Subscribe To Our Blog!

Standard Office Systems Blog

What Is Ransomware?

Submitted by Erica Kastner on Tue, 01/ 14/ 20 - 12: 00 PM

RANSOMWARE | 6 MIN READ

Ransomware is the modern day mobster, allowing hackers to shake innocent victims down for their money with no remorse. You've probably seen major news outlets covering stories about it for years, but what exactly is ransomware?.

what is ransomware, ransomware and phishing

Read More

The Future of the Dark Web

Submitted by Erica Kastner on Tue, 01/ 14/ 20 - 11: 52 AM

DARK WEB | 6 MIN READ

While the future of the dark web, a magnet for criminal activity, is un-predictable in many ways, there are growing trends in both its audience and functionality. Read more to discover what dark web trends we predict will continue.

dark web, cybercrime, cyber security

Read More

How to Avoid Social Engineering Scams [Types and Tips]

Submitted by Erica Kastner on Fri, 01/ 10/ 20 - 12: 00 PM

SOCIAL ENGINEERING | 4.5 MIN READ

Social engineering threatens your business' livelihood. By preying on human emotion to access sensitive information and hack your network, social engineering can cause a host of negative consequences. Read more to find.

social engineering, social engineering techniques, social engineering scenarios, cyber security

Read More

Intermedia, Mitel, & RingCentral [2020 Comparison]

Submitted by Chris Gaines on Wed, 01/ 08/ 20 - 03: 36 PM

BUSINESS PHONES | 6 MIN READ

Comparing the features of business phone systems like Intermedia, Mitel, and RingCentral can become time-consuming when all the information isn't in one place. To simplify your search, we have researched the brands listed.

business phone systems

Read More

What is the Network Security Key on a Computer?

Submitted by Erica Kastner on Tue, 01/ 07/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

As a managed IT services provider, we strive to use our industry knowledge to clear up any frequently asked questions for our audience. A network security key, also known as your Wi-Fi password, is a phrase that can confuse.

cyber security

Read More

What Cyber Security New Year's Resolutions Should Your Business Set?

Submitted by Erica Kastner on Fri, 01/ 03/ 20 - 12: 00 PM

CYBER SECURITY | 4.5 MIN READ

The start of a new decade gives businesses a fresh start to strive towards achieving long-term goals. Businesses always think to set New Year's resolutions covering topics such as sales growth and business expansion..

cyber security best practices, cybersecurity, small business cyber security, small business cyber security solutions

Read More

A Timeline of 2019 Ransomware Attacks and Future Trends

Submitted by Erica Kastner on Fri, 12/ 27/ 19 - 12: 00 PM

CYBERCRIME | 9.5 MIN READ

Every year, humanity is further ushered into the golden age of the technological revolution. New technological advancements are publicized, which brings exciting promises of what's to come. However, as humanity, specifically.

cybersecurity, cybercrime

Read More

What Are MSP On-Boarding Fees?

Submitted by Daniel Gray on Fri, 12/ 20/ 19 - 12: 00 PM

CYBER SECURITY | 4 MIN READ

Signing a Managed Services Provider contract is exciting, as it is the first step in better protecting your business from cyber threats. However, signing an MSP contract can mean reading over a lot of unfamiliar jargon. A term.

small business cyber security

Read More

Do MSP's Offer After-Hours Support?

Submitted by Erica Kastner on Tue, 12/ 17/ 19 - 12: 00 PM

CYBER SECURITY | 3.5 MIN READ

When shopping around for an MSP, a key feature of an offering that you might consider is whether or not they offer after-hours support. Read more to discover what after-hours support looks like, how common it is in the MSP.

cyber security solutions for small business, small business cyber security solutions

Read More

Top 7 Network Security Tools for 2020

Submitted by Erica Kastner on Fri, 12/ 13/ 19 - 12: 00 PM

CYBER SECURITY | 7.5 MIN READ

Running a business pulls your mind in a million different directions. When worrying about the usual business-critical tasks, taking time to focus on managing the security of your network can become a hassle. However, is your.

cyber security solutions for small business, small business cyber security

Read More

NOC vs Help Desk: What's the Difference?

