855.411.EDTS (3387)

Augusta, GA


Greenville, SC


Columbia, SC


Asheville, NC


Savannah, GA


Delano Collins

Delano Collins

Recent Posts

10 Signs Your Office 365 Account May Be Hacked

Delano Collins   ::  3/20/19 1:37 PM

           Email phishing is one of the most common ways accounts are hacked. The number of compromised accounts continues to rise as hackers are utilizing more advanced techniques and many organizations lack the necessary tools to monitor unusual account behavior. Here are 10 signs that will help you recognize if your account has been hacked.

Read More

Can Your Business Recover Quickly from Disasters Such as Hurricanes?

Delano Collins   ::  8/6/18 12:59 PM

If you own or manage a business on or near the Atlantic Ocean, you are aware that the Atlantic Hurricane Season runs from roughly May through November each year. Last year’s hurricane season produced six major hurricanes of Category 3 or higher and racked up $282.16 billion in total damages - the costliest tropical cyclone season on record. The most damaging of these storms, Maria was a Category 5 hurricane with maximum sustained winds of 175 mph.

Read More

Topics: Backup and Disaster Recovery, Business Continuity

Cyber Security Alert: W-2 Phishing Scams

Delano Collins   ::  2/27/18 8:23 AM

W-2 Phishing Scams Target Payroll Departments in Pursuit of Employee Data

Don’t rush through your unread emails this tax season. Sophisticated W-2 phishing scams are likely to hit your inbox soon.

Read More

Topics: Phishing, Security Alerts, Most Popular, Cyber Security Tips

How Much Should I Spend on Cyber Security?

Delano Collins   ::  1/16/18 8:52 AM

According to research commissioned by IBM, the ideal spend on Cyber Security is 9.8 to 13.7% of your I.T. budget. [1] This percentage is estimated to grow along with the increased integration of security into all facets of I.T. infrastructure.

Read More

Topics: Cyber Security, EDTS Cyber, Cyber Security Policies & Procedures, Cyber Security Tips, IT Budgeting, Cyber Security Budgeting, Cyber Security Assessments

Keep Your Shoppers Safe With These 4 Non-Technical PCI-DSS Tasks

Delano Collins   ::  11/22/17 4:44 PM

I have a hunch: as a merchant, keeping your shoppers secure is of utmost importance to you. But PCI-DSS requirements can be overly technical, confusing, or simply not applicable to your situation.

When holiday shopping season rolls around, you might feel as though you're simply hoping for the best. 

Read More

Topics: Cyber Security, Cyber Security Policies & Procedures, PCI, PCI-DSS, Cyber Security Tips

Data Backups Vs. Business Continuity

Delano Collins   ::  10/26/17 2:10 PM

Don't worry about data backups anymore. That's right, I said it. Don't even concern yourself with backing up your company's data.

Read More

Topics: Backup and Disaster Recovery, Business Continuity, Datto

3 Essential Certifications for a Third-Party CJIS Vendor

Delano Collins   ::  9/22/17 3:42 PM

Aligning your criminal justice organization’s practices with CJIS standards has most likely presented continual challenges. Time, resources, and budget approval are just a few concerns we hear from agencies seeking to prepare for the next CJIS audit.

Read More

Topics: Cyber Security, CJIS, Compliance

5 Basic Steps You Can Take to Protect Your Business from Ransomware [Infographic]

Delano Collins   ::  9/20/17 1:42 PM

Ransomware is not just "trending" among hackers. The first known case occurred in 1983 and, over the past 24 years, has evolved into cyber criminals' most favored tool for making fast cash from unwitting businesses of all sizes. 

Read More

Topics: Cyber Security, Phishing, EDTS Cyber, Most Popular, Ransomware

3 Must-Read Articles on the Equifax Data Breach

Delano Collins   ::  9/15/17 3:38 PM

It's already been a week since Equifax announced the massive security breach that affected 137 million consumers.

Out of the 100's of news pieces and social media comments, here are 3 articles you should read (or re-read) to help you cut to the chase and respond effectively:

Read More

Defend Against Ransomware Attacks With Backups—But Not Just Any Backups

Delano Collins   ::  9/8/17 5:40 AM

"Regular backups are a great way to combat ransomware attacks." You've heard it said before, at the end of news stories and PSA's about ransomware like WannaCry and Nyetya, and it's true—in theory.

Traditional backups are actually almost as vulnerable to ransomware as your business's primary system, depending on how the two are connected. Thankfully, backup technology has come a long way.

Read More

Topics: Backup and Disaster Recovery, Business Continuity, Datto