Learning Center: Videos
Our Learning Center Video Library is designed to provide answers to questions that we are most frequently asked. Since we have so many videos, we have separated them out into categories to help you navigate to the video that will best answer your questions. We also have a search feature on each page.
-

What is a Learning Management System (LMS)?
If you’ve ever taken an online course, completed workplace training, or logged into a portal for tutorials, you’ve probably used a Learning Management System, better known as an LMS. So what exactly is it? An LMS is a software platform that stores, delivers, and tracks learning materials in one place.

What’s the Difference Between Co-Managed IT & Fully Outsourced IT?
When it comes to managing technology, most businesses fall into one of two camps: fully outsourced IT or co-managed IT. Understanding the difference can help you make smarter decisions and save time, money, and stress.

What is Pre Texting?
Pretexting is the art of storytelling—but with a hidden agenda. It’s when someone creates a fake but believable scenario to trick you into giving up private or sensitive information. Scammers, or “pretexters,” use details they’ve gathered about you to build trust and make their story sound legitimate.

What’s the Difference Between Adobe Applications?
Adobe Creative Cloud can feel overwhelming with so many tools—Photoshop, Illustrator, Premiere, InDesign, After Effects, and more. So how do you know which one to use? In this video, we break it down in simple terms.

What's the Difference Between Windows 11 & a Windows 11 PC?
At first glance, “Windows 11” and “Windows 11 PC” sound like the same thing—but they’re not. Understanding the difference can help you make smarter decisions when buying or upgrading your computer. You can have one without the other.

What's the Difference Between Firmware and Software?
Firmware and software—two terms that sound similar but play very different roles in your devices. In this video, we break down what each one does and why understanding the difference matters. Watch now to learn the key differences and why they matter for your tech!

What’s the Difference Between an MSP, MCP, MITP, MNP, MSSP, and MIP?
Confused by all the IT acronyms floating around—MSP, MCP, MITP, MNP, MSSP, and now MIP? You’re not alone! In this video, Bob Coppedge, CEO of Simplex-IT, breaks down what these terms mean, why they keep changing, and what really matters for your business.

What is Software?
If you’ve ever used a computer, smartphone, or tablet—you’ve used software. But what is it really? In this video, we break down what software actually is, how it works, and why it’s the invisible backbone of your technology.

What Are the Downsides of Outsourcing IT?
Outsourcing your IT can be a smart move. You get expert support, predictable costs, and less day-to-day management. But before you hand over the keys to your network, it’s important to understand the potential downsides. In this video, we break down the most common challenges of outsourcing IT.

How To Avoid The Downsides of Outsourcing IT
Outsourcing your IT can save time, reduce stress, and give your business access to expert support, but only if you choose the right partner. In this video, we’ll show you how to avoid common outsourcing headaches like hidden fees, slow response times, and unclear contracts.

What is an Endpoint Firewall?
What’s an endpoint firewall and why does your business need one? Endpoints, like laptops, desktops, tablets, and smartphones, are the doors into your network. Without protection, these devices can become easy targets for hackers and malware.

What is a Packet Sniffer?
Ever wondered what a packet sniffer is and why IT teams use it? Think of it like a traffic camera for your network, capturing tiny packets of data as they move between devices. Packet sniffers can help diagnose slow connections, monitor performance, and even detect potential cyber threats.

What is a White Hat Hacker?
When most people hear the word hacker, they picture criminals breaking into systems and stealing data. But not all hackers are bad. Some are the good guys—and businesses actually hire them to keep data safe. These are white hat hackers, also known as ethical hackers.

What is DNS (Domain Name System)?
Ever wondered how typing a web address like https://www.simplex-it.com magically brings you to the right website? The answer is DNS, the internet’s phone book. In this video, we’ll break down, what DNS is and how it works behind the scenes, why it’s critical for websites, emails, business operations and more!

Are Some Excel Links Getting Blocked?
Starting October 2025, Microsoft Excel will begin blocking links to certain risky file types. Why? Because cybercriminals have been exploiting these links to sneak malware into systems. That innocent-looking spreadsheet with a link? It could have been a hacker’s favorite tool.

The Claims That Matter Most To Our Clients
If you’ve been researching Managed Service Providers (MSPs), you’ve probably noticed they all sound the same: “tailored IT services,” “complete coverage,” “exceptional support.” At Simplex-IT, we’re here to show you why we’re not your standard MSP, we’re the IT partner you’ve been searching for.

When is Co-Managed NOT Co-Managed?
Are you looking for a Co-Managed IT partner but don’t know exactly what a co-managed partner should look like? In this video, Bob explains what co-managed IT really means and what makes a good vs. bad co-managed partner.

What is the Difference Between a Server and a Desktop/PC?
A desktop PC and a server may look similar on the surface, but they serve very different purposes and are built with different priorities in mind. While both servers and desktop PCs are integral to computing environments, they are optimized for different purposes.

What is a Brute Force Attack?
A brute force attack is one of the oldest and most common cyberattack methods, where attackers try every possible password or key until they break in. With modern tools, they can test thousands of combinations in a short time. In this video, we’ll cover the different types of brute force attacks and how to prevent them.

What is Shadow AI?
Shadow AI isn’t a Marvel villain—it’s the unsanctioned AI tools your employees are already using at work. Think ChatGPT, Claude, or whatever new tool they found online. If it’s not approved, not secured, and not monitored, that’s Shadow AI.

When Did AI Become New ERP?
Remember the 1990s ERP craze? Companies thought installing software would magically fix everything and up to 60% of implementations failed. Fast forward to today, and AI is following the same path. According to a recent MIT report highlighted by Fortune, 95% of generative AI pilots fail. Why?

What is a URL?
You use them every day, but do you really know what a URL is? In this video, we explain URLs and why having clear, secure, and user-friendly URLs is essential for maintaining a strong online presence—and how it can impact your customers’ experience.

How Do I Manage Microsoft Licenses for my Business?
Managing Microsoft 365 licenses doesn’t have to be overwhelming. Whether you’re running a startup or scaling your business, understanding how Microsoft licensing works is key to saving money, boosting security, and giving your team the tools they need to succeed.

What is an AI Acceptable Use Policy?
As AI tools like ChatGPT become more common in the workplace, it’s essential for organizations to set clear rules around how these tools are used. That’s where an AI Acceptable Use Policy (AUP) comes in.
