While payment card theft is a year-round problem, criminals take particular advantage of the rush of the Holiday Season.
Rushed, enthusiastic shoppers are less likely to take notice of phony URLs or payment card skimmers. Here are a few ways you can stay ahead of the criminals this season and safeguard your card:
Read MoreTopics: PII, PCI, PCI-DSS, Security Tips, Phishing, Cyber Security, Cyber Security Tips, Most Popular
EDTS Cyber has the immense privilege and responsibility of working closely with federally regulated industries as a third party auditor and Managed Security Services Provider (MSSP).
The legal industry shares many characteristics with federally audited industries like medical and financial, not the least of which are:
Topics: Cyber Security, Cyber Security Policies & Procedures, EDTS Cyber, Security Alerts, Security Monitoring, Security Tips, Legal
Your social security number, address, and DOB might go for a few bucks on the black market. Sadly, when sold in bundles, $2 per record is enough to bring in a legitimate cash prize for hackers—giving them ample motivation to hack into your accountant’s network.
Read MoreTopics: Cyber Security, Cyber Security Policies & Procedures, Cyber Security Tips, Finance & Accounting, Most Popular
According to research by Sophos, 32% of people advising others on cyber security matters fail to recognize today's basic threats.
With the growing national attention on cyber security, it's no surprise that opportunists are flocking to capitalize on fresh business opportunity. As a business owner or IT decision-maker looking for cyber security services, how can you identify the qualified providers?
Read MoreTopics: Cyber Security, EDTS Cyber
Don't worry about data backups anymore. That's right, I said it. Don't even concern yourself with backing up your company's data.
Read MoreTopics: Backup and Disaster Recovery, Business Continuity, Datto
By 2021, cybercrime will cost the world economy an estimated $6 trillion annually¹. No longer solely the concern of IT departments, the greatest transfer of economic wealth in history must be addressed — as a top priority — by stakeholders of businesses and nonprofits of all sizes.
Read MoreTopics: Cyber Security, EDTS Cyber, Cyber Security Policies & Procedures, Most Popular
Aligning your criminal justice organization’s practices with CJIS standards has most likely presented continual challenges. Time, resources, and budget approval are just a few concerns we hear from agencies seeking to prepare for the next CJIS audit.
Read MoreTopics: CJIS, Compliance, Cyber Security
Ransomware is not just "trending" among hackers. The first known case occurred in 1983 and, over the past 24 years, has evolved into cyber criminals' most favored tool for making fast cash from unwitting businesses of all sizes.
Read MoreTopics: Phishing, Ransomware, Cyber Security, EDTS Cyber, Most Popular
It's already been a week since Equifax announced the massive security breach that affected 137 million consumers.
Out of the 100's of news pieces and social media comments, here are 3 articles you should read (or re-read) to help you cut to the chase and respond effectively:
Read MoreEvery agency that uses Criminal Justice Information Systems or data is audited at least once every 3 years. CJIS policies provide complex but effective guidelines to help you uphold the freedoms of those in your care.
Read MoreTopics: CJIS, Cyber Security, Compliance