Subscribe To Our Blog!

Standard Office Systems Blog

Kevin Kendall

Kevin Kendall is the VP of Services for Standard Office Systems and has built a career of assisting businesses with their office technology needs. He has decades of experience with products and services like copiers, business phone systems, and managed IT services. Mr. Kendall is driven to see others succeed and help them develop to achieve results beyond ordinary expectations.
Find me on:

Recent Posts

Top Managed Service Providers in Atlanta for 2019

Submitted by Kevin Kendall on Tue, 01/ 01/ 19 - 08: 00 AM

MANAGED SERVICES | 5 MIN READ

In metro-Atlanta, there seems to be an infinite amount of IT service providers. Once you've come to the decision that it's time to get your business' network protected, you may feel a bit overwhelmed with your options.

Managed IT Services Atlanta

Read More

SLEEP BETTER WITH TECHNOLOGY AT YOUR SIDE

Submitted by Kevin Kendall on Fri, 06/ 16/ 17 - 12: 46 PM

We’ve all heard it before… leave the technology out of the bedroom.  You’re never going to a get a full night of rest with your phone at your side, your TV blaring in the background and the hallway light creeping through under the cracks of the door.

Sleeping better with technology

Read More

3 Workplace Time-Wasters & How to Rid Yourself of Them

Submitted by Kevin Kendall on Wed, 06/ 07/ 17 - 01: 42 PM

We’ve all done it before—wasted time on the job.  Somehow we end up focusing too much on ourselves, our coworkers, or absolutely nothing at all, becoming less productive and less present in the process.

Productivity in the office

Read More

5 Common Social Engineering Tactics

Submitted by Kevin Kendall on Fri, 04/ 07/ 17 - 12: 57 PM

Social engineering is yet another tactic criminals and hackers could use to steal data from an unsuspecting company, and we work with companies frequently who have been affected by social engineering.

This tactic, however, is different than other.

social engineering tactics

Read More

why your employees are a major internal security threat

Submitted by Kevin Kendall on Fri, 03/ 24/ 17 - 01: 35 PM

When it comes to your network and all the data inside and around it, the threats are endless. These threats aim to destroy, steal, corrupt, and borrow your data and terrorize your network in the process. But these threats don’t just begin and end with.

Internal Security Threats

Read More

3 Social Engineering Scenarios for Your Personal and Work Life

Submitted by Kevin Kendall on Thu, 02/ 16/ 17 - 09: 26 AM

SOCIAL ENGINEERING | 5 MIN READ

Social engineering is just another way your business can become a victim of a data breach. But social engineering is a little different than viruses, codes, and password-cracking software. Instead, social engineering.

social engineering scenarios

Read More

You Know How to Email. Here's How NOT to Email.

Submitted by Kevin Kendall on Mon, 01/ 23/ 17 - 10: 32 AM

Anyone can create an email. You add a recipient; you type, type, type, and you hit send. It’s really easy. You know how to email. But what about how not to email? That’s not so cut and dry is it?

How NOT to Email

Read More

Phishing Tips - A simple Guide to Avoid Malicious Emails

Submitted by Kevin Kendall on Mon, 01/ 09/ 17 - 03: 35 PM

It might be a new year, but that doesn’t mean the business world has finally rid itself of phishing. As a matter of fact, the sending and receiving of malicious emails will only get worse. Hackers will grow richer and businesses will suffer deeply.

Email Security

Read More
1