Subscribe To Our Blog!

Standard Office Systems Blog

Erica Kastner

Erica Kastner is a lead Marketing Specialist at Standard Office Systems as well as a University of Georgia graduate. She aims to use her passion for problem-solving to help businesses understand how to better leverage their network infrastructure.
Find me on:

Recent Posts

15 Cyber Security Statistics You Need to Know

Submitted by Erica Kastner on Tue, 10/ 15/ 19 - 11: 25 AM

CYBER SECURITY | 3.5 MIN READ

Cyber crime is on the rise for the foreseeable future. Hackers are wreaking havoc on companies both large and small, stealing private information and crippling networks. The cost of a cyber attack can be staggering. Last.

cybersecurity, cybercrime

Read More

Dark Web vs. Deep Web: What's the Difference?

Submitted by Erica Kastner on Fri, 10/ 11/ 19 - 11: 05 AM

DARK WEB | 5.5 MIN READ

So much is unknown about the dark web and the deep web that even the terminology surrounding both gets confusing. Many people assume that the dark web and deep web are interchangeable terms but they're not. In this article, we'll.

cybersecurity, dark web

Read More

Cyber Security Awareness Training for Employees [Tips]

Submitted by Erica Kastner on Tue, 10/ 08/ 19 - 11: 00 AM

CYBER SECURITY | 5.5 MIN READ

Employees are the heart and soul of a company. They keep the business running smoothly, managing business-critical tasks such as its financial stability. Though employees are responsible for keeping a company operating, they.

cyber security best practices, cybersecurity, small business cyber security

Read More

Hackers are After Healthcare Information

Submitted by Erica Kastner on Thu, 10/ 03/ 19 - 06: 51 PM

When you think of a hacker frantically tapping away in a dark room, who do you think he’s targeting? Banks? The government? Try healthcare information. 2018 saw three times as many healthcare-related cyber attacks as the year prior, and 2019 is holding.

Read More

National Cyber Security Awareness Month: What Is It and Why Is It Important?

Submitted by Erica Kastner on Tue, 10/ 01/ 19 - 09: 45 AM
CYBER SECURITY | 5 MIN READ
Society as we know it is increasingly moving online. We communicate online. We shop online. We order food online. For the deviants in our society, we can access the dark web for illicit activities. However, with all of.
Read More

Rise of Ransomware

Submitted by Erica Kastner on Mon, 09/ 30/ 19 - 08: 19 PM
Read More

How Ransomware Has Evolved

Submitted by Erica Kastner on Fri, 09/ 27/ 19 - 12: 00 PM

RANSOMWARE | 17 MIN READ

Ransomware isn’t just a product of the past few years. Forms of ransomware have been around since the 1980’s and the threat has grown exponentially since then.

Over the years, ransomware has become harder to crack and more.

cybersecurity, ransomware and phishing

Read More

LastPass Hack: How It Signals a Need for Improved Cyber Security Measures

Submitted by Erica Kastner on Fri, 09/ 27/ 19 - 11: 39 AM

CYBER SECURITY NEWS | 3.5 MIN READ

Last week, password manager LastPass experienced a data breach that briefly left the credentials of approximately 16 million users open to hackers. For those not familiar with LastPass, think of it as a secure bank.

cybersecurity, news

Read More

Can Businesses Be Sued for Data Breaches?

Submitted by Erica Kastner on Thu, 09/ 19/ 19 - 09: 01 AM
CYBER SECURITY | 12 MIN READ

Cyber security laws are a relatively new legal category that many businesses either are not aware of or struggle to keep up with in terms of compliance. These new laws define the preventative security measures businesses must.

Read More

Your Data is Like Buried Treasure

Submitted by Erica Kastner on Wed, 08/ 28/ 19 - 01: 24 AM

phishing attacks, dark web

Read More

How Does Ransomware Work? [Infographic]

Submitted by Erica Kastner on Fri, 08/ 23/ 19 - 12: 18 PM

CYBER SECURITY | 6 MIN READ

In our increasingly inter-connected world, more and more people are using computer systems that host vital private files, from bank statements to tax documents with social security forms to HIPAA-sealed medical records..

cybersecurity

Read More

How To Spot A Phishing Attack

Submitted by Erica Kastner on Wed, 07/ 10/ 19 - 01: 32 PM

Would you know if you were the subject of a phishing attack? Many people claim that they’d be able to tell right away if they received an email from an illegitimate source. If that were the case, there wouldn’t be 1.5 million new phishing websites every.

ransomware and phishing, what is phishing

Read More

What Is Phishing & How Are Hackers Using It?

Submitted by Erica Kastner on Tue, 07/ 02/ 19 - 08: 26 PM

While the number of people falling for sending personal information to the crown prince of Nigeria in hopes of receiving his promised wealth and riches seems to be dropping, phishing remains a major issue. In fact, the number of phishing campaigns.

ransomware and phishing, what is phishing

Read More

Getting Ahead of Windows End of Life

Submitted by Erica Kastner on Mon, 06/ 10/ 19 - 05: 41 PM

With Windows 7 end of life quickly approaching, it’s time to start thinking about what needs to be done to prepare. Technically, regular Windows 7 support has been dead since 2015, however, the extended support period is over January 2020, which means no.

Read More

What Does Windows End of Life Mean to my Business?

Submitted by Erica Kastner on Mon, 06/ 03/ 19 - 07: 33 PM

You’ve all heard the panic. Windows is cutting off support for its widely popular version 7 software. January 14, 2020 will officially mark Windows 7 End of Life. Many companies have used Windows 7 since it launched in 2009 and are still actively using.

Read More

Ransomware: Why It’s Getting Publicity and What to Do About It

Submitted by Erica Kastner on Tue, 05/ 28/ 19 - 03: 43 PM

ransomware and phishing

Read More

Social Engineering = Fancy Job Title for Hackers

Submitted by Erica Kastner on Mon, 05/ 20/ 19 - 05: 06 PM

Most people are aware of terms like phishing and malware, but did you know those are a part of a larger scheme called social engineering? This is not a new kind of fraud, in fact it’s been used for many years to manipulate a wide range of people into.

social engineering

Read More

What is a vCIO? [Complete Resource]

Submitted by Erica Kastner on Fri, 05/ 17/ 19 - 09: 26 AM

4 MIN READ | MANAGED IT SERVICES

What is a vCIO? As a company that provides this service, we get asked this question all the time. For those looking to join the vCIO profession or possibly utilize their services, we hope that this article answers all.

Managed IT Services Atlanta

Read More

5 Essential Network Security Tools You Need for 2019

Submitted by Erica Kastner on Wed, 12/ 19/ 18 - 03: 37 PM

NETWORK SECURITY TOOLS | 5 MIN READ

Another day, another worldwide company with another major data breach. The latest company to get hit was Marriott International, which, at the time this article was written, reported almost 500 MILLION people could.

Network Security

Read More

What is a Managed Service Provider: Definition, Benefits, and Costs

Submitted by Erica Kastner on Fri, 11/ 09/ 18 - 11: 11 AM

MANAGED SERVICES | 10 MIN READ 

What is a managed service provider? Your company's new best friend. Why? Because the internet is the wild wild west of modern society and your business can't afford to get caught in the crossfire.

what is a managed service provider

Read More