Subscribe To Our Blog!

Standard Office Systems Blog

Erica Kastner

Erica Kastner is a lead Marketing Specialist at Standard Office Systems as well as a University of Georgia graduate. She aims to use her passion for problem-solving to help businesses understand how to better leverage their network infrastructure.
Find me on:

Recent Posts

How to Lower Your Cyber Insurance Costs [6 Tips]

Submitted by Erica Kastner on Fri, 07/ 03/ 20 - 12: 00 PM

CYBER INSURANCE | 5 MIN READ

Though cyber insurance can provide significant financial coverage in the event of a cyber attack or data breach, the costs to maintain coverage can quickly add up. Keep reading to learn six tips on how your business can.

cyber insurance

Read More

What Is Email Filtering and How Does It Work?

Submitted by Erica Kastner on Tue, 06/ 30/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

While email filtering has been around in one form or another for a while, it serves a more important role in your cyber security plan than you may think. Keep reading to learn what exactly email filtering is, how it works, and.

cyber security best practices, cyber security

Read More

How to Return to the Office After Coronavirus

Submitted by Erica Kastner on Tue, 06/ 23/ 20 - 12: 00 PM

REMOTE OFFICE | 5 MIN READ

As the country starts to open up amid the COVID-19 pandemic, the main question on every company's mind is how they can safely transition back to the office. Along with setting clear hygiene standards to avoid the spread of.

Managed IT Services, remote office

Read More

Top 4 Managed Service Provider [MSP] Misconceptions

Submitted by Erica Kastner on Fri, 06/ 19/ 20 - 12: 00 PM

MANAGED IT SERVICE | 5.5 MIN READ

Some companies may be hesitant to sign with a Managed Service Provider (MSP) when they could just hire in-house IT instead. As an MSP, we know the ways in which some MSP's taint our industry's reputation. Keep reading to.

Managed IT Services, Managed Services Questions, cyber security

Read More

What's the Best Cloud Storage for Businesses? [Reviews and Tips]

Submitted by Erica Kastner on Tue, 06/ 16/ 20 - 12: 00 PM

BUSINESS CLOUD STORAGE | 5 MIN READ

Cloud storage protects your most important assets − your data − from destruction in the event of a network outage or cyber attack. Cloud storage options can vary based on a number of factors, from the amount of storage.

Cloud Technology

Read More

6 Questions to Ask Before Buying Cyber Insurance

Submitted by Erica Kastner on Fri, 06/ 12/ 20 - 12: 00 PM

CYBER INSURANCE | 5 MIN READ

Cyber insurance, also known as cyber liability insurance, is beneficial as a form of financial mitigation in the event of a cyber attack. However, for those unfamiliar with the industry, the jargon can make buying a policy.

cyber security, cyber insurance

Read More

Social Engineering Trends in 2020

Submitted by Erica Kastner on Tue, 06/ 09/ 20 - 12: 00 PM

SOCIAL ENGINEERING | 5 MIN READ

Victims of social engineering attacks can have their personal information stolen from right under their nose without ever knowing. Social engineering attacks are crafted around two basic tenants of human psychology: fear.

social engineering, social engineering tactics, phishing attacks, cyber security

Read More

How Much Does Business Cloud Storage Cost?

Submitted by Erica Kastner on Fri, 06/ 05/ 20 - 12: 00 PM

CLOUD STORAGE | 4 MIN READ

When your network is down, you may have to restore to a previous backup. This means that consistent and reliable data storage is key in protecting sensitive information from being deleted. Many businesses are turning to cloud.

Cloud Technology

Read More

Why Are Managed Service Providers (MSP's) So Expensive?

Submitted by Erica Kastner on Tue, 06/ 02/ 20 - 12: 00 PM

MANAGED IT SERVICES | 7 MIN READ

Managed Service Providers (MSP's) can receive a bad reputation for being seen as a costly investment, giving some businesses sticker shock when they learn how much their contract might be. Understanding what costs factor.

