Subscribe To Our Blog!

Standard Office Systems Blog

How to Build a Cyber Security Policy [5 Tips]

Submitted by Daniel Gray on Tue, 09/ 22/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Cyber security policies are becoming more and more common in businesses as they strive to mitigate the risk of an employee accidentally leaking sensitive data or falling for a phishing scheme. These policies need to strike a.

cybersecurity

Read More

Cyber Security Trends 2020 [Top 4]

Submitted by Erica Kastner on Tue, 09/ 15/ 20 - 12: 00 PM

CYBER SECURITY | 4 MIN READ

IT professionals and cyber criminals are constantly performing a sort of dance together. When cyber criminals move one way, IT professionals must move in response, and vice versa in a never-ending salsa. Since cyber criminals'.

cybersecurity

Read More

Should I Lease or Buy a Copier?

Submitted by Bernie Schom on Fri, 09/ 11/ 20 - 03: 10 PM

COPIERS | 6 MIN READ

Our company serves thousands of businesses of vastly different sizes each year. One of the most common questions we receive is "Should I lease or buy a copier?" Keep reading to learn the pros and cons to leasing and buying a copier.

buy a copier, lease or buy a copier

Read More

How to Build a BCDR Plan [Top 4 Tips]

Submitted by Erica Kastner on Tue, 09/ 08/ 20 - 12: 00 PM

CYBER SECURITY | 6 MIN READ

Acts of Mother Nature and the wrath of cyber criminals can be unpredictable. If your business' network went down tomorrow due to a natural disaster or cyber attack, how would you ensure that business operations continue.

cybersecurity, BCDR plan

Read More

Top 5 Factors to Consider When Purchasing a Printer

Submitted by Bernie Schom on Thu, 09/ 03/ 20 - 03: 27 PM

PRINTERS | 7 MIN READ

Whether you use multi-function printers or a fleet of desktop printers in your organization, having the ability to produce high quality printed documents on demand is key in smooth business operations. But the ability to scan,.

Printing, how much does a printer cost

Read More

How Does Antivirus Work?

Submitted by Tech Support on Tue, 09/ 01/ 20 - 12: 00 PM

CYBER SECURITY | 4.5 MIN READ

When most people think of the word "antivirus", they think about that software you download on your computer to keep you from being hacked. While this is true, it is a simplistic definition. Keep reading to find out what.

cybersecurity, antivirus

Read More

Spam vs. Phishing: What's the Difference?

Submitted by Tech Support on Fri, 08/ 28/ 20 - 12: 00 PM

PHISHING | 4 MIN READ

Have you ever received a phone call or email that seemed a little suspicious?Maybe the person or company contacting you seemed fake, or they seemed persistent about trying to get your personal information? Those may have been spam.

what is phishing, phishing attacks

Read More

Top Phishing Scams of 2020

Submitted by Erica Kastner on Wed, 08/ 26/ 20 - 12: 00 PM

PHISHING | 4.5 MIN READ

Criminals will take advantage of any new and unfamiliar situation to steal people's personal information and scam them out of money. The COVID-19 pandemic has provided criminals with a wealth of new opportunities to steal from.

what is phishing, phishing attacks

Read More

Laser vs. Inkjet Printers: What's the Difference?

Submitted by Erica Kastner on Tue, 08/ 25/ 20 - 12: 00 PM

PRINTERS | 4 MIN READ

When you're shopping for a new printer, whether it's for your office or your house, you will typically come across two types of printers: laser and inkjet. As a metro-Atlanta based copier/printer dealer, we aim to use our industry.

advantages and disadvantages of laser printers

Read More

Data Privacy Compliance: How MSP's Can Help

Submitted by Daniel Gray on Fri, 08/ 21/ 20 - 12: 00 PM

CYBER SECURITY | 4 MIN READ

In today's digital age, data privacy is becoming more and more of an issue. In response to cries for consumer privacy, more laws and regulations are being passed to manage data storage and curtail data sharing by businesses.

