Subscribe To Our Blog!

Standard Office Systems Blog

Erica Kastner

Erica Kastner is a lead Marketing Specialist at Standard Office Systems as well as a University of Georgia graduate. She aims to use her passion for problem-solving to help businesses understand how to better leverage their network infrastructure.
Find me on:

Recent Posts

What is a Network Security Assessment [Why They Matter]

Submitted by Erica Kastner on Fri, 10/ 05/ 18 - 12: 58 PM

NETWORK SECURITY ASSESSMENT | 10 MIN READ

You've likely heard the term network security assessment before (or information security assessment), but you may not have been sure what it meant. As more and more platforms are hosted in the cloud, businesses.

network security audit

Read More

What is Phishing? [Types and Tips to Prevent]

Submitted by Erica Kastner on Thu, 09/ 27/ 18 - 10: 27 AM

SOCIAL ENGINEERING | 10 MIN READ

Cyber security is becoming more and more of an issue for companies and individuals alike. With cyber attacks becoming commonplace in the news, the word "phishing" has probably come up. But what is phishing? Keep reading.

what is phishing

Read More

What Is a Whaling Attack? [Definitions and Ways to Prevent]

Submitted by Erica Kastner on Fri, 09/ 21/ 18 - 12: 04 PM

SOCIAL ENGINEERING | 5 MIN READ

Whaling is a common term used to describe the hunting of whales for the oil that their blubber produces. In Las Vegas, the term "whale" is used to describe gamblers who are prepared to bet large sums of money at the.

whaling social engineering, cyber security

Read More

What is Social Engineering? [Types, Tips and Prevention]

Submitted by Erica Kastner on Tue, 07/ 31/ 18 - 10: 46 AM

SOCIAL ENGINEERING | 5 MIN READ 

Those who carry out social engineering attacks have many tricks up their sleeve. They rely on deception and basic human psychology to steal your personal information. As a Managed Service Provider, we understand the.

what is social engineering

Read More

Network Security Threats of 2019 [Solutions to Avoid Them]

Submitted by Erica Kastner on Mon, 06/ 25/ 18 - 05: 00 PM

It's a line you've heard over and over again, "never before has network security been so important." Unfortunately, it's true, and my guess... you already knew that.

If you're reading this article, you're trying to stay ahead of the game and protect your.

network security threats

Read More

Superior Solutions for I.T. on a Budget

Submitted by Erica Kastner on Thu, 03/ 29/ 18 - 02: 52 PM

If you are a newer or small business, chances are you have limited IT support in-house. Your network security may consist of making sure your anti-virus software is updated, and your equipment is more than likely being serviced by a break-fix shop or.

Managed IT Services

Read More

Social Engineering Techniques and Ways to Protect Your Network

Submitted by Erica Kastner on Wed, 09/ 13/ 17 - 09: 10 AM

Social Engineering Techniques and Ways to Protect Your Network

Bad news. Many businesses fail to realize that network security is about more than just protecting your digital realm through outlets like advanced software and a dedicated IT company..

Network Protection, social engineering techniques

Read More

What are Managed IT Services? [Complete Guide]

Submitted by Erica Kastner on Thu, 05/ 18/ 17 - 05: 11 PM

MANAGED IT SERVICES | 7 MIN READ

Network security is a complex task that should be of the utmost importance for every business. Poor network security can lead to inefficient business operations, high downtime, cyber attacks, and more. Managed IT services.

Managed IT Services

Read More