Subscribe To Our Blog!

Standard Office Systems Blog

Can Facial Recognition Detect You with a Mask?

Submitted by Erica Kastner on Fri, 07/ 31/ 20 - 12: 00 PM

FACIAL RECOGNITION | 5 MIN READ

As facial recognition becomes more widely used in businesses and government entities alike, and especially due to COVID-19 causing widespread mask wearing, many are wondering if this technology can correctly identify.

cyber security solutions for small business, cyber security, Facial Recognition

Read More

Should Businesses Work Remotely Permanently?

Submitted by Kevin Kendall on Tue, 07/ 14/ 20 - 12: 00 PM

REMOTE OFFICE | 9 MIN READ

Many companies who had their first remote trial run earlier this year amid the COVID-19 pandemic are now wondering if they should permanently keep their office remote. Keep reading to see all the factors a company should.

small business cyber security, cyber security, remote office

Read More

What Is Email Filtering and How Does It Work?

Submitted by Erica Kastner on Tue, 06/ 30/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

While email filtering has been around in one form or another for a while, it serves a more important role in your cyber security plan than you may think. Keep reading to learn what exactly email filtering is, how it works,.

cyber security best practices, cyber security

Read More

Why Managed IT Companies Suck: 4 MSP Misconceptions

Submitted by Erica Kastner on Fri, 06/ 19/ 20 - 12: 00 PM

MANAGED IT SERVICE | 5.5 MIN READ

Some companies may be hesitant to sign with a Managed Service Provider (MSP) when they could just hire in-house IT instead. As an MSP, we know the ways in which some MSP's taint our industry's reputation. Keep reading.

Managed IT Services, Managed Services Questions, cyber security

Read More

6 Questions to Ask Before Buying Cyber Insurance

Submitted by Erica Kastner on Fri, 06/ 12/ 20 - 12: 00 PM

CYBER INSURANCE | 5 MIN READ

Cyber insurance, also known as cyber liability insurance, is beneficial as a form of financial mitigation in the event of a cyber attack. However, for those unfamiliar with the industry, the jargon can make buying a policy.

cyber security, cyber insurance

Read More

Social Engineering Trends in 2020

Submitted by Erica Kastner on Tue, 06/ 09/ 20 - 12: 00 PM

SOCIAL ENGINEERING | 5 MIN READ

Victims of social engineering attacks can have their personal information stolen from right under their nose without ever knowing. Social engineering attacks are crafted around two basic tenants of human psychology:.

social engineering, social engineering tactics, phishing attacks, cyber security

Read More

Remote Conferencing Security: How to Find the Right Provider

Submitted by Erica Kastner on Tue, 05/ 12/ 20 - 12: 00 PM

CYBER SECURITY | 3.5 MIN READ

Remote conferencing is more popular than ever before. It allows businesses the flexibility to conduct business with employees and clients on their own terms, and lets a company conduct business without requiring a client.

cyber security

Read More

Cyber Insurance: Do You Need It?

Submitted by Erica Kastner on Fri, 05/ 08/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Cyber security insurance is increasingly becoming a topic commonly discussed among business executives. As cyber threats continue to increase, more businesses begin to evaluate the need for a cyber security policy within.

cyber security, cyber security insurance

Read More

3 Steps to Set Up a Remote Office

Submitted by Erica Kastner on Tue, 05/ 05/ 20 - 12: 00 PM

CYBER SECURITY | 8.5 MIN READ

Setting up a remote office, especially when your office usually isn't remote, can seem daunting. However, by answering a few simple questions and pre-planning, you can save yourself a headache later. Keep reading to learn.

cyber security, remote office

Read More

Cyber Security Law [How to Stay Compliant]

Submitted by Erica Kastner on Fri, 05/ 01/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Cyber security laws are rapidly evolving, making some businesses quickly feel left behind. Penalties for non-compliance can be harsh, which raises the pressure for businesses to stay ahead of new legislation. How can your.

cyber security laws, cyber security

Read More

The Future of Cyber Security Law

Submitted by Erica Kastner on Tue, 04/ 28/ 20 - 12: 00 PM

CYBER SECURITY | 7 MIN READ

Since the rise of the Internet in the 1990's, government officials worldwide have been scrambling to keep up with the fast-paced nature of technological developments. Just twenty years ago, self-driving cars were an.

cyber security

Read More

How MSP's Minimize Downtime

Submitted by Erica Kastner on Fri, 04/ 24/ 20 - 12: 00 PM

CYBER SECURITY | 4 MIN READ

The right Managed Service Provider can be a great asset to your business. Besides keeping your network running smoothly and keeping your company's personal data out of the hands of hackers, an MSP can also take steps to.

Managed IT Services Atlanta, Managed Services Questions, cyber security

Read More

How Can I Create and Secure a Strong Password?

Submitted by Erica Kastner on Tue, 04/ 21/ 20 - 12: 00 PM

CYBER SECURITY | 4 MIN READ

Weak passwords are one of the easiest ways to give a hacker access to your network. Strengthening your passwords and protecting where they're stored better leverages your cyber security infrastructure. Keep reading to.

cyber security

Read More

How MSP's Can Streamline Your Business

Submitted by Erica Kastner on Fri, 04/ 17/ 20 - 12: 00 PM

MANAGED IT SERVICES | 4 MIN READ

Maximizing productivity and efficiency is a business goal that is always top-of-mind for companies. Businesses looking to achieve this may think of ways to streamline their sales process or supply chain. However, many.

Managed IT Services, cyber security

Read More

5 Cyber Security Tips for Remote Workers

Submitted by Erica Kastner on Tue, 03/ 31/ 20 - 12: 00 PM

CYBER SECURITY | 6 MIN READ

In some ways, maintaining the security of a regular office can be easier than managing a remote office. When all your employees aren't physically at your office, processes and communication in general can start to lag. So,.

cyber security

Read More

LastPass vs. MyGlue: Which Is Better? [2020 Review]

Submitted by Erica Kastner on Fri, 03/ 27/ 20 - 12: 00 PM

CYBER SECURITY | 9 MIN READ

Varying the passwords you use for everything from your email account to your company's HR database is a great first step at protecting your data, but what happens when you have so many passwords that you begin to lose track.

cyber security solutions for small business, small business cyber security, cyber security

Read More

When Should I Fire My MSP?

Submitted by Kevin Kendall on Tue, 03/ 24/ 20 - 12: 00 PM

MANAGED IT SERVICES | 5 MIN READ

If you're reading this article, then deep down you probably already know that it's time to cut ties with your MSP. If you're still on the fence, you might want to know what factors to keep in mind when making the.

Managed Services Questions, cyber security

Read More

How to Transition to a Remote Office

Submitted by Erica Kastner on Mon, 03/ 16/ 20 - 11: 48 AM

CYBER SECURITY | 13 MIN READ

If your company is looking to transition your office to work remotely, you might be wondering how to make that transition, especially when your office currently has little to no remote workers. From a technical.

cyber security

Read More

Top Managed Service Providers in Atlanta 2020

Submitted by Erica Kastner on Fri, 03/ 13/ 20 - 12: 00 PM

MANAGED IT SERVICES | 7 MIN READ

best managed service provider, best managed service providers, cyber security

Read More

Is It Illegal to Access the Dark Web?

Submitted by Erica Kastner on Tue, 03/ 10/ 20 - 12: 00 PM

DARK WEB | 4 MIN READ

A place rumored to be full of illicit activity, the dark web's mystery intrigues many. Because the dark web is an in-tangible concept hidden away in the corners of the Internet, i t can be hard for one to even grasp what the.

dark web, cyber security

Read More