Subscribe To Our Blog!

Standard Office Systems Blog

Kevin Kendall

Kevin Kendall is the VP of Services for Standard Office Systems and has built a career of assisting businesses with their office technology needs. He has decades of experience with products and services like copiers, business phone systems, and managed IT services. Mr. Kendall is driven to see others succeed and help them develop to achieve results beyond ordinary expectations.
Find me on:

Recent Posts

How to Build a Cyber Security Policy [5 Tips]

Submitted by Kevin Kendall on Tue, 09/ 22/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Cyber security policies are becoming more and more common in businesses as they strive to mitigate the risk of an employee accidentally leaking sensitive data or falling for a phishing scheme. These policies need to strike.

cybersecurity

Read More

Data Privacy Compliance: How MSP's Can Help

Submitted by Kevin Kendall on Fri, 08/ 21/ 20 - 12: 00 PM

CYBER SECURITY | 4 MIN READ

In today's digital age, data privacy is becoming more and more of an issue. In response to cries for consumer privacy, more laws and regulations are being passed to manage data storage and curtail data sharing by businesses.

Managed IT Services, cybersecurity, Managed Services Questions

Read More

Remote Office Management [4 Key Tips]

Submitted by Kevin Kendall on Tue, 08/ 11/ 20 - 12: 00 PM

REMOTE OFFICE | 5 MIN READ

Managing a remote office, especially when your company has never been remote before, can prove to be a challenge if one is not properly prepared. Keep reading to learn how to take your network remote as well as five key tips.

remote office

Read More

4 Reasons to Re-Think In-House IT

Submitted by Kevin Kendall on Fri, 07/ 24/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Businesses looking to strengthen their cyber security efforts may wish to build an in-house IT team. While internal IT departments may seem like the perfect fit, some organizations may prefer to completely or partially.

Read More

Should Businesses Work Remotely Permanently?

Submitted by Kevin Kendall on Tue, 07/ 14/ 20 - 12: 00 PM

REMOTE OFFICE | 9 MIN READ

Many companies who had their first remote trial run earlier this year amid the COVID-19 pandemic are now wondering if they should permanently keep their office remote. Keep reading to see all the factors a company should.

small business cyber security, cyber security, remote office

Read More

In-House vs. Managed IT: Which Is Better?

Submitted by Kevin Kendall on Fri, 06/ 26/ 20 - 12: 00 PM

MANAGED IT SERVICES | 5 MIN READ

If your business is looking to improve your cyber security efforts, there will come a point in the research and decision process where you will need to figure out if you want in-house or managed IT. Which form of IT.

Managed IT Services, cybersecurity

Read More

4 Mistakes Businesses Make When Choosing a Managed Service Provider

Submitted by Kevin Kendall on Tue, 05/ 26/ 20 - 12: 00 PM

MANAGED IT SERVICES | 5 MIN READ

A Managed Service Provider (MSP) is an investment that puts your company on the path towards a more secure network. Because this investment is so integral to your business, it needs to be made carefully. Read more to.

Read More

What Is Cyber Insurance? [Definitions and How to Reduce Costs]

Submitted by Kevin Kendall on Tue, 05/ 19/ 20 - 12: 00 PM

CYBER INSURANCE | 5 MIN READ

Cyber attacks threaten your business' livelihood. They can cause your company to lose access to sensitive data, experience customer lawsuits, and more. To mitigate some of the financial risks associated with online.

Managed IT Services, cyber security insurance

Read More

Per User and Per Device MSP Pricing: Which Is Better?

Submitted by Kevin Kendall on Fri, 04/ 10/ 20 - 12: 00 PM

MANAGED IT SERVICES | 8 MIN READ

When comparing pricing models for managed service providers, you may become conflicted about if per user or per device pricing is a better fit for your business. Keep reading for a detailed breakdown of what per user.

MSP Questions, managed services pricing per user

Read More

When Should I Fire My MSP?

