managed Service Provider (aka MSP) is before and we've even talked about when you shouldn't use an MSP to support the IT for your organization. So we still need to cover when you should use an MSP, right?

    Play Video

  • What is Break Fix?

    What is Break Fix?

    Break Fix is a simple concept. It's not limited to IT. The bottom line for Break Fix is this: "When it breaks...fix it. Otherwise, leave it alone." But if you get bit by just a couple break-fix vulnerabilities, the savings you think that break-fix brings are likely gone.

    Play Video

  • Why shouldn't everyone have access to everything?

    Why shouldn't everyone have access to everything?

    The principle of least access is the idea that an employee only should have access to the bare minimum amount of technology systems they need to do their job. Applying the principle of least access will limit the amount of information that is compromised during an attack.

    Play Video

  • Why Can't We Pick and Choose Only the IT Services We Want?

    Why Can't We Pick and Choose Only the IT Services We Want?

    We are trying to create the best and most productive and secure IT environment for your organization and there is a lot that goes into every one of these aspects that are critical to your organization’s success. And it’s kind of like Jenga.

    Play Video

  • Should I Be Concerned About LastPass And Their Data Breach?

    Should I Be Concerned About LastPass And Their Data Breach?

    So, you've heard us (and lots of other folks) warn you over and over again...use a password manager to protect your...ummm...passwords. Like LastPass. You know, the cloud-based password manager that was hacked two weeks ago.

    Play Video

  • Types of Phishing Attacks and How to Avoid Them

    Types of Phishing Attacks and How to Avoid Them

    Here are a few types of phishing campaigns and how they work. And the best way to protect against phishing is to protect your information and your technology by using multifactor authentication, and train your employees.

    Play Video

  • Who Are NIST and CISA and Why Do They Matter?

    Who Are NIST and CISA and Why Do They Matter?

    NIST stands for National Institutes of Standards and Technology and they're the ones that define all these industry standard practices. They're the ones that define what exactly is a pound, but they also write cybersecurity frameworks and compliance frameworks.

    Play Video

  • Should Users Have Admin Rights?

    Should Users Have Admin Rights?

    What are “Local Admin Rights” for computers, and do I want my end users to have them? Every time you log onto your computer, you’re doing so with your “User Account”. That’s not just your user name and password. It’s all of the setting specific to your account.

    Play Video

  • 5 Ways to Cut IT Costs Webinar

    5 Ways to Cut IT Costs Webinar

    In this webinar, we discussed 5 actionable ways that you may be able to save money without compromising the value, productivity and security that IT brings to your organization (and your clients). We also talked about things like Shadow IT, training, financing and more.

    Play Video

  • Simplex-IT's 15th anniversary Party Recap!

    Simplex-IT's 15th anniversary Party Recap!

    Thanks everyone for coming out, we had such a great time! Thank you to Quarter Up for hosting us again!

    Play Video

  • What is a Pen Test?

    What is a Pen Test?

    Pen testing is short for penetration testing, which is where you hire the good guys to act like the bad guys and break into your network. A good pen tester will do some information gathering, which is referred to as reconnaissance, ahead of time.

    Play Video

  • What is the Dark Web?

    What is the Dark Web?

    Technically, the “Dark Web” is simply areas on the Internet that require specific credentials or software or configurations to access. Resources on the Dark Web do their best *not* to show up on search engines.

    Play Video

  • When NOT to use an MSP?

    When NOT to use an MSP?

    5 reasons why your organization might not want to use an MSP for their IT support needs.

    Play Video

  • What is Shadow IT?

    What is Shadow IT?

    Shadow IT is a term given to IT resources...hardware, software, subscriptions, services...that are used by an organization without the knowledge of whoever’s handling IT or cybersecurity for the organization.

    Play Video

  • What is Co Managed IT?

    What is Co Managed IT?

    What is Co-Managed IT services, anyway? Great question. We’ve talked before about Managed Services, a relationship that organizations use to obtain IT services exclusively from a 3rd party, aka an MSP (Managed Service Provider).

