0:14
Stop posting your personal data
Simplex-IT
0:07
Company cards are great for snacks
0:09
Simplex-IT Core Values
6 Things you shouldn't share online
1:33
Drew's Best Moments
0:06
Who is to Blame for a Cybersecurity Breach?
Happy Halloween ๐ป๐๐ฆ
Merry Christmas! ๐๐ ๐คถ
Happy New Year! ๐ฅ๐ฅณ๐
Happy Thanksgiving ๐ฆ
Hacker Holiday
0:11
My laptop keeps disconnecting from my Wi Fi
Hello Decemberโ๏ธโ๏ธ
Keyboard Shortcuts โจ๐ป
Korrey is Surely Amazing
0:22
12 Days of Updates
0:20
Working in a Wi-Fi wonderland
0:17
It's beginning to look a lot like Malware
Keyboard Shortcuts From Our Techs โจ๐ป
Keyboard Shortcuts Brought to You by Our Very Own Techs
0:10
0:47
Data at Rest vs Data in Motion
Whatโs the worst time to learn CPR?
0:58
Bob's trip to Dallas
0:18
What is a Zero Day Attack?
...and Solve Crimes
When is IT obsolete in many manufacturing companies?
Solving Your Problems
0:12
Russian Proverb
Whatโs the most secure tablet?
Things to Consider Before You Buy a New Computer
0:26
What if......
Who wants "S-H-I-" oh...
0:36
iT or It
3 Goals of Business
0:08
If techs wrote conversation hearts
0:32
What is Risk?
Client Testimonials
0:51
New Podcast Coming March 1st
Why was the computer cold?
Happy St. Patrick's Day ๐๐๐ป
Job vs Career
Information and Technology
Happy Pi Day๐ฅง๐
1:00
Flexible configurations...Ohh geez.
Architected like Dinosaurs๐ฑโ๐
Why did the computer go to the doctor?
Busy on Busy
Automate tasks in Excel
Tech facts
My employees want fewer video meetings, should we cut down?
0:05
Computers are like bikinis...
6 Mobile Device Attacks You Need to Watch Out For
Should my business upgrade to Windows 11?
0:56
Biz-Tech Twists Episode 8 Sneak Peek
Bob still uses Myspace?! ๐ค
Success in business usually comes to those who dare to act.
0:30
Pi(e) Day Delivery ๐ฅง
0:53
How can I decrease technology costs for my business?
0:48
How do I get employees trained?
How do I plan for risk?
What is a Zero Day Vulnerability?
How can I protect my business against cyber threats?
0:57
3 Basic Ways To Protect Your Business Email
What is Chat GPT?
0:49
How Do I Start Embracing Collaboration?
How Do I Keep My IT Practices Up To Date?
0:31
Silicon Valley Bank Collapse
Veeam Vulnerability
Direct Deposit Scam
0:27
Microsoft Outlook Vulnerability
How much does it cost to implement CMMC?
Happy Easter ๐ฐ
0:59
Biz-Tech Twists Episode 7
0:52
Leverage Corporate Data
3 Basic Steps To Better Cloud Security
0:33
What are the 2 most common ways IT creates value for organizations
6 Steps To Effective Vulnerability Management For Your Technology
0:54
Stop Fraud With Your Online Banking
How Frequently Should I Back Up My Data?
Will Simplex-IT make my organization CMMC compliant?
Should all businesses adopt MFA?
0:55
Always comes back to Tequila
When we make the most of a time we lost or a failure, is it still a loss?
Biz-Tech Twists Episode 14
What if we're hacked?
0:50
Does my old Exchange still work?
Toyota Data Breach
0:34
What is Cyber Insurance?
What Is Security Awareness Training?
0:43
What is a Tabletop Exercise?
Can I eliminate risk?
What Tech Policies should I have for my organization?
MSI Firmware Risk
0:38
Biz-Tech Twists Episode 17 Sneak Peek
0:46
Have you told your employees they aren't supposed to be nice?
0:45
Biz-Tech Twists Episode 17
On Premises VS Cloud Costs
Biz-Tech Twists aka Cloud Myth Busters
46:17
Episode 18: Cloud Myths
What Happens When I Submit a Help Ticket?
