Subscribe To Our Blog!

Standard Office Systems Blog

Erica Kastner

Erica Kastner is a lead Marketing Specialist at Standard Office Systems as well as a University of Georgia graduate. She aims to use her passion for problem-solving to help businesses understand how to better leverage their network infrastructure.
Find me on:

Recent Posts

Top 5 Remote Work Cyber Security Risks [2021]

Submitted by Erica Kastner on Mon, 01/ 04/ 21 - 12: 00 PM

REMOTE WORK | 5.5 MIN READ

Your remote employees may be unknowingly putting your company's data at risk. Working from home can potentially lead to data breaches, identity fraud, and a host of other negative consequences. Keep reading to learn the top.

cybersecurity, remote office

Read More

Top 6 Cyber Security Tips for Businesses [2021]

Submitted by Erica Kastner on Fri, 01/ 01/ 21 - 12: 00 PM

CYBER SECURITY | 7.5 MIN READ

Effective corporate cyber security has never been more important. Security advice is dynamic, which means that your business' network needs to evolve to stay ahead of emerging cyber threats. Keep reading to learn our top.

Read More

What is a NOC [Network Operations Center]?

Submitted by Erica Kastner on Fri, 12/ 18/ 20 - 12: 00 PM

MANAGED IT SERVICES | 6 MIN READ

Companies looking for cyber security assistance may not know what a NOC is, especially when compared to a help desk, when they come across it in a Managed Service Provider's offering. As an MSP with an in-house NOC, we.

Read More

Who is a Good Fit for Managed IT Services? [Top 7 Characteristics]

Submitted by Erica Kastner on Tue, 12/ 01/ 20 - 12: 00 PM

MANAGED IT SERVICES | 5.5 MIN READ

As a Managed Service Provider, we understand that not every business will be the right fit for us. For instance, some businesses may be a better fit for an internal IT department. Keep reading to learn who is a good.

Managed IT Services

Read More

Securing Company Data: How Managed IT Services Can Help

Submitted by Erica Kastner on Thu, 11/ 12/ 20 - 02: 29 PM

MANAGED IT SERVICES | 7 MIN READ

As a Managed Service Provider, we aim to take customer service a step further by not only educating our clients about how to secure their data but also by educating the public. Although securing company data is a top.

Managed IT Services

Read More

Cyber Security Trends 2020 [Top 4]

Submitted by Erica Kastner on Tue, 09/ 15/ 20 - 12: 00 PM

CYBER SECURITY | 4 MIN READ

IT professionals and cyber criminals are constantly performing a sort of dance together. When cyber criminals move one way, IT professionals must move in response, and vice versa in a never-ending salsa. Since cyber.

cybersecurity

Read More

How to Build a BCDR Plan [Top 4 Tips]

Submitted by Erica Kastner on Tue, 09/ 08/ 20 - 12: 00 PM

CYBER SECURITY | 6 MIN READ

Acts of Mother Nature and the wrath of cyber criminals can be unpredictable. If your business' network went down tomorrow due to a natural disaster or cyber attack, how would you ensure that business operations continue.

cybersecurity, BCDR plan

Read More

Top Phishing Scams of 2020

Submitted by Erica Kastner on Wed, 08/ 26/ 20 - 12: 00 PM

PHISHING | 4.5 MIN READ

Criminals will take advantage of any new and unfamiliar situation to steal people's personal information and scam them out of money. The COVID-19 pandemic has provided criminals with a wealth of new opportunities to steal from.

what is phishing, phishing attacks

Read More

Laser vs. Inkjet Printers: What's the Difference?

Submitted by Erica Kastner on Tue, 08/ 25/ 20 - 12: 00 PM

PRINTERS | 4 MIN READ

When you're shopping for a new printer, whether it's for your office or your house, you will typically come across two types of printers: laser and inkjet. While they may seem quite similar, they both have some noticeable.

advantages and disadvantages of laser printers

Read More

BCDR Plans: Why All Businesses Should Have Them

Submitted by Erica Kastner on Fri, 08/ 14/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

When natural disasters and cyber attacks strike, the consequences can extend far beyond just physical damage. Your network functionality may be crippled and severe downtime can cost your business more money than you think..