    Play Video

  • Can Your Cyber Insurance Claim Be Denied?

    Can Your Cyber Insurance Claim Be Denied?

    Insurance companies are getting stricter in what their clients need to do on the security front before offering a cyber security policy.

    Play Video

  • Summer in Scotland Recap

    Summer in Scotland Recap

    We had the best time getting to attend and sponsor another @Manufacturing Works networking event.

    Play Video

  • What are SSL Certificates?

    What are SSL Certificates?

    SSL stands for "Secure Socket Layer" and are important in IT. Companies purchase SSL Certs from 3rd party resellers like GoDaddy or Network Solutions. These 3rd parties verify that the company is who they say they are.

    Play Video

  • Why Do I Still Get Spam if I Have a Spam Folder?

    Why Do I Still Get Spam if I Have a Spam Folder?

    The simple answer is that computers aren't perfect. The bad guys are using low-tech emails from using common email addresses from a legit email provider like Gmail or Yahoo.

    Play Video

  • What Are IT Certifications?

    What Are IT Certifications?

    Let's talk about IT certificates. There are 2 types: Vendor oriented and Vendor Neutral.

    Play Video

  • Are IT Certifications Important?

    Are IT Certifications Important?

    Are IT Certifications worth it? Bob discusses advantanges for the individual, the hiring company and the employer for receiving IT Certifications.

    Play Video

  • What is IaaS, SaaS, & PaaS?

    What is IaaS, SaaS, & PaaS?

    What is Infrastructure as a Service or IaaS, Software as a Service or SaaS, and Platform as a Service or PaaS?

    Play Video

  • New Exchange Threat, Should I be Worried?

    New Exchange Threat, Should I be Worried?

    What is the new exchange threat? Should I be worried about the new exchange threat? How can I protect myself against the new exchange threat?

    Play Video

  • What is the Difference Between Business Continuity and Disaster Recovery?

    What is the Difference Between Business Continuity and Disaster Recovery?

    What is the Difference Between Business Continuity and Disaster Recovery? And which would you want for your business?

    Play Video

  • How Much Does the Cloud Cost?

    How Much Does the Cloud Cost?

    So how much does the cloud cost? Well it depends on the size and complexity of what you want to use the cloud for. The price will increase when you start including things like VMs, replication, backups, and other applications.

    Play Video

  • What is Follina?

    What is Follina?

    In a nutshell Follina is where bad guys send a malicious document, usually as an email attachment. That document would open up a URL (a web address) and start executing code located on that web site to take control of the system that opened up the document.

    Play Video

  • What is the difference between CapEx and OpEx?

    What is the difference between CapEx and OpEx?

    What is the difference between CapEx and OpEx? This is a continuation of our Cloud series.

    Play Video

  • What the Heck is Azure?

    What the Heck is Azure?

    Azure is Microsoft’s version of a cloud service. Other companies like Amazon and Google also have their own versions of cloud services to choose from.

    Play Video

  • What is TPM and Why Should I Care?

    What is TPM and Why Should I Care?

    So you’re wondering whether it’s time to replace your desktops and/or laptops. Or you’re buying new computers but want to save as much money as you can. Why should the term “TPM” mean anything to you?

    Play Video

  • Can you Completely Outsource Cybersecurity?

    Can you Completely Outsource Cybersecurity?

    Cybersecurity is complicated. As we’ve discussed before, every opportunity to get data flowing between applications, devices, organizations, anything…is an equal opportunity for a bad actor to access that data.

    Play Video

  • Why Does IT Have to be So Hard?

    Why Does IT Have to be So Hard?

    People are always asking us, "Why is IT so hard?". We love to make it as easy as possible by simplifying the complex. If all of these IT terms overwhelm you, then consider getting a partner for your organization to help you through it.

    Play Video

  • What's the Difference Between Public, Private, & Hybrid Clouds?

