Subscribe To Our Blog!

Standard Office Systems Blog

Erica Kastner

Erica Kastner is a lead Marketing Specialist at Standard Office Systems as well as a University of Georgia graduate. She aims to use her passion for problem-solving to help businesses understand how to better leverage their network infrastructure.
Find me on:

Recent Posts

The Future of the Dark Web

Submitted by Erica Kastner on Tue, 01/ 14/ 20 - 11: 52 AM

DARK WEB | 6 MIN READ

While the future of the dark web, a magnet for criminal activity, is un-predictable in many ways, there are growing trends in both its audience and functionality. Read more to discover what dark web trends we predict will continue.

dark web, cybercrime, cyber security

Read More

How to Avoid Social Engineering Scams [Types and Tips]

Submitted by Erica Kastner on Fri, 01/ 10/ 20 - 12: 00 PM

SOCIAL ENGINEERING | 4.5 MIN READ

Social engineering threatens your business' livelihood. By preying on human emotion to access sensitive information and hack your network, social engineering can cause a host of negative consequences. Read more to find.

social engineering, social engineering techniques, social engineering scenarios, cyber security

Read More

What is the Network Security Key on a Computer?

Submitted by Erica Kastner on Tue, 01/ 07/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

As a managed IT services provider, we strive to use our industry knowledge to clear up any frequently asked questions for our audience. A network security key, also known as your Wi-Fi password, is a phrase that can confuse.

cyber security

Read More

What Cyber Security New Year's Resolutions Should Your Business Set?

Submitted by Erica Kastner on Fri, 01/ 03/ 20 - 12: 00 PM

CYBER SECURITY | 4.5 MIN READ

The start of a new decade gives businesses a fresh start to strive towards achieving long-term goals. Businesses always think to set New Year's resolutions covering topics such as sales growth and business expansion..

cyber security best practices, cybersecurity, small business cyber security, small business cyber security solutions

Read More

A Timeline of 2019 Ransomware Attacks and Future Trends

Submitted by Erica Kastner on Fri, 12/ 27/ 19 - 12: 00 PM

CYBERCRIME | 9.5 MIN READ

Every year, humanity is further ushered into the golden age of the technological revolution. New technological advancements are publicized, which brings exciting promises of what's to come. However, as humanity, specifically.

cybersecurity, cybercrime

Read More

Do MSP's Offer After-Hours Support?

Submitted by Erica Kastner on Tue, 12/ 17/ 19 - 12: 00 PM

CYBER SECURITY | 3.5 MIN READ

When shopping around for an MSP, a key feature of an offering that you might consider is whether or not they offer after-hours support. Read more to discover what after-hours support looks like, how common it is in the MSP.

cyber security solutions for small business, small business cyber security solutions

Read More

Top 7 Network Security Tools for 2020

Submitted by Erica Kastner on Fri, 12/ 13/ 19 - 12: 00 PM

CYBER SECURITY | 7.5 MIN READ

Running a business pulls your mind in a million different directions. When worrying about the usual business-critical tasks, taking time to focus on managing the security of your network can become a hassle. However, is your.

cyber security solutions for small business, small business cyber security

Read More

NOC vs Help Desk: What's the Difference?

Submitted by Erica Kastner on Tue, 12/ 10/ 19 - 12: 00 PM

CYBER SECURITY |MIN READ

Who's there to help you when your network goes down or you're having trouble accessing your email? Depending on your company's needs, the answer could be a NOC or a help desk. The terms "help desk" and "Network Operations.

cyber security solutions, cyber security solutions for small business

Read More

Cyber Security Laws and Regulations Coming in 2020

Submitted by Erica Kastner on Fri, 12/ 06/ 19 - 12: 00 PM

CYBER SECURITY | 4.5 MIN READ 

With 2020 around the corner, you're probably thinking about the approach of tax season or what gifts you'll be buying for the holidays. However, have you considered how you or your business will be affected by new cyber.

small business cyber security, cyber security laws

Read More

How to Prepare for Windows 7 End of Life [Quick Summary]

Submitted by Erica Kastner on Tue, 12/ 03/ 19 - 12: 00 PM

CYBER SECURITY | 2.5 MIN READ

Windows 7 End of Life is coming early next year. Those who do not heed the warnings from Windows leave their networks at serious risk of being breached. Read on to find out what Windows 7 End of Life is, the risks.

small business cyber security

Read More

How to Keep Data Safe and Secure [5 Quick Tips]

Submitted by Erica Kastner on Tue, 11/ 26/ 19 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

While we don't have flying cars yet, society has advanced to the point that many other aspects of our lives are tied to technology. One way that our lives are inextricably tied to it is through the storing of our personal.