How do IT Outsourcing Companies Charge for Their Services?
What is Endpoint Detection and Response (EDR)?
What is Business Intelligence?
.ZIP & .MOV Top Level Domains
What is the difference between an MSP and an MSSP?
What Is a Business Impact Analysis?
0:44
What is Windows end of life?
0:35
Biz-Tech Twists Episode 19 Sneak Peek
0:40
Talking About Our Competitors
0:39
What is a CISO?
0:16
Are Google's Policy Templates a Good Idea?
6 THINGS YOU SHOULD DO TO HANDLE DATA PRIVACY UPDATES
What are SIEM and SOAR?
Happy Independence Day!!
Problems Don't Get Better With Age
Biz-Tech Twists Episode 21 Sneak Peek
Biz-Tech Twists Episode 21
IT and HR, let's talk about it
Free Food and Drinks!
Biz-Tech Twists Podcast Episode 22 Sneak Peak
Spoon Feeding Cybersecurity
Protecting against cyber threats is crucial, but how do we market this ongoing battle effectively?
Think marketing is all about creativity and strategy?
The Intricacies of Offboarding a Vital IT Role
The Episode Where Bob and Kevin Breakup
Farewell Kevin!
Biz-Tech Twists Episode 25 Teaser
Biz-Tech Twists Episode 25 Configuring Cloud and CRMs
0:37
The Bob and Bob show
Unique Selling Proposition
0:23
The World is Your Oyster!
Regarding the topic of beautiful babies
How to make friends in a digital age with Bob & Howard!
Bobโs old! His first job was in 1977... woah
Note to self, never joke with billionaires unless you want security called.
0:41
Teachers Can Do Anything! #podcast
Teachers Can Do Anything! #podcast #technology
Bring Your Own Device (BYOD) #technology #business #podcast
How to create videos #technology #business #shorts
Recipes for Consistency #automation #technology #podcast
The 'why' is one of the most underutilized questions in business #technology #podcast #shorts
0:29
Condescending IT jerks #technology
I'm not tech-savvy but I need IT services? #technology
What is a TSP? #technology
Why might the pricing for an MSPโs service change? #technology
Why buy ripped jeans?
Is your business actually unique if youโre buying services in a can?
Breaking news! Bob LOVES jean jackets.
What the heck is a podcast? #podcast #behindthescenes
Squirrels are weird...
You Are Your Own Worst Enemy
MGM Got Hacked
Did you know Sears started as a catalog company?
Ads arenโt what they used to be.
Can I have your attention?
Competition or Cooperation?
Why Do Strong Passwords Matter?
Interview red flags ๐ฉ
Great communicators leave the best impression
Work culture can make or break your business
No Data Backups: The Cryptic Catastrophe #cybersecurity
The Horror Unleashed
The Cobweb Covered Nightmare
The Spooky Surprise #halloween
The Haunting Ignorance #halloween #cybersecurity
The Haunted Phones
The Skeleton Key for Cybercriminals #halloween
Four Key Best Practices of Cybersecurity
Why is it important to update your technology?
How hard is it to master toast? ๐ #podcast
Bring the experts to the frontline! #podcast
Does presenting mean perfection? #podcast
0:13
The Ghostly Gateway #wifi
A recipe for disaster
We all need a little help
Letโs turn a negative into a positive
New Windows 11 Features
Smart Ways to Incorporate Generative AI
How to Organize Your Cybersecurity Strategy
What Is the Most Secure Way to Share Passwords with Employees?
What is a Threat Actor?
0:21
How to Record Your Desktop
When is IT obsolete in manufacturing companies? #jokes
A Favorite Russian Proverb
12 Days of Christmas Updates
Wi-Fi Wonderland
Timing is Everything
Solving Crimes ๐ต๐ป
7 Transformative Technology Trends Changing the Way We Work
11 WAYS TO RESPONSIBLY GET RID OF E-WASTE AT YOUR HOME OR OFFICE
We're the content team....
We're IT Techs......
What is Firmware?
What is a BCDR device?
What's the difference between a CIO and a vCIO?
What is an insider threat?
What is RAM?