Submitted by Kevin Kendall on Tue, 03/ 24/ 20 - 12: 00 PM

MANAGED IT SERVICES | 5 MIN READ

If you're reading this article, then deep down you probably already know that it's time to cut ties with your MSP. If you're still on the fence, you might want to know what factors to keep in mind when making the.

Managed Services Questions, cyber security

Read More

All-Inclusive vs. A La Carte MSP's [Comparison]

Submitted by Kevin Kendall on Tue, 03/ 17/ 20 - 12: 00 PM

MANAGED IT SERVICES | 12 MIN READ

When comparing Managed Service Provider (MSP) pricing, you can feel stuck when choosing between all-inclusive and a la carte models. Managed  services is a complex product already, so throwing different pricing models.

Managed IT Services Atlanta, Managed Services Questions

Read More

How to Deal with a Ransomware Attack

Submitted by Kevin Kendall on Tue, 02/ 25/ 20 - 12: 00 PM

CYBER SECURITY | 5.5 MIN READ

In the moments following a ransomware attack, the actions you take can determine how widespread the damage is, how much the attack will cost your company, and which damages you could be liable for. Read more to learn the.

ransomware and phishing

Read More

What Are MSP On-Boarding Fees?

Submitted by Kevin Kendall on Fri, 12/ 20/ 19 - 12: 00 PM

CYBER SECURITY | 4 MIN READ

Signing a Managed Services Provider contract is exciting, as it is the first step in better protecting your business from cyber threats. However, signing an MSP contract can mean reading over a lot of unfamiliar jargon. A.

small business cyber security

Read More

Sophos vs. Symantec Endpoint [Review]

Submitted by Kevin Kendall on Tue, 11/ 05/ 19 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Weak endpoint security creates a host of gaps that hackers can exploit to break into your company's network. Maintaining strong endpoint security is crucial to protecting your valuable assets such as financial information.

cyber security solutions for small business, small business cyber security, small business cyber security solutions

Read More

Social Engineering = Fancy Job Title for Hackers

Submitted by Kevin Kendall on Mon, 09/ 23/ 19 - 05: 43 PM

phishing attacks

Read More

Modern Day Pirates are After Your Passwords and are Selling Them on The Dark Web

Submitted by Kevin Kendall on Wed, 08/ 14/ 19 - 11: 45 AM

Much like pirates of yesteryear, pirates today steal what's most important and sell it on the Dark Web. In the 17th century, pirates sailed the seven seas in search of ships to board and treasures to plunder. The Golden Age of Piracy only lasted from.

cyber security best practices, cyber security solutions, cybersecurity, small business cyber security

Read More

Managed IT Services Pricing [Complete Guide For 2020]

Submitted by Kevin Kendall on Tue, 02/ 19/ 19 - 12: 16 PM

 

MANAGED IT SERVICES PRICING | 15 MIN READ

Whether you're a business seeking managed IT services or an entrepreneur researching how to best price your service offering, this is the blog you need to read before moving forward.

Managed IT Services

Read More

Top Managed Service Providers in Atlanta for 2019

Submitted by Kevin Kendall on Tue, 01/ 01/ 19 - 08: 00 AM

MANAGED SERVICES | 5 MIN READ

In metro-Atlanta, there seems to be an infinite amount of IT service providers. Once you've come to the decision that it's time to get your business' network protected, you may feel a bit overwhelmed with your options.

Managed IT Services Atlanta

Read More

From Break fix to Managed Services: What's the Difference?

Submitted by Kevin Kendall on Fri, 11/ 16/ 18 - 03: 13 PM

IT SERVICES | 10 MIN READ

Are you looking for the differences between break/fix to managed services models? You've come to the right place!

Managed IT Services

Read More

Cerber Ransomware Removal: Analysis, Fixes and Best Practices

Submitted by Kevin Kendall on Thu, 08/ 02/ 18 - 11: 26 AM

RANSOMWARE | 10 MIN READ

Cerber is one of the most common variants of ransomware plaguing the internet, today. In this article, we will discuss in detail what it is, where it comes from, what it does, and finally, how to prevent an attack, including.

cerber ransomware removal, cerber ransomware fix

Read More