IT Solutions, cyber security solutions for small business, small business cyber security, small business cyber security solutions

Read More

How to Choose a Managed Service Provider [13 Tips]

Submitted by Erica Kastner on Wed, 11/ 20/ 19 - 03: 22 PM

CYBER SECURITY | 7 MIN READ

Are you shopping for a managed IT services provider or considering switching from your current one? Read more to learn about some points you should keep in mind when shopping for a managed services provider (MSP).

Managed Services Questions, IT Solutions, cyber security solutions for small business, small business cyber security, small business cyber security solutions

Read More

Who Do Hackers Target?

Submitted by Erica Kastner on Fri, 11/ 15/ 19 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Cyber Security Ventures predicts that a business will fall victim to a ransomware attack every 11 seconds by 2021. When you hear statistics like that, imagining how many people are the victims of a network hack in general.

hacking protection, small business cyber security

Read More

How to Prevent Ransomware Attacks [8 Quick Tips]

Submitted by Erica Kastner on Tue, 11/ 12/ 19 - 08: 00 AM

CYBER SECURITY |MIN READ

You're browsing the Internet on your computer when the screen starts glitching and freezing up. An eerie warning message pops up on your screen, warning you that all your important documents, from your financial statements and.

cybersecurity, ransomware and phishing, best practices for ransomware

Read More

Ransomware vs. Social Engineering: What's the Difference?

Submitted by Erica Kastner on Fri, 11/ 01/ 19 - 12: 35 PM

CYBER SECURITY | 3.5 MIN READ

The cyber threat landscape is constantly evolving, which means you need to stay on your feet to continue to be well-protected. Ransomware and social engineering both pose cyber threats but are commonly confused. Read on to.

cybersecurity, what is ransomware

Read More

Two Truths One Lie [Dark Web Edition]

Submitted by Erica Kastner on Thu, 10/ 31/ 19 - 10: 00 AM

DARK WEB | 4 MIN READ

Crazy stories circulate the Internet about the dark web and what kind of activity takes place there. To illustrate the kind of activities that happen on the dark web, in this article we are going to describe two real stories about.

dark web

Read More

How Can Printers Have Security Risks? [Tips to Protect]

Submitted by Erica Kastner on Tue, 10/ 29/ 19 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

When people imagine how hackers access private medical records, they think of the usual avenues like hacking an employee's email account or stealing the physical files from the actual building. However, imagine this scenario:.

Atlanta Printers, cybersecurity, small business cyber security, office copier

Read More

How Can the Dark Web Pose Security Threats to My Business?

Submitted by Erica Kastner on Fri, 10/ 25/ 19 - 08: 45 AM

DARK WEB | 6.5 MIN READ

Your business' private information serve as a juicy steak to hackers who are ravenous for fresh meat. Hackers know they can make a pretty penny selling information like employee social security numbers and account logins to the.

cybersecurity, small business cyber security, dark web

Read More

Healthcare Industry Cyber Security [9 Do's and Don'ts]

Submitted by Erica Kastner on Tue, 10/ 22/ 19 - 01: 15 PM

HEALTHCARE CYBER SECURITY | 9.5 MIN READ

Cyber attacks threaten the livelihood of the healthcare industry on a daily basis. They can cause hospitals to temporarily turn away patients or re-route ambulances, and your company can be sued by customers and.

cybersecurity, healthcare

Read More

6 Common Dark Web Myths Debunked

Submitted by Erica Kastner on Thu, 10/ 17/ 19 - 10: 06 AM

DARK WEB | 5 MIN READ

Due to the secretive nature of the dark web, it's natural that myths were created to describe it. In this article, we'll debunk some common myths about the dark web as well as shed some light on the real risks that exist.

cybersecurity, dark web

Read More