We talk with many company leaders who have implemented the fundamentals of cyber security but still feel unprepared to face today's cyber attacks.
Anti-virus, anti-malware, firewall, data backups, phishing awareness education for employees, and encryption of sensitive data are often deployed and managed in-house or by a managed I.T. services provider. The importance of these I.T. security fundamentals is indisputable—but a majority of breaches happen behind the firewall.Read More
As we close a particularly difficult hurricane season, we're more thankful than ever to have found an innovative backup solution developer and partner, Datto. Following Hurricanes Harvey and Irma, Datto was on location helping install and deploy emergency backups.
These backups help anyone threatened by business downtime recover company data and resume operations almost instantly. Because the threat of downtime doesn't disappear with hurricane season, we've compiled a list to help you prepare your business for a potential natural disaster or power outage.Read More
While payment card theft is a year-round problem, criminals take particular advantage of the rush of the Holiday Season.
Rushed, enthusiastic shoppers are less likely to take notice of phony URLs or payment card skimmers. Here are a few ways you can stay ahead of the criminals this season and safeguard your card:Read More
EDTS Cyber has the immense privilege and responsibility of working closely with federally regulated industries as a third party auditor and Managed Security Services Provider (MSSP).
The legal industry shares many characteristics with federally audited industries like medical and financial, not the least of which are:
Your social security number, address, and DOB might go for a few bucks on the black market. Sadly, when sold in bundles, $2 per record is enough to bring in a legitimate cash prize for hackers—giving them ample motivation to hack into your accountant’s network.Read More
According to research by Sophos, 32% of people advising others on cyber security matters fail to recognize today's basic threats.
With the growing national attention on cyber security, it's no surprise that opportunists are flocking to capitalize on fresh business opportunity. As a business owner or IT decision-maker looking for cyber security services, how can you identify the qualified providers?Read More
By 2021, cybercrime will cost the world economy an estimated $6 trillion annually¹. No longer solely the concern of IT departments, the greatest transfer of economic wealth in history must be addressed — as a top priority — by stakeholders of businesses and nonprofits of all sizes.Read More
The terms "security incident" and "security event" are used by cyber security professionals to describe potential data breaches, but what is the real difference between the two — and which one poses the most threat to your company?Read More
Augusta, GA - The State of Georgia has approved EDTS Cyber as a vendor qualified to access and support GCIC systems and the Criminal Justice Information System (CJIS) network.Read More
When most people think of cyber-attacks and data breaches, they think of a hooded hacker hammering away at the keyboard in a dark corner somewhere using complex commands to get past firewalls and steal passwords.
The reality is that imposter emails, or phishing emails, are the most common entry point for hackers. And unfortunately, the perpetrators of this simple scam don’t have to know a lick of code to pull it off.Read More