Subscribe To Our Blog!

Standard Office Systems Blog

What is a BCDR Plan?

Submitted by Erica Kastner on Thu, 08/ 06/ 20 - 04: 24 PM

CYBER SECURITY | 5 MIN READ

Business Continuity and Disaster Recovery (BCDR) plans help organizations mitigate the risks associated with network downtime and interruptions to business operations. Keep reading to learn what a BCDR plan is, how your.

cybersecurity, small business cyber security

Read More

Should Businesses Work Remotely Permanently?

Submitted by Kevin Kendall on Tue, 07/ 14/ 20 - 12: 00 PM

REMOTE OFFICE | 9 MIN READ

Many companies who had their first remote trial run earlier this year amid the COVID-19 pandemic are now wondering if they should permanently keep their office remote. Keep reading to see all the factors a company should.

small business cyber security, cyber security, remote office

Read More

What is a VPN?

Submitted by Tech Support on Tue, 04/ 14/ 20 - 12: 00 PM

CYBER SECURITY | 4.5 MIN READ

Virtual Private Networks, known as VPN's, are a great asset to your business. By allowing your employees to access and share files on your network securely, you help mitigate the risk of data breaches. Keep reading to.

cyber security best practices, cyber security solutions, cybersecurity, small business cyber security

Read More

How Can I Secure a Network Across Multiple Offices?

Submitted by Erica Kastner on Tue, 04/ 07/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Expanding your company to multiple offices is an exciting development. When building new branches, you might not consider the necessary steps to set up your network to securely handle employees from multiple branches.

cyber security best practices, cyber security solutions, cybersecurity, small business cyber security

Read More

LastPass vs. MyGlue: Which Is Better? [2020 Review]

Submitted by Erica Kastner on Fri, 03/ 27/ 20 - 12: 00 PM

CYBER SECURITY | 9 MIN READ

Varying the passwords you use for everything from your email account to your company's HR database is a great first step at protecting your data, but what happens when you have so many passwords that you begin to lose track.

cyber security solutions for small business, small business cyber security, cyber security

Read More

How Hackers Get Your Business' Personal Information

Submitted by Erica Kastner on Fri, 02/ 21/ 20 - 12: 00 PM

CYBER SECURITY | 4.5 MIN READ

hacking protection, small business cyber security, small business cyber security solutions, cybercrime, cyber security

Read More

What Is Cryptojacking?

Submitted by Erica Kastner on Tue, 02/ 11/ 20 - 12: 00 PM

small business cyber security, cybercrime, cyber security

Read More

How Managed IT Services Can Help You Stay HIPAA-Compliant

Submitted by Erica Kastner on Tue, 02/ 04/ 20 - 12: 00 PM

CYBER SECURITY | 7 MIN READ

The healthcare industry must follow strict protocol to remain compliant with HIPAA. Because many organizations within the industry store private information like patient files and financial information, the industry as a.

cyber security solutions for small business, small business cyber security, cyber security

Read More

Legal Industry Cyber Security: 8 Do's and Dont's

Submitted by Erica Kastner on Tue, 01/ 28/ 20 - 12: 00 PM

CYBER SECURITY | 8 MIN READ

The legal industry ranks among the healthcare and finance sectors as one of the most targeted industries for cyber attacks. The common thread that makes them attractive targets is the personal information that they store.

small business cyber security, small business cyber security solutions, cyber security

Read More

Cloud Security vs. On-Premise Security: Which Is Better?

Submitted by Erica Kastner on Fri, 01/ 24/ 20 - 12: 00 PM

CYBER SECURITY | 7.5 MIN READ

Cyber security is an increasingly vital aspect of a business' operations. If your network isn't secure, you risk your data being stolen or held for ransom. When figuring out what type of cyber security is right for you,.

cyber security solutions for small business, small business cyber security, small business cyber security solutions, cyber security

Read More

What Cyber Security New Year's Resolutions Should Your Business Set?

