Toll-Free 

855.411.EDTS (3387)


Augusta, GA

706.722.6604


Greenville, SC

864.250.9112


Columbia, SC

803.250.4656


Asheville, NC

828.318.0916


Savannah, GA

912.421.7700

Symptoms of a Hacked Email Account [Infographic]

Robert Smith   ::  2/27/18 8:23 AM

"My clients received spam/phishing emails from my work email. What do I do?"

If a client has contacted you about a suspicious email sent from your account, take action immediately. It may be a warning signal that a hacker has not only gained access to your email account, but to your company's network as well. 

Read More

Topics: Cyber Security, EDTS Cyber, Cyber Security Tips, Finance & Accounting, Cyber Security Assessments, Incident Response

Cyber Security Alert: W-2 Phishing Scams

Delano Collins   ::  2/27/18 8:23 AM

W-2 Phishing Scams Target Payroll Departments in Pursuit of Employee Data

Don’t rush through your unread emails this tax season. Sophisticated W-2 phishing scams are likely to hit your inbox soon.

Read More

Topics: Phishing, Security Alerts, Most Popular, Cyber Security Tips

12 Signs You're Outgrowing Your Current Cyber Security Solution

Charles Johnson   ::  1/17/18 3:54 PM

We talk with many company leaders who have implemented the fundamentals of cyber security but still feel unprepared to face today's cyber attacks.

Anti-virus, anti-malware, firewall, data backups, phishing awareness education for employees, and encryption of sensitive data are often deployed and managed in-house or by a managed I.T. services provider. The importance of these I.T. security fundamentals is indisputable—but a majority of breaches happen behind the firewall. 

Read More

Topics: Cyber Security, Cyber Security Policies & Procedures, Cyber Security Tips, Cyber Security Budgeting, Cyber Security Assessments, Managed Security, MSSPs

How Much Should I Spend on Cyber Security?

Delano Collins   ::  1/16/18 8:52 AM

According to research commissioned by IBM, the ideal spend on Cyber Security is 9.8 to 13.7% of your I.T. budget. [1] This percentage is estimated to grow along with the increased integration of security into all facets of I.T. infrastructure.

Read More

Topics: Cyber Security, EDTS Cyber, Cyber Security Policies & Procedures, Cyber Security Tips, IT Budgeting, Cyber Security Budgeting, Cyber Security Assessments

Backing Up Your Business: Natural Disaster Preparation Checklist

Charles Johnson   ::  11/30/17 11:25 AM

As we close a particularly difficult hurricane season, we're more thankful than ever to have found an innovative backup solution developer and partner, Datto. Following Hurricanes Harvey and Irma, Datto was on location helping install and deploy emergency backups.

These backups help anyone threatened by business downtime recover company data and resume operations almost instantly. Because the threat of downtime doesn't disappear with hurricane season, we've compiled a list to help you prepare your business for a potential natural disaster or power outage.

Read More

Topics: Cyber Security, Most Popular, Backup and Disaster Recovery, Business Continuity, Datto

Keep Your Shoppers Safe With These 4 Non-Technical PCI-DSS Tasks

Delano Collins   ::  11/22/17 4:44 PM

I have a hunch: as a merchant, keeping your shoppers secure is of utmost importance to you. But PCI-DSS requirements can be overly technical, confusing, or simply not applicable to your situation.

When holiday shopping season rolls around, you might feel as though you're simply hoping for the best. 

Read More

Topics: Cyber Security, Cyber Security Policies & Procedures, PCI, PCI-DSS, Cyber Security Tips

4 Ways to Safeguard Your Credit Card This Holiday Season

Charles Johnson   ::  11/22/17 4:42 PM

While payment card theft is a year-round problem, criminals take particular advantage of the rush of the Holiday Season.

Rushed, enthusiastic shoppers are less likely to take notice of phony URLs or payment card skimmers. Here are a few ways you can stay ahead of the criminals this season and safeguard your card:

Read More

Topics: Cyber Security, Phishing, Most Popular, Security Tips, PII, PCI, PCI-DSS, Cyber Security Tips

The 5 Most Common Network Security Threats Uncovered in Law Firms

Charles Johnson   ::  11/21/17 9:34 AM

EDTS Cyber has the immense privilege and responsibility of working closely with federally regulated industries as a third party auditor and Managed Security Services Provider (MSSP).

The legal industry shares many characteristics with federally audited industries like medical and financial, not the least of which are: 

  • Valuable data: lost legal records cost firms an average $221 per record 1. Data from legal files can be sold on the black market for $1 to thousands, depending on the nature of the information. 
  • Heavily targeted by attackers: 24% of law firms surveyed for the 2017 Ransomware Report reported attacks between Q2 2016 and Q2 2017. 
Read More

Topics: Cyber Security, Security Alerts, EDTS Cyber, Security Monitoring, Cyber Security Policies & Procedures, Legal, Security Tips

5 Questions to Ask Your Accountant About Their Cyber Security

Charles Johnson   ::  11/14/17 10:56 AM

Your social security number, address, and DOB might go for a few bucks on the black market. Sadly, when sold in bundles,  $2 per record is enough to bring in a legitimate cash prize for hackers—giving them ample motivation to hack into your accountant’s network.

Read More

Topics: Cyber Security, Most Popular, Cyber Security Policies & Procedures, Cyber Security Tips, Finance & Accounting

How to Identify a Qualified Cyber Security Company

Charles Johnson   ::  11/14/17 10:17 AM

According to research by Sophos, 32% of people advising others on cyber security matters fail to recognize today's basic threats.

With the growing national attention on cyber security, it's no surprise that opportunists are flocking to capitalize on fresh business opportunity. As a business owner or IT decision-maker looking for cyber security services, how can you identify the qualified providers?

Read More

Topics: Cyber Security, EDTS Cyber