Subscribe To Our Blog!

Standard Office Systems Blog

Dark Web vs. Deep Web: What's the Difference?

Submitted by Erica Kastner on Fri, 10/ 11/ 19 - 11: 05 AM

DARK WEB | 5.5 MIN READ

So much is unknown about the dark web and the deep web that even the terminology surrounding both gets confusing. Many people assume that the dark web and deep web are interchangeable terms but they're not.

cybersecurity, dark web

Read More

How to Train Employees About Cyber Security

Submitted by Erica Kastner on Tue, 10/ 08/ 19 - 11: 00 AM

CYBER SECURITY | 5.5 MIN READ

Employees are the heart and soul of a company. They keep the business running smoothly, managing business-critical tasks such as its financial stability. Though employees are responsible for keeping a company operating,.

cyber security best practices, cybersecurity, small business cyber security

Read More

How Much Does a Sharp Copier Cost?

Submitted by Daniel Gray on Fri, 10/ 04/ 19 - 03: 20 PM

COPIER COSTS | 8 MIN READ

If you've been tasked to research the next copier for your organization, you may have discovered that Sharp copiers are among the best in the industry from a quality and reliability standpoint. They also have some of the.

copier cost

Read More

Hackers are After Healthcare Information

Submitted by Daniel Gray on Thu, 10/ 03/ 19 - 06: 51 PM

When you think of a hacker frantically tapping away in a dark room, who do you think he’s targeting? Banks? The government? Try healthcare information. 2018 saw three times as many healthcare-related cyberattacks as the year prior, and 2019 is holding.

Read More

National Cyber Security Awareness Month: What Is It and Why Is It Important?

Submitted by Erica Kastner on Tue, 10/ 01/ 19 - 09: 45 AM
CYBER SECURITY | 5 MIN READ
 
Society as we know it is increasingly moving online. We communicate online. We shop online. We order food online. For the deviants in our society, we can access the dark web for illicit activities. However, with all.
Read More

Rise of Ransomeware

Submitted by Chris Gaines on Mon, 09/ 30/ 19 - 08: 19 PM
Read More

How Much Does a Production Printer Cost?

Submitted by Daniel Gray on Mon, 09/ 30/ 19 - 11: 05 AM

 

PRODUCTION PRINTER COSTS | 5 MIN READ

You're searching the internet for pricing information on production printers. It's difficult to get any kind of answer to assist you in budgeting for such a machine; however, you are aware that production.

production printing

Read More

How Ransomware Has Evolved

Submitted by Erica Kastner on Fri, 09/ 27/ 19 - 12: 00 PM

RANSOMWARE | 17 MIN READ

Ransomware isn’t just a product of the past few years. Forms of ransomware have been around since the 1980’s and the threat has grown exponentially since then.

Over the years, ransomware has become harder to crack and more.

cybersecurity, ransomware and phishing

Read More

LastPass Hack: How It Signals a Need for Improved Cyber Security Measures

Submitted by Erica Kastner on Fri, 09/ 27/ 19 - 11: 39 AM

 

CYBER SECURITY NEWS | 3.5 MIN READ

Last week, password manager LastPass experienced a data breach that briefly left the credentials of approximately 16 million users open to hackers. For those not familiar with LastPass, think of it as a secure.

cybersecurity, news

Read More

Social Engineering = Fancy Job Title for Hackers

Submitted by Kevin Kendall on Mon, 09/ 23/ 19 - 05: 43 PM

phishing attacks

Read More

What is the Dark Web? [Info + Tips]

Submitted by Tech Support on Fri, 09/ 20/ 19 - 03: 41 PM
DARK WEB | 6 MIN READ

The Dark Web sounds like a scary story made up to keep children from wandering onto risky websites. Rumors surrounding its contents have been speculated for years, spinning tales of black market organ sales and drug trafficking..

Read More

How Much Does a Canon Copier Cost? [Equipment + Service]

Submitted by Daniel Gray on Fri, 09/ 20/ 19 - 09: 28 AM

CANON COPIERS | 8 MIN READ

If you've been tasked to research the next copier for your organization, you may have discovered that Canon copiers are among the best in the industry from a quality and reliability standpoint. They also have some of the.

office copier

Read More

Can Businesses Be Sued for Data Breaches?

Submitted by Erica Kastner on Thu, 09/ 19/ 19 - 09: 01 AM

 

Cyber Security l 12 min. read

Running a business involves so many moving parts that it can become overwhelming to manage business-critical tasks. While main priorities like increasing revenue and improving customer service are top of mind, a.

Read More

How to Negotiate a Copier Lease

Submitted by Daniel Gray on Fri, 08/ 30/ 19 - 04: 08 PM

COPIER LEASE | 6.5 MIN READ

We've all been there. You need a copier and you need to find the best deal. So, like most people, you start getting quotes from a few vendors in your area so you can compare their offers and choose the best one. It sounds.

Copier Leasing

Read More

Your Data is Like Buried Treasure

Submitted by Chris Gaines on Wed, 08/ 28/ 19 - 01: 24 AM

phishing attacks, dark web

Read More

How Does Ransomware Work? [Infographic]

Submitted by Chris Gaines on Fri, 08/ 23/ 19 - 12: 18 PM

CYBER SECURITY | 6 MIN READ 

In our increasingly inter-connected world, more and more people are using computer systems that host vital private files, from bank statements to tax documents with social security forms, to HIPAA-sealed medical records..

cybersecurity

Read More

Cyber Pirates Sail in Dark Places

Submitted by Chris Gaines on Thu, 08/ 22/ 19 - 06: 34 PM

In days gone by, the last word any sailor wanted to hear was pirate. Today, in navigating the open — and often lawless — waters of the web, cyber pirates should be taken just as seriously as the swashbuckling variety. Especially now that just about.

cyber security solutions for small business, small business cyber security, small business cyber security solutions, dark web

Read More

Toshiba vs Canon Copiers [Ratings + Reviews]

Submitted by Bryan Ammons on Fri, 08/ 16/ 19 - 04: 51 PM

OFFICE COPIERS | 9 MIN READ

If you're tasked with finding your business' next copier (or fleet of copiers) and you're trying to decide between Canon and Toshiba, you've come to the right place.

office copier

Read More

Modern Day Pirates are After Your Passwords and are Selling Them on The Dark Web

Submitted by Chris Gaines on Wed, 08/ 14/ 19 - 11: 45 AM

Much like pirates of yesteryear, pirates today steal what's most important and sell it on the Dark Web. In the 17th century, pirates sailed the seven seas in search of ships to board and treasures to plunder. The Golden Age of Piracy only lasted from.

cyber security best practices, cyber security solutions, cybersecurity, small business cyber security

Read More

How To Spot A Phishing Attack

Submitted by Daniel Gray on Wed, 07/ 10/ 19 - 01: 32 PM

Would you know if you were the subject of a phishing attack? Many people claim that they’d be able to tell right away if they received an email from an illegitimate source. If that were the case, there wouldn’t be 1.5 million new phishing websites.

ransomware and phishing, what is phishing

Read More