Subscribe To Our Blog!

Standard Office Systems Blog

What Cyber Security New Year's Resolutions Should Your Business Set?

Submitted by Erica Kastner on Fri, 01/ 03/ 20 - 12: 00 PM

CYBER SECURITY | 4.5 MIN READ

The start of a new decade gives businesses a fresh start to strive towards achieving long-term goals. Businesses always think to set New Year's resolutions covering topics such as sales growth and business expansion..

cyber security best practices, cybersecurity, small business cyber security, small business cyber security solutions

Read More

A Timeline of 2019 Ransomware Attacks and Future Trends

Submitted by Erica Kastner on Fri, 12/ 27/ 19 - 12: 00 PM

CYBERCRIME | 9.5 MIN READ

Every year, humanity is further ushered into the golden age of the technological revolution. New technological advancements are publicized, which brings exciting promises of what's to come. However, as humanity, specifically.

cybersecurity, cybercrime

Read More

How to Prevent Ransomware Attacks [8 Quick Tips]

Submitted by Erica Kastner on Tue, 11/ 12/ 19 - 08: 00 AM

CYBER SECURITY |MIN READ

You're browsing the Internet on your computer when the screen starts glitching and freezing up. An eerie warning message pops up on your screen, warning you that all your important documents, from your financial statements and.

cybersecurity, ransomware and phishing, best practices for ransomware

Read More

Ransomware vs. Social Engineering: What's the Difference?

Submitted by Erica Kastner on Fri, 11/ 01/ 19 - 12: 35 PM

CYBER SECURITY | 3.5 MIN READ

The cyber threat landscape is constantly evolving, which means you need to stay on your feet to continue to be well-protected. Ransomware and social engineering both pose cyber threats but are commonly confused. Read on to.

cybersecurity, what is ransomware

Read More

How Can Printers Have Security Risks? [Tips to Protect]

Submitted by Erica Kastner on Tue, 10/ 29/ 19 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

When people imagine how hackers access private medical records, they think of the usual avenues like hacking an employee's email account or stealing the physical files from the actual building. However, imagine this scenario:.

Atlanta Printers, cybersecurity, small business cyber security, office copier

Read More

How Can the Dark Web Pose Security Threats to My Business?

Submitted by Erica Kastner on Fri, 10/ 25/ 19 - 08: 45 AM

DARK WEB | 6.5 MIN READ

Your business' private information serve as a juicy steak to hackers who are ravenous for fresh meat. Hackers know they can make a pretty penny selling information like employee social security numbers and account logins to the.

cybersecurity, small business cyber security, dark web

Read More

Healthcare Industry Cyber Security [9 Do's and Don'ts]

Submitted by Erica Kastner on Tue, 10/ 22/ 19 - 01: 15 PM

HEALTHCARE CYBER SECURITY | 9.5 MIN READ

Cyber attacks threaten the livelihood of the healthcare industry on a daily basis. They can cause hospitals to temporarily turn away patients or re-route ambulances, and your company can be sued by customers and.

cybersecurity, healthcare

Read More

6 Common Dark Web Myths Debunked

Submitted by Erica Kastner on Thu, 10/ 17/ 19 - 10: 06 AM

DARK WEB | 5 MIN READ

Due to the secretive nature of the dark web, it's natural that myths were created to describe it. In this article, we'll debunk some common myths about the dark web as well as shed some light on the real risks that exist.

cybersecurity, dark web

Read More

15 Cyber Security Statistics You Need to Know

Submitted by Erica Kastner on Tue, 10/ 15/ 19 - 11: 25 AM

CYBER SECURITY | 3.5 MIN READ

Cyber crime is on the rise for the foreseeable future. Hackers are wreaking havoc on companies both large and small, stealing private information and crippling networks. The cost of a cyber attack can be staggering. Last.

cybersecurity, cybercrime

Read More

Dark Web vs. Deep Web: What's the Difference?

Submitted by Erica Kastner on Fri, 10/ 11/ 19 - 11: 05 AM

DARK WEB | 5.5 MIN READ

So much is unknown about the dark web and the deep web that even the terminology surrounding both gets confusing. Many people assume that the dark web and deep web are interchangeable terms but they're not. In this article, we'll.

cybersecurity, dark web

Read More

Cyber Security Awareness Training for Employees [Tips]

Submitted by Erica Kastner on Tue, 10/ 08/ 19 - 11: 00 AM

CYBER SECURITY | 5.5 MIN READ

Employees are the heart and soul of a company. They keep the business running smoothly, managing business-critical tasks such as its financial stability. Though employees are responsible for keeping a company operating, they.

cyber security best practices, cybersecurity, small business cyber security

Read More

How Ransomware Has Evolved

Submitted by Erica Kastner on Fri, 09/ 27/ 19 - 12: 00 PM

RANSOMWARE | 17 MIN READ

Ransomware isn’t just a product of the past few years. Forms of ransomware have been around since the 1980’s and the threat has grown exponentially since then.

Over the years, ransomware has become harder to crack and more.

cybersecurity, ransomware and phishing

Read More

LastPass Hack: How It Signals a Need for Improved Cyber Security Measures

Submitted by Erica Kastner on Fri, 09/ 27/ 19 - 11: 39 AM

CYBER SECURITY NEWS | 3.5 MIN READ

Last week, password manager LastPass experienced a data breach that briefly left the credentials of approximately 16 million users open to hackers. For those not familiar with LastPass, think of it as a secure bank.

cybersecurity, news

Read More

How Does Ransomware Work? [Infographic]

Submitted by Erica Kastner on Fri, 08/ 23/ 19 - 12: 18 PM

CYBER SECURITY | 6 MIN READ

In our increasingly inter-connected world, more and more people are using computer systems that host vital private files, from bank statements to tax documents with social security forms to HIPAA-sealed medical records..

cybersecurity

Read More

Modern Day Pirates are After Your Passwords and are Selling Them on The Dark Web

Submitted by Daniel Gray on Wed, 08/ 14/ 19 - 11: 45 AM

Much like pirates of yesteryear, pirates today steal what's most important and sell it on the Dark Web. In the 17th century, pirates sailed the seven seas in search of ships to board and treasures to plunder. The Golden Age of Piracy only lasted from.

cyber security best practices, cyber security solutions, cybersecurity, small business cyber security

Read More