Submitted by Erica Kastner on Tue, 12/ 10/ 19 - 12: 00 PM

CYBER SECURITY |MIN READ

Who's there to help you when your network goes down or you're having trouble accessing your email? Depending on your company's needs, the answer could be a NOC or a help desk. The terms "help desk" and "Network Operations.

cyber security solutions, cyber security solutions for small business

Read More

Cyber Security Laws and Regulations Coming in 2020

Submitted by Erica Kastner on Fri, 12/ 06/ 19 - 12: 00 PM

CYBER SECURITY | 4.5 MIN READ 

With 2020 around the corner, you're probably thinking about the approach of tax season or what gifts you'll be buying for the holidays. However, have you considered how you or your business will be affected by new cyber.

small business cyber security, cyber security laws

Read More

How to Prepare for Windows 7 End of Life [Quick Summary]

Submitted by Erica Kastner on Tue, 12/ 03/ 19 - 12: 00 PM

CYBER SECURITY | 2.5 MIN READ

Windows 7 End of Life is coming early next year. Those who do not heed the warnings from Windows leave their networks at serious risk of being breached. Read on to find out what Windows 7 End of Life is, the risks.

small business cyber security

Read More

How to Keep Data Safe and Secure [5 Quick Tips]

Submitted by Erica Kastner on Tue, 11/ 26/ 19 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

While we don't have flying cars yet, society has advanced to the point that many other aspects of our lives are tied to technology. One way that our lives are inextricably tied to it is through the storing of our personal.

IT Solutions, cyber security solutions for small business, small business cyber security, small business cyber security solutions

Read More

How to Choose a Managed Service Provider [13 Tips]

Submitted by Erica Kastner on Wed, 11/ 20/ 19 - 03: 22 PM

CYBER SECURITY | 7 MIN READ

Are you shopping for a managed IT services provider or considering switching from your current one? Read more to learn about some points you should keep in mind when shopping for a managed services provider (MSP).

Managed Services Questions, IT Solutions, cyber security solutions for small business, small business cyber security, small business cyber security solutions

Read More

Who Do Hackers Target?

Submitted by Erica Kastner on Fri, 11/ 15/ 19 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Cyber Security Ventures predicts that a business will fall victim to a ransomware attack every 11 seconds by 2021. When you hear statistics like that, imagining how many people are the victims of a network hack in general.

hacking protection, small business cyber security

Read More

How to Prevent Ransomware Attacks [8 Quick Tips]

Submitted by Erica Kastner on Tue, 11/ 12/ 19 - 08: 00 AM

CYBER SECURITY |MIN READ

You're browsing the Internet on your computer when the screen starts glitching and freezing up. An eerie warning message pops up on your screen, warning you that all your important documents, from your financial statements and.

cybersecurity, ransomware and phishing, best practices for ransomware

Read More

Sophos vs. Symantec Endpoint [Review]

Submitted by Daniel Gray on Tue, 11/ 05/ 19 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Weak endpoint security creates a host of gaps that hackers can exploit to break into your company's network. Maintaining strong endpoint security is crucial to protecting your valuable assets such as financial information and.

cyber security solutions for small business, small business cyber security, small business cyber security solutions

Read More

Ransomware vs. Social Engineering: What's the Difference?

Submitted by Erica Kastner on Fri, 11/ 01/ 19 - 12: 35 PM

CYBER SECURITY | 3.5 MIN READ

The cyber threat landscape is constantly evolving, which means you need to stay on your feet to continue to be well-protected. Ransomware and social engineering both pose cyber threats but are commonly confused. Read on to.

cybersecurity, what is ransomware

Read More

What is Malware? [In Under 60 Words]

Submitted by Tech Support on Fri, 11/ 01/ 19 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Many cyber security terms are thrown around, which makes distinguishing one from another confusing. Malware has been making headlines for how prevalent it is. But what is it? Keep reading to learn a basic definition, the.

cyber security best practices, cybercrime

Read More