    What's the Difference Between Public, Private, & Hybrid Clouds?

    There are 3 types of clouds: Public- Private- Hybrid. Learn which option is best for you and your organization.

    Play Video

  • Why Do We Have a 30 Day Out Option?

    Why Do We Have a 30 Day Out Option?

    Not all relationships last forever. We get that and although we hope that ours does, the cards might not agree. However it’s important to us that each month we can look at each other and say, “we got value out of this.”

    Play Video

  • Why Do I Need to Manage Passwords?

    Why Do I Need to Manage Passwords?

    Why do I need to manage Passwords? Because passwords are a pain! Why do I need a Password Management system for my organization? Because passwords and users are a bigger pain!

    Play Video

  • What is the Cloud?

    What is the Cloud?

    So, what the heck is the cloud? In the tech industry, the joke is that the cloud is somebody else’s computer. But to break it down, the cloud is taking the server in your office and migrating it to a resilient data center that you access over a private network or internet.

    Play Video

  • What Kind of IT Support Can My Organization Use

    What Kind of IT Support Can My Organization Use

    5 ways organizations can get IT support. Depending on the complexity of your organization, you actually might be using more than one! But if your organization uses Abdication or Seagulls, we need to talk.

    Play Video

  • Why Do You Charge a One Time Onboarding Fee?

    Why Do You Charge a One Time Onboarding Fee?

    So, why do we include a one-time onboarding fee to get the relationship started in addition to the monthly services?

    That’s a good question, let’s talk about it.

    Play Video

  • Manufacturing Talent and Technology Showcase

    Manufacturing Talent and Technology Showcase

    We had the best time getting to attend and sponsor the Manufacturing Works Talent and Technology Showcase Annual Meeting event.

    Play Video

  • Doesn't IT Handle All Cybersecurity?

    Doesn't IT Handle All Cybersecurity?

    Doesn't IT handle all cybersecurity? In a word no. This video is a great explanation as to why cybersecurity is more than just the IT department or MSPs responsibility.

    Play Video

  • Why is Cyber Security Always Changing?

    Why is Cyber Security Always Changing?

    IT has developed incredible ways to increase productivity for organizations where they bring value throughout the organization and for all their customers and stakeholders.

    Play Video

  • What is Silo IT

    What is Silo IT

    Silo IT is a form of IT services or support, usually as part of a Co-Managed IT relationship.

    Play Video

  • Is Multi Factor Authentication Really Necessary

    Is Multi Factor Authentication Really Necessary

    Multifactor authentication is another layer of security beyond a password and there are many ways to introduce additional authentication methods.

    Play Video

  • How do you select the right MSP?

    How do you select the right MSP?

    Hiring a Managed Service Provider (MSP) for your organization shouldn't be a hasty decision. Here are six important factors to keep in mind:

    Play Video

  • What exactly is a managed service provider or MSP?

    What exactly is a managed service provider or MSP?

    An MSP is a third-party company that a business can collaborate with to help manage part or all of the IT for a business, both locally (aka "on prem") or in the cloud.

    Play Video

  • Channel Strong Tour Recap

    Channel Strong Tour Recap

    We had a great time at the Channel Strong Tour meeting with other MSPs in the area as well as the various vendors that came! Thank you to our clients who also showed up!

    Play Video

  • Key Simple Security Steps Webinar

    Key Simple Security Steps Webinar

    Simplex-IT’s Cybersecurity Czar Adam Evans and CEO Bob Coppedge highlight 5 steps your organization can (relatively) quickly and easily implement towards protecting your organization.

    Play Video

  • We Made The News?!

    We Made The News?!

    Our new and innovative Hyper Security 2.0 service makes the news. It's a foolproof guarantee to protect against cyber phishing and any other attempt to hack into your data or systems.

    Play Video

  • Happy Patrick's Day!
  • Where's My Office?!

    Where's My Office?!

    Drew stole Ryan's office to make a production studio!

    Play Video