855.411.EDTS (3387)

Augusta, GA


Greenville, SC


Columbia, SC


Asheville, NC


Savannah, GA


3 Essential Certifications for a Third-Party CJIS Vendor

Delano Collins   ::  9/22/17 3:42 PM

Aligning your criminal justice organization’s practices with CJIS standards has most likely presented continual challenges. Time, resources, and budget approval are just a few concerns we hear from agencies seeking to prepare for the next CJIS audit.

Read More

Topics: Cyber Security, CJIS, Compliance

5 Basic Steps You Can Take to Protect Your Business from Ransomware [Infographic]

Delano Collins   ::  9/20/17 1:42 PM

Ransomware is not just "trending" among hackers. The first known case occurred in 1983 and, over the past 24 years, has evolved into cyber criminals' most favored tool for making fast cash from unwitting businesses of all sizes. 

Read More

Topics: Cyber Security, Phishing, EDTS Cyber, Most Popular, Ransomware

3 Must-Read Articles on the Equifax Data Breach

Delano Collins   ::  9/15/17 3:38 PM

It's already been a week since Equifax announced the massive security breach that affected 137 million consumers.

Out of the 100's of news pieces and social media comments, here are 3 articles you should read (or re-read) to help you cut to the chase and respond effectively:

Read More

Your Next CJIS Audit: What to Expect

Robert Smith   ::  9/14/17 11:11 AM

Every agency that uses Criminal Justice Information Systems or data is audited at least once every 3 years. CJIS policies provide complex but effective guidelines to help you uphold the freedoms of those in your care.

Read More

Topics: Cyber Security, CJIS, Compliance

Defend Against Ransomware Attacks With Backups—But Not Just Any Backups

Delano Collins   ::  9/8/17 5:40 AM

"Regular backups are a great way to combat ransomware attacks." You've heard it said before, at the end of news stories and PSA's about ransomware like WannaCry and Nyetya, and it's true—in theory.

Traditional backups are actually almost as vulnerable to ransomware as your business's primary system, depending on how the two are connected. Thankfully, backup technology has come a long way.

Read More

Topics: Backup and Disaster Recovery, Business Continuity, Datto

What is Cyber Security?

Delano Collins   ::  9/6/17 2:21 PM

Cyber security, sometimes shortened to "cyber," is the protection of computers, computer networks, and digital information from unwanted use and harm.

Read More

Topics: Cyber Security, EDTS Cyber, Most Popular

Backing Up Your Business: Natural Disaster Preparation Checklist

Charles Johnson   ::  9/6/17 11:25 AM

As we watch and grieve for the people affected by Hurricane Harvey's aftermath, we're glad to see backup developer and EDTS partner, Datto, on location helping companies provide emergency backups for Texas businesses.

These backups will help Harvey victims recover company data and resume operations when they're ready. In that spirit, we've compiled a list to help you prepare your business for a potential natural disaster or power outage.

Read More

Topics: Cyber Security, Most Popular, Backup and Disaster Recovery, Business Continuity, Datto

What's the Difference Between a Security Incident and an Event? [Infographic]

Charles Johnson   ::  9/6/17 8:52 AM

The terms "security incident" and "security event" are used by cyber security professionals to describe potential data breaches, but what is the real difference between the two — and which one poses the most threat to your company?

Read More

Topics: Cyber Security, EDTS Cyber, Security Monitoring, Most Popular

EDTS Cyber Approved by State of Georgia to Work with GCIC Systems & the CJIS Network

Charles Johnson   ::  8/22/17 1:37 PM

Augusta, GA - The State of Georgia has approved EDTS Cyber as a vendor qualified to access and support GCIC systems and the Criminal Justice Information System (CJIS) network.

Read More

Topics: Cyber Security, 2017, CJIS

15 Examples of Phishing Emails from 2016-2017

Charles Johnson   ::  7/21/17 3:34 PM

When most people think of cyber-attacks and data breaches, they think of a hooded hacker hammering away at the keyboard in a dark corner somewhere using complex commands to get past firewalls and steal passwords.

The reality is that most breaches come from imposter emails, or phishing emails. And unfortunately, the perpetrators of this simple scam don’t have to know a lick of code to pull it off.

Read More

Topics: Social Engineering, Cyber Security, Phishing, Security Alerts, Most Popular