Submitted by Erica Kastner on Fri, 01/ 03/ 20 - 12: 00 PM

CYBER SECURITY | 4.5 MIN READ

The start of a new decade gives businesses a fresh start to strive towards achieving long-term goals. Businesses always think to set New Year's resolutions covering topics such as sales growth and business expansion..

cyber security best practices, cybersecurity, small business cyber security, small business cyber security solutions

Read More

What Are MSP On-Boarding Fees?

Submitted by Kevin Kendall on Fri, 12/ 20/ 19 - 12: 00 PM

CYBER SECURITY | 4 MIN READ

Signing a Managed Services Provider contract is exciting, as it is the first step in better protecting your business from cyber threats. However, signing an MSP contract can mean reading over a lot of unfamiliar jargon. A.

small business cyber security

Read More

Top 7 Network Security Tools for 2020

Submitted by Erica Kastner on Fri, 12/ 13/ 19 - 12: 00 PM

CYBER SECURITY | 7.5 MIN READ

Running a business pulls your mind in a million different directions. When worrying about the usual business-critical tasks, taking time to focus on managing the security of your network can become a hassle. However, is.

cyber security solutions for small business, small business cyber security

Read More

Cyber Security Laws and Regulations Coming in 2020

Submitted by Erica Kastner on Fri, 12/ 06/ 19 - 12: 00 PM

CYBER SECURITY | 4.5 MIN READ 

With 2020 around the corner, you're probably thinking about the approach of tax season or what gifts you'll be buying for the holidays. However, have you considered how you or your business will be affected by new cyber.

small business cyber security, cyber security laws

Read More

How to Prepare for Windows 7 End of Life [Quick Summary]

Submitted by Erica Kastner on Tue, 12/ 03/ 19 - 12: 00 PM

CYBER SECURITY | 2.5 MIN READ

Windows 7 End of Life is coming early next year. Those who do not heed the warnings from Windows leave their networks at serious risk of being breached. Read on to find out what Windows 7 End of Life is, the risks.

small business cyber security

Read More

How to Keep Data Safe and Secure [5 Quick Tips]

Submitted by Erica Kastner on Tue, 11/ 26/ 19 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

While we don't have flying cars yet, society has advanced to the point that many other aspects of our lives are tied to technology. One way that our lives are inextricably tied to it is through the storing of our personal.

IT Solutions, cyber security solutions for small business, small business cyber security, small business cyber security solutions

Read More

How to Choose a Managed Service Provider [13 Tips]

Submitted by Erica Kastner on Wed, 11/ 20/ 19 - 03: 22 PM

CYBER SECURITY | 7 MIN READ

Are you shopping for a managed IT services provider or considering switching from your current one? Read more to learn about some points you should keep in mind when shopping for a managed services provider (MSP).

Managed Services Questions, IT Solutions, cyber security solutions for small business, small business cyber security, small business cyber security solutions

Read More

Who Do Hackers Target?

Submitted by Erica Kastner on Fri, 11/ 15/ 19 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Cyber Security Ventures predicts that a business will fall victim to a ransomware attack every 11 seconds by 2021. When you hear statistics like that, imagining how many people are the victims of a network hack in general.

hacking protection, small business cyber security

Read More

Sophos vs. Symantec Endpoint [Review]

Submitted by Kevin Kendall on Tue, 11/ 05/ 19 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Weak endpoint security creates a host of gaps that hackers can exploit to break into your company's network. Maintaining strong endpoint security is crucial to protecting your valuable assets such as financial information.

cyber security solutions for small business, small business cyber security, small business cyber security solutions

Read More

How Can Your Printers Have Security Risks? [Tips to Protect]

Submitted by Erica Kastner on Tue, 10/ 29/ 19 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

When people imagine how hackers access private medical records, they think of the usual avenues like hacking an employee's email account or stealing the physical files from the actual building. However, imagine this.

Atlanta Printers, cybersecurity, small business cyber security, office copier

Read More