Erica Kastner
Erica Kastner is a lead Marketing Specialist at Standard Office Systems as well as a University of Georgia graduate. She aims to use her passion for problem-solving to help businesses understand how to better leverage their network infrastructure.
CYBER SECURITY | 3.5 MIN READ
Cyber crime is on the rise for the foreseeable future. Hackers are wreaking havoc on companies both large and small, stealing private information and crippling networks. The cost of a cyber attack can be staggering. Last.
cybersecurity,
cybercrime
Read More
DARK WEB | 5.5 MIN READ
So much is unknown about the dark web and the deep web that even the terminology surrounding both gets confusing. Many people assume that the dark web and deep web are interchangeable terms but they're not. In this article, we'll.
cybersecurity,
dark web
Read More
CYBER SECURITY | 5.5 MIN READ
Employees are the heart and soul of a company. They keep the business running smoothly, managing business-critical tasks such as its financial stability. Though employees are responsible for keeping a company operating, they.
cyber security best practices,
cybersecurity,
small business cyber security
Read More
When you think of a hacker frantically tapping away in a dark room, who do you think he’s targeting? Banks? The government? Try healthcare information. 2018 saw three times as many healthcare-related cyber attacks as the year prior, and 2019 is holding.
Read More
CYBER SECURITY | 5 MIN READ
Society as we know it is increasingly moving online. We communicate online. We shop online. We order food online. For the deviants in our society, we can access the
dark web for illicit activities. However, with all of.
Read More
RANSOMWARE | 17 MIN READ
Ransomware isn’t just a product of the past few years. Forms of ransomware have been around since the 1980’s and the threat has grown exponentially since then.
Over the years, ransomware has become harder to crack and more.
cybersecurity,
ransomware and phishing
Read More
CYBER SECURITY NEWS | 3.5 MIN READ
Last week, password manager LastPass experienced a data breach that briefly left the credentials of approximately 16 million users open to hackers. For those not familiar with LastPass, think of it as a secure bank.
cybersecurity,
news
Read More
CYBER SECURITY | 12 MIN READ
Cyber security laws are a relatively new legal category that many businesses either are not aware of or struggle to keep up with in terms of compliance. These new laws define the preventative security measures businesses must.
Read More
CYBER SECURITY | 6 MIN READ
In our increasingly inter-connected world, more and more people are using computer systems that host vital private files, from bank statements to tax documents with social security forms to HIPAA-sealed medical records..
cybersecurity
Read More
Would you know if you were the subject of a phishing attack? Many people claim that they’d be able to tell right away if they received an email from an illegitimate source. If that were the case, there wouldn’t be 1.5 million new phishing websites every.
ransomware and phishing,
what is phishing
Read More
While the number of people falling for sending personal information to the crown prince of Nigeria in hopes of receiving his promised wealth and riches seems to be dropping, phishing remains a major issue. In fact, the number of phishing campaigns.
ransomware and phishing,
what is phishing
Read More
With Windows 7 end of life quickly approaching, it’s time to start thinking about what needs to be done to prepare. Technically, regular Windows 7 support has been dead since 2015, however, the extended support period is over January 2020, which means no.
Read More
You’ve all heard the panic. Windows is cutting off support for its widely popular version 7 software. January 14, 2020 will officially mark Windows 7 End of Life. Many companies have used Windows 7 since it launched in 2009 and are still actively using.
Read More
Most people are aware of terms like phishing and malware, but did you know those are a part of a larger scheme called social engineering? This is not a new kind of fraud, in fact it’s been used for many years to manipulate a wide range of people into.
social engineering
Read More
4 MIN READ | MANAGED IT SERVICES
What is a vCIO? As a company that provides this service, we get asked this question all the time. For those looking to join the vCIO profession or possibly utilize their services, we hope that this article answers all.
Managed IT Services Atlanta
Read More
NETWORK SECURITY TOOLS | 5 MIN READ
Another day, another worldwide company with another major data breach. The latest company to get hit was Marriott International, which, at the time this article was written, reported almost 500 MILLION people could.
Network Security
Read More
MANAGED SERVICES | 10 MIN READ
What is a managed service provider? Your company's new best friend. Why? Because the internet is the wild wild west of modern society and your business can't afford to get caught in the crossfire.
what is a managed service provider
Read More