Managed IT Services, cybersecurity, Managed Services Questions

Read More

BCDR Plans: Why All Businesses Should Have Them

Submitted by Erica Kastner on Fri, 08/ 14/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

When natural disasters and cyber attacks strike, the consequences can extend far beyond just physical damage. Your network functionality may be crippled and severe downtime can cost your business more money than you think..

Read More

Remote Office Management [4 Key Tips]

Submitted by Daniel Gray on Tue, 08/ 11/ 20 - 12: 00 PM

REMOTE OFFICE | 5 MIN READ

Managing a remote office, especially when your company has never been remote before, can prove to be a challenge if one is not properly prepared. Keep reading to learn how to take your network remote as well as five key tips on.

remote office

Read More

What is a BCDR Plan?

Submitted by Erica Kastner on Thu, 08/ 06/ 20 - 04: 24 PM

CYBER SECURITY | 5 MIN READ

Business Continuity and Disaster Recovery (BCDR) plans help organizations mitigate the risks associated with network downtime and interruptions to business operations. Keep reading to learn what a BCDR plan is, how your.

cybersecurity, small business cyber security

Read More

Best Digital Production Printers of 2020 [Specs + Reviews]

Submitted by Bernie Schom on Wed, 08/ 05/ 20 - 03: 18 PM

BEST DIGITAL PRODUCTION PRINTERS | 8 MIN READ

If you are a print shop, law firm, publisher, or other organization in need of a machine that is capable of running a high volume of print jobs, then you need to do your research before you jump into the.

production printing

Read More

What is a Temperature Scanning Kiosk? [Info + Pricing]

Submitted by Bernie Schom on Fri, 07/ 31/ 20 - 04: 42 PM

TEMPERATURE SCANNERS | 6 MIN READ

Temperature scanning kiosks offer businesses a fast and reliable way to re-open amid the COVID-19 pandemic and stay open. Additional API integrations also allow for these kiosks to be configured for uses that extend.

Temperature Scanners, Small Business

Read More

Can Facial Recognition Detect You with a Mask?

Submitted by Erica Kastner on Fri, 07/ 31/ 20 - 12: 00 PM

FACIAL RECOGNITION | 5 MIN READ

As facial recognition becomes more widely used in businesses and government entities alike, and especially due to COVID-19 causing widespread mask wearing, many are wondering if this technology can correctly identify.

cyber security solutions for small business, cyber security, Facial Recognition

Read More

How to Write a Copier RFP [Complete Guide]

Submitted by Bernie Schom on Wed, 07/ 29/ 20 - 10: 50 AM

WHAT IS AN RFP | 20 MIN READ

One thing we know for sure is that crafting a quality Request for Proposal (RFP) is not an easy task and can take significant time to get it right. As a leader in the copier and printer industry, Standard Office Systems is.

Copier Leasing

Read More

Facial Recognition: Everything You Need to Know

Submitted by Erica Kastner on Tue, 07/ 28/ 20 - 12: 00 PM

FACIAL RECOGNITION | 6 MIN READ

Facial recognition is a buzzword that's been the topic of many news articles and the subject of various movies. While some see this technology as dystopian, others see it as a futuristic way to further streamline our.

Read More

4 Reasons to Re-Think In-House IT

Submitted by Daniel Gray on Fri, 07/ 24/ 20 - 12: 00 PM

CYBER SECURITY | 5 MIN READ

Businesses looking to strengthen their cyber security efforts may wish to build an in-house IT team. While internal IT departments may seem like the perfect fit, some organizations may prefer to completely or partially.

Read More

How to Minimize Your Cyber Insurance Claims [6 Tips]

Submitted by Erica Kastner on Tue, 07/ 21/ 20 - 12: 00 PM

CYBER INSURANCE | 4.5 MIN READ

Thoughcyber insurance can provide significant financial coverage in the event of a cyber attack or data breach, policy costs can quickly add up. Luckily, there's a few steps your organization can take to keep costs low. .

Read More