Subscribe To Our Blog!

Standard Office Systems Blog

What Is Email Filtering and How Does It Work?

Submitted by Erica Kastner on Tue, 06/ 30/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

While email filtering has been around in one form or another for a while, it serves a more important role in your cyber security plan than you may think. Keep reading to learn what exactly email filtering is, how it works,.

cyber security best practices, cyber security

Read More

What is a VPN?

Submitted by Tech Support on Tue, 04/ 14/ 20 - 12: 00 PM

CYBER SECURITY | 4.5 MIN READ

Virtual Private Networks, known as VPN's, are a great asset to your business. By allowing your employees to access and share files on your network securely, you help mitigate the risk of data breaches. Keep reading to.

cyber security best practices, cyber security solutions, cybersecurity, small business cyber security

Read More

How Can I Secure a Network Across Multiple Offices?

Submitted by Erica Kastner on Tue, 04/ 07/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Expanding your company to multiple offices is an exciting development. When building new branches, you might not consider the necessary steps to set up your network to securely handle employees from multiple branches.

cyber security best practices, cyber security solutions, cybersecurity, small business cyber security

Read More

NOC or Help Desk: Which Is Better?

Submitted by Erica Kastner on Fri, 03/ 20/ 20 - 12: 00 PM

MANAGED IT SERVICES | 6 MIN READ

When shopping for managed IT services, you may come across the terms NOC and help desk. While they sound similar, nuanced differences between the two exist. Based on your business' needs, you may find that one is.

Managed IT Services, Network Protection Atlanta, Network Protection, cyber security best practices, cyber security solutions, Managed IT Services Atlanta

Read More

What Should You Do During a Ransomware Attack? [Tips and Explanations]

Submitted by Erica Kastner on Tue, 02/ 11/ 20 - 12: 17 PM

CYBER SECURITY | 10.5 MIN READ

Major news outlets, from CNN to Forbes to the New York Times, have been reporting recently on the growing and shifting threat of ransomware. Just last week, the New York Times reported on the continued growth of.

cyber security best practices, cybersecurity, small business cyber security solutions, ransomware and phishing

Read More

What Cyber Security New Year's Resolutions Should Your Business Set?

Submitted by Erica Kastner on Fri, 01/ 03/ 20 - 12: 00 PM

CYBER SECURITY | 4.5 MIN READ

The start of a new decade gives businesses a fresh start to strive towards achieving long-term goals. Businesses always think to set New Year's resolutions covering topics such as sales growth and business expansion..

cyber security best practices, cybersecurity, small business cyber security, small business cyber security solutions

Read More

What is Malware? [In Under 60 Words]

Submitted by Tech Support on Fri, 11/ 01/ 19 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Many cyber security terms are thrown around, which makes distinguishing one from another confusing. Malware has been making headlines for how prevalent it is. But what is it? Keep reading to learn a basic definition, the.

cyber security best practices, cybercrime

Read More

Cyber Security Awareness Training for Employees [Tips]

Submitted by Erica Kastner on Tue, 10/ 08/ 19 - 11: 00 AM

CYBER SECURITY | 5.5 MIN READ

Employees are the heart and soul of a company. They keep the business running smoothly, managing business-critical tasks such as its financial stability. Though employees are responsible for keeping a company operating,.

cyber security best practices, cybersecurity, small business cyber security

Read More

Modern Day Pirates are After Your Passwords and are Selling Them on The Dark Web

Submitted by Kevin Kendall on Wed, 08/ 14/ 19 - 11: 45 AM

Much like pirates of yesteryear, pirates today steal what's most important and sell it on the Dark Web. In the 17th century, pirates sailed the seven seas in search of ships to board and treasures to plunder. The Golden Age of Piracy only lasted from.

cyber security best practices, cyber security solutions, cybersecurity, small business cyber security

Read More
1