Standard Computer Systems, INC > Blog

Security News & Updates

Featured Security Tool: Thermal Sensor
Whether you're with a Fortune 500 company, place of worship, local business, or a non-profit, you need a security strategy that accounts for both physical and virtual threats. Your organization's security is only as good as it's weakest link, so this month we are featuring a se...
"Work from home" isn't going away: 5 reasons to invest in your IT infrastructure
Even as the country tries to re-open from the shutdown, remote work is not going away anytime soon. Here are 5 reasons why your organization should invest in its IT infrastructure to support remote users. You can take advantage of the efficiencies of having employees work remotely. Many org...
ManagedIT: Boosting your productivity and ROI
In today’s fast-paced technology landscape, you need a partner you can trust to manage your infrastructure. Your business should be focused on revenue generating activities, and that is impossible if your IT is dragging you down. Our MangedIT service is the perfect solution to make sure you...
13 email threat types to know about right now
Our vendor partner, Barracuda Networks, recently published a report called "13 email threat types to know about right now." This is an excellent resource about common email attacks and how they can be prevented. It also outlines how many of these attacks are intertwined and hard to catch. ...
Why small to medium businesses are targets for cyber-attacks
As a local business, you may think you are unlikely to be targeted by cyber-criminals, however, it is estimated that 81% of all cyber-attacks are on small and medium-sized businesses! In fact, a 2017 report by the Ponemon Institute indicates that 61% of small to medium-sized businesses (SMBs) experi...
Have you scheduled your next checkup?
It is understood that routine checkups, eating well, and exercise are key to optimizing health and avoiding sickness. We all know that “an ounce of prevention is worth a pound of cure” and ongoing maintenance is far better than ignoring our health and chancing the consequences. But did y...
The weak link in your cybersecurity
The three pillars of cybersecurity are: People, Processes, and Technology. Each part is critical to the security of any organization, however, many of us focus solely on the technology piece. We treat it like a “silver bullet” that will solve every security issue.  As people, we ...
New coronavirus symptom: phishing?
There are 3 sure things in this world: death, taxes, and email scams. Evolving far past the Nigerian Prince scheme, “phishing” attacks are quickly becoming the biggest email security concern. Phishing refers to an email that fraudulently impersonates a reputable entity in order to steal ...
Why you need Two-Factor Authentication (2FA) now more than ever
Despite the constant bad news about data breaches, password hacking, phishing, and account takeover, there is a bright spot: by using Two-Factor Authentication (2FA) you can easily add an additional layer of security to any login. 2FA takes the simple username/password system to the next level. You ...
Zoom safely!
Zoom has recently been embraced by millions of people around the world trapped in their homes by the coronavirus. Unfortunately, Zoom’s sudden rise in popularity has not come without growing pains. In the last few weeks Zoom has been buried in an avalanche of bad press after numerous security ...
Page 1 of 2First   Previous   [1]  2  Next   Last