Subscribe To Our Blog!

Standard Office Systems Blog

How to Build a Cyber Security Policy [5 Tips]

Submitted by Kevin Kendall on Tue, 09/ 22/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Cyber security policies are becoming more and more common in businesses as they strive to mitigate the risk of an employee accidentally leaking sensitive data or falling for a phishing scheme. These policies need to strike.

cybersecurity

Read More

Cyber Security Trends 2020 [Top 4]

Submitted by Erica Kastner on Tue, 09/ 15/ 20 - 12: 00 PM

CYBER SECURITY | 4 MIN READ

IT professionals and cyber criminals are constantly performing a sort of dance together. When cyber criminals move one way, IT professionals must move in response, and vice versa in a never-ending salsa. Since cyber.

cybersecurity

Read More

How to Build a BCDR Plan [Top 4 Tips]

Submitted by Erica Kastner on Tue, 09/ 08/ 20 - 12: 00 PM

CYBER SECURITY | 6 MIN READ

Acts of Mother Nature and the wrath of cyber criminals can be unpredictable. If your business' network went down tomorrow due to a natural disaster or cyber attack, how would you ensure that business operations continue.

cybersecurity, BCDR plan

Read More

How Does Antivirus Work?

Submitted by Tech Support on Tue, 09/ 01/ 20 - 12: 00 PM

CYBER SECURITY | 4.5 MIN READ

When most people think of the word "antivirus", they think about that software you download on your computer to keep you from being hacked. While this is true, it is a simplistic definition. Keep reading to find out what.

cybersecurity, antivirus

Read More

Data Privacy Compliance: How MSP's Can Help

Submitted by Kevin Kendall on Fri, 08/ 21/ 20 - 12: 00 PM

CYBER SECURITY | 4 MIN READ

In today's digital age, data privacy is becoming more and more of an issue. In response to cries for consumer privacy, more laws and regulations are being passed to manage data storage and curtail data sharing by businesses.

Managed IT Services, cybersecurity, Managed Services Questions

Read More

What is a BCDR Plan?

Submitted by Erica Kastner on Thu, 08/ 06/ 20 - 04: 24 PM

CYBER SECURITY | 5 MIN READ

Business Continuity and Disaster Recovery (BCDR) plans help organizations mitigate the risks associated with network downtime and interruptions to business operations. Keep reading to learn what a BCDR plan is, how your.

cybersecurity, small business cyber security

Read More

In-House vs. Managed IT: Which Is Better?

Submitted by Kevin Kendall on Fri, 06/ 26/ 20 - 12: 00 PM

MANAGED IT SERVICES | 5 MIN READ

If your business is looking to improve your cyber security efforts, there will come a point in the research and decision process where you will need to figure out if you want in-house or managed IT. Which form of IT.

Managed IT Services, cybersecurity

Read More

What is a VPN?

Submitted by Tech Support on Tue, 04/ 14/ 20 - 12: 00 PM

CYBER SECURITY | 4.5 MIN READ

Virtual Private Networks, known as VPN's, are a great asset to your business. By allowing your employees to access and share files on your network securely, you help mitigate the risk of data breaches. Keep reading to.

cyber security best practices, cyber security solutions, cybersecurity, small business cyber security

Read More

How Can I Secure a Network Across Multiple Offices?

Submitted by Erica Kastner on Tue, 04/ 07/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Expanding your company to multiple offices is an exciting development. When building new branches, you might not consider the necessary steps to set up your network to securely handle employees from multiple branches.

cyber security best practices, cyber security solutions, cybersecurity, small business cyber security

Read More

The Future of Ransomware

Submitted by Erica Kastner on Fri, 03/ 06/ 20 - 12: 00 PM

CYBER SECURITY | 5.5 MIN READ

In our rapidly changing world, it's hard to predict what somebody might have for breakfast tomorrow, let alone how ransomware will change in the coming years. Read more to learn about developing ransomware trends that.

cybersecurity, ransomware and phishing

Read More

What Should You Do During a Ransomware Attack? [Tips and Explanations]