Managed IT Services, Managed Services Questions

Read More

Choosing a Managed Service Provider: 4 Steps to Success

Submitted by Erica Kastner on Fri, 05/ 29/ 20 - 12: 00 PM

MANAGED IT SERVICES | 8.5 MIN READ

When chosen correctly, a Managed Service Provider (MSP) can elevate your business to new heights. They can improve network security and functionality or help you expand your network or transition it to remote.

Managed IT Services, Managed IT Services Atlanta, Managed Services Questions

Read More

Remote Conferencing Platforms: Which One Is the Best?

Submitted by Erica Kastner on Fri, 05/ 22/ 20 - 12: 00 PM

REMOTE OFFICE | 7.5 MIN READ

Remote conferencing, also known as virtual conferencing, has gained widespread popularity in recent months due to the COVID-19 outbreak. Businesses nationwide are starting to see its benefits, as it allows them to continue.

remote office

Read More

What Is Cyber Insurance? [Definitions and How to Reduce Costs]

Submitted by Erica Kastner on Tue, 05/ 19/ 20 - 12: 00 PM

CYBER INSURANCE | 5 MIN READ

Cyber insurance, also known as cyber liability insurance, covers your business in the event of a cyber attack or data breach where customer information is impacted. Cyber attacks threaten your business' livelihood and the.

Managed IT Services, cyber security insurance

Read More

How to Leave Your MSP Contract

Submitted by Erica Kastner on Fri, 05/ 15/ 20 - 12: 00 PM

MANAGED IT SERVICES | 4.5 MIN READ

When you are unhappy with your Managed Service Provider's work, the last thing you want is to be stuck in a contract with them. While many contracts are airtight, there are a few things you can do to create a little.

Managed IT Services, MSP Questions

Read More

Remote Conferencing Security: Tips and How to Find the Right Provider

Submitted by Erica Kastner on Tue, 05/ 12/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Remote conferencing is more popular than ever before. It allows businesses the flexibility to work on their own terms without requiring clients to drive to their office. However, remote conferencing poses some potential risks.

cyber security

Read More

Cyber Insurance: Do You Need It?

Submitted by Erica Kastner on Fri, 05/ 08/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Cyber security insurance is increasingly becoming a topic commonly discussed among business executives. As cyber threats continue to increase, more businesses begin to evaluate the need for a cyber security policy within their.

cyber security, cyber security insurance

Read More

How to Set Up a Home Office [3 Steps]

Submitted by Erica Kastner on Tue, 05/ 05/ 20 - 12: 00 PM

CYBER SECURITY | 8.5 MIN READ

Setting up a home office, especially when your office usually isn't remote, can seem daunting. However, by answering a few simple questions and pre-planning, you can save yourself a headache later. As a Managed Service.

cyber security, remote office

Read More

Cyber Security Law [How to Stay Compliant]

Submitted by Erica Kastner on Fri, 05/ 01/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Cyber security laws are rapidly evolving, making some businesses quickly feel left behind. Penalties for non-compliance can be harsh, which raises the pressure for businesses to stay ahead of new legislation. How can your.

cyber security laws, cyber security

Read More

The Future of Cyber Security Law

Submitted by Erica Kastner on Tue, 04/ 28/ 20 - 12: 00 PM

CYBER SECURITY | 7 MIN READ

Since the rise of the Internet in the 1990's, government officials worldwide have been scrambling to keep up with the fast-paced nature of technological developments. Just twenty years ago, self-driving cars were an.

cyber security

Read More

How MSP's Minimize Downtime

Submitted by Erica Kastner on Fri, 04/ 24/ 20 - 12: 00 PM

CYBER SECURITY | 4 MIN READ

The right Managed Service Provider can be a great asset to your business. Besides keeping your network running smoothly and keeping your company's personal data out of the hands of hackers, an MSP can also take steps to.

Managed IT Services Atlanta, Managed Services Questions, cyber security

Read More

How Can I Create and Secure a Strong Password?

Submitted by Erica Kastner on Tue, 04/ 21/ 20 - 12: 00 PM

CYBER SECURITY | 4 MIN READ

Weak passwords are one of the easiest ways to give a hacker access to your network. Strengthening your passwords and protecting where they're stored better leverages your cyber security infrastructure. Keep reading to learn.

cyber security

Read More