Read More

What is a BCDR Plan?

Submitted by Erica Kastner on Thu, 08/ 06/ 20 - 04: 24 PM

CYBER SECURITY | 5 MIN READ

Business Continuity and Disaster Recovery (BCDR) plans help organizations mitigate the risks associated with network downtime and interruptions to business operations. Keep reading to learn what a BCDR plan is, how your.

cybersecurity, small business cyber security

Read More

Can Facial Recognition Detect You with a Mask?

Submitted by Erica Kastner on Fri, 07/ 31/ 20 - 12: 00 PM

FACIAL RECOGNITION | 5 MIN READ

As facial recognition becomes more widely used in businesses and government entities alike, and especially due to COVID-19 causing widespread mask wearing, many are wondering if this technology can correctly identify.

cyber security solutions for small business, cyber security, Facial Recognition

Read More

Facial Recognition: Everything You Need to Know

Submitted by Erica Kastner on Tue, 07/ 28/ 20 - 12: 00 PM

FACIAL RECOGNITION | 6 MIN READ

Facial recognition is a buzzword that's been the topic of many news articles and the subject of various movies. While some see this technology as dystopian, others see it as a futuristic way to further streamline our.

Read More

How to Minimize Your Cyber Insurance Claims [6 Tips]

Submitted by Erica Kastner on Tue, 07/ 21/ 20 - 12: 00 PM

CYBER INSURANCE | 4.5 MIN READ

Though cyber insurance can provide significant financial coverage in the event of a cyber attack or data breach, policy costs can quickly add up. Luckily, there's a few steps your organization can take to keep costs low.

Read More

Temperature Scanners for Businesses [Types + Pricing]

Submitted by Erica Kastner on Fri, 07/ 10/ 20 - 02: 32 PM

TEMPERATURE SCANNERS | 5.5 MIN READ

As COVID-19 continues to impact business operations, many companies are wondering how to minimize its spread and safely keep their doors open. Infrared temperature scanners offer businesses a solution that, when.

Temperature Scanners

Read More

How to Lower Your Cyber Insurance Costs [6 Tips]

Submitted by Erica Kastner on Fri, 07/ 03/ 20 - 12: 00 PM

CYBER INSURANCE | 5 MIN READ

Though cyber insurance can provide significant financial coverage in the event of a cyber attack or data breach, the costs to maintain coverage can quickly add up. Keep reading to learn six tips on how your business can.

cyber insurance

Read More

What Is Email Filtering and How Does It Work?

Submitted by Erica Kastner on Tue, 06/ 30/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

While email filtering has been around in one form or another for a while, it serves a more important role in your cyber security plan than you may think. Keep reading to learn what exactly email filtering is, how it works,.

cyber security best practices, cyber security

Read More

How to Return to the Office After Coronavirus

Submitted by Erica Kastner on Tue, 06/ 23/ 20 - 12: 00 PM

REMOTE OFFICE | 5 MIN READ

As the country starts to open up amid the COVID-19 pandemic, the main question on every company's mind is how they can safely transition back to the office. Along with setting clear hygiene standards to avoid the spread of.

Managed IT Services, remote office

Read More

Top 4 Managed Service Provider [MSP] Misconceptions

Submitted by Erica Kastner on Fri, 06/ 19/ 20 - 12: 00 PM

MANAGED IT SERVICE | 5.5 MIN READ

Some companies may be hesitant to sign with a Managed Service Provider (MSP) when they could just hire in-house IT instead. As an MSP, we know the ways in which some MSP's taint our industry's reputation. Keep reading.

Managed IT Services, Managed Services Questions, cyber security

Read More

What's the Best Cloud Storage for Businesses? [Reviews and Tips]

Submitted by Erica Kastner on Tue, 06/ 16/ 20 - 12: 00 PM

BUSINESS CLOUD STORAGE | 5 MIN READ

Cloud storage protects your most important assets − your data − from destruction in the event of a network outage or cyber attack. Cloud storage options can vary based on a number of factors, from the amount of.

Cloud Technology

Read More