Submitted by Erica Kastner on Tue, 02/ 11/ 20 - 12: 17 PM

CYBER SECURITY | 10.5 MIN READ

Major news outlets, from CNN to Forbes to the New York Times, have been reporting recently on the growing and shifting threat of ransomware. Just last week, the New York Times reported on the continued growth of.

cyber security best practices, cybersecurity, small business cyber security solutions, ransomware and phishing

Read More

Managed IT Services Contracts Defined

Submitted by Erica Kastner on Fri, 01/ 31/ 20 - 12: 00 PM

CYBER SECURITY | 7 MIN READ

If you're currently in the market for a managed services provider, you might have seen or will come across a contract spelling out your services agreement. Managed IT services contracts can come with terms that might.

Managed IT Services, cybersecurity, Managed Services Questions, cyber security

Read More

What Cyber Security New Year's Resolutions Should Your Business Set?

Submitted by Erica Kastner on Fri, 01/ 03/ 20 - 12: 00 PM

CYBER SECURITY | 4.5 MIN READ

The start of a new decade gives businesses a fresh start to strive towards achieving long-term goals. Businesses always think to set New Year's resolutions covering topics such as sales growth and business expansion..

cyber security best practices, cybersecurity, small business cyber security, small business cyber security solutions

Read More

A Timeline of 2019 Ransomware Attacks and Future Trends

Submitted by Erica Kastner on Fri, 12/ 27/ 19 - 12: 00 PM

CYBERCRIME | 9.5 MIN READ

Every year, humanity is further ushered into the golden age of the technological revolution. New technological advancements are publicized, which brings exciting promises of what's to come. However, as humanity, specifically.

cybersecurity, cybercrime

Read More

How to Prevent Ransomware Attacks [8 Quick Tips]

Submitted by Erica Kastner on Tue, 11/ 12/ 19 - 08: 00 AM

CYBER SECURITY |MIN READ

You're browsing the Internet on your computer when the screen starts glitching and freezing up. An eerie warning message pops up on your screen, warning you that all your important documents, from your financial statements.

cybersecurity, ransomware and phishing, best practices for ransomware

Read More

Ransomware vs. Social Engineering: What's the Difference?

Submitted by Erica Kastner on Fri, 11/ 01/ 19 - 12: 35 PM

CYBER SECURITY | 3.5 MIN READ

The cyber threat landscape is constantly evolving, which means you need to stay on your feet to continue to be well-protected. Ransomware and social engineering both pose cyber threats but are commonly confused. Read on.

cybersecurity, what is ransomware

Read More

How Can Your Printers Have Security Risks? [Tips to Protect]

Submitted by Erica Kastner on Tue, 10/ 29/ 19 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

When people imagine how hackers access private medical records, they think of the usual avenues like hacking an employee's email account or stealing the physical files from the actual building. However, imagine this.

Atlanta Printers, cybersecurity, small business cyber security, office copier

Read More

How Can the Dark Web Pose Security Threats to My Business?

Submitted by Erica Kastner on Fri, 10/ 25/ 19 - 08: 45 AM

DARK WEB | 6.5 MIN READ

Your business' private information serve as a juicy steak to hackers who are ravenous for fresh meat. Hackers know they can make a pretty penny selling information like employee social security numbers and account logins to the.

cybersecurity, small business cyber security, dark web

Read More

Healthcare Industry Cyber Security [9 Do's and Don'ts]

Submitted by Erica Kastner on Tue, 10/ 22/ 19 - 01: 15 PM

HEALTHCARE CYBER SECURITY | 9.5 MIN READ

Cyber attacks threaten the livelihood of the healthcare industry on a daily basis. They can cause hospitals to temporarily turn away patients or re-route ambulances, and your company can be sued by customers.

cybersecurity, healthcare

Read More

6 Common Dark Web Myths Debunked

Submitted by Erica Kastner on Thu, 10/ 17/ 19 - 10: 06 AM

DARK WEB | 5 MIN READ

Due to the secretive nature of the dark web, it's natural that myths were created to describe it. In this article, we'll debunk some common myths about the dark web as well as shed some light on the real risks that exist.

cybersecurity, dark web

Read More