Aligning your criminal justice organization’s practices with CJIS standards has most likely presented continual challenges. Time, resources, and budget approval are just a few concerns we hear from agencies seeking to prepare for the next CJIS audit.Read More
Ransomware is not just "trending" among hackers. The first known case occurred in 1983 and, over the past 24 years, has evolved into cyber criminals' most favored tool for making fast cash from unwitting businesses of all sizes.Read More
It's already been a week since Equifax announced the massive security breach that affected 137 million consumers.
Out of the 100's of news pieces and social media comments, here are 3 articles you should read (or re-read) to help you cut to the chase and respond effectively:Read More
Every agency that uses Criminal Justice Information Systems or data is audited at least once every 3 years. CJIS policies provide complex but effective guidelines to help you uphold the freedoms of those in your care.Read More
"Regular backups are a great way to combat ransomware attacks." You've heard it said before, at the end of news stories and PSA's about ransomware like WannaCry and Nyetya, and it's true—in theory.
Traditional backups are actually almost as vulnerable to ransomware as your business's primary system, depending on how the two are connected. Thankfully, backup technology has come a long way.Read More
Cyber security, sometimes shortened to "cyber," is the protection of computers, computer networks, and digital information from unwanted use and harm.Read More
As we watch and grieve for the people affected by Hurricane Harvey's aftermath, we're glad to see backup developer and EDTS partner, Datto, on location helping companies provide emergency backups for Texas businesses.
These backups will help Harvey victims recover company data and resume operations when they're ready. In that spirit, we've compiled a list to help you prepare your business for a potential natural disaster or power outage.Read More
The terms "security incident" and "security event" are used by cyber security professionals to describe potential data breaches, but what is the real difference between the two — and which one poses the most threat to your company?Read More
Augusta, GA - The State of Georgia has approved EDTS Cyber as a vendor qualified to access and support GCIC systems and the Criminal Justice Information System (CJIS) network.Read More
When most people think of cyber-attacks and data breaches, they think of a hooded hacker hammering away at the keyboard in a dark corner somewhere using complex commands to get past firewalls and steal passwords.
The reality is that most breaches come from imposter emails, or phishing emails. And unfortunately, the perpetrators of this simple scam don’t have to know a lick of code to pull it off.Read More