Toll-Free 

855.411.EDTS (3387)


Augusta, GA

706.722.6604


Greenville, SC

864.250.9112


Columbia, SC

803.250.4656


Asheville, NC

828.318.0916


Savannah, GA

912.421.7700

Meet EDTS's Sister Company, EDTS Cyber

Guest / Press   ::  6/21/18 3:29 PM

Reprinted with Permission from Behind the Counter, a Community Journals Publishing Group

Read More

Topics: EDTS Cyber

Symptoms of a Hacked Email Account [Infographic]

Robert Smith   ::  2/27/18 8:23 AM

"My clients received spam/phishing emails from my work email. What do I do?"

If a client has contacted you about a suspicious email sent from your account, take action immediately. It may be a warning signal that a hacker has not only gained access to your email account, but to your company's network as well. 

Read More

Topics: Cyber Security Tips, Finance & Accounting, Cyber Security Assessments, Incident Response, Cyber Security, EDTS Cyber

How Much Should I Spend on Cyber Security?

Delano Collins   ::  1/16/18 8:52 AM

According to research commissioned by IBM, the ideal spend on Cyber Security is 9.8 to 13.7% of your I.T. budget. [1] This percentage is estimated to grow along with the increased integration of security into all facets of I.T. infrastructure.

Read More

Topics: Cyber Security, Cyber Security Policies & Procedures, EDTS Cyber, Cyber Security Tips, IT Budgeting, Cyber Security Budgeting, Cyber Security Assessments

The 