Standard Computer Systems, INC > Blog

Security News & Updates

ManagedIT: Boosting your productivity and ROI
In today’s fast-paced technology landscape, you need a partner you can trust to manage your infrastructure. Your business should be focused on revenue generating activities, and that is impossible if your IT is dragging you down. Our MangedIT service is the perfect solution to make sure you...
13 email threat types to know about right now
Our vendor partner, Barracuda Networks, recently published a report called "13 email threat types to know about right now." This is an excellent resource about common email attacks and how they can be prevented. It also outlines how many of these attacks are intertwined and hard to catch. ...
Why small to medium businesses are targets for cyber-attacks
As a local business, you may think you are unlikely to be targeted by cyber-criminals, however, it is estimated that 81% of all cyber-attacks are on small and medium-sized businesses! In fact, a 2017 report by the Ponemon Institute indicates that 61% of small to medium-sized businesses (SMBs) experi...
Have you scheduled your next checkup?
It is understood that routine checkups, eating well, and exercise are key to optimizing health and avoiding sickness. We all know that “an ounce of prevention is worth a pound of cure” and ongoing maintenance is far better than ignoring our health and chancing the consequences. But did y...
The weak link in your cybersecurity
The three pillars of cybersecurity are: People, Processes, and Technology. Each part is critical to the security of any organization, however, many of us focus solely on the technology piece. We treat it like a “silver bullet” that will solve every security issue.  As people, we ...
New coronavirus symptom: phishing?
There are 3 sure things in this world: death, taxes, and email scams. Evolving far past the Nigerian Prince scheme, “phishing” attacks are quickly becoming the biggest email security concern. Phishing refers to an email that fraudulently impersonates a reputable entity in order to steal ...
Why you need Two-Factor Authentication (2FA) now more than ever
Despite the constant bad news about data breaches, password hacking, phishing, and account takeover, there is a bright spot: by using Two-Factor Authentication (2FA) you can easily add an additional layer of security to any login. 2FA takes the simple username/password system to the next level. You ...
Zoom safely!
Zoom has recently been embraced by millions of people around the world trapped in their homes by the coronavirus. Unfortunately, Zoom’s sudden rise in popularity has not come without growing pains. In the last few weeks Zoom has been buried in an avalanche of bad press after numerous security ...
How COVID-19 is already impacting your IT infrastructure
As the world adjusts to life during a quarantine, here are 3 statistics that show COVID-19 is having a bigger impact on your IT infrastructure than you thought: Back in “normal times,” only 2.9% of the total U.S. workforce worked from home at least half of the time (based on a 2017...
Is your IT department coronavirus-proof?
Traditionally, we think of Disaster Recovery as a way to combat things like physical calamity, data loss, and criminal acts, but what if something happens to your IT manager? Are you prepared? By identifying problems before they happen, and putting a plan in place, you can position your business to ...
Page 1 of 2First   Previous   [1]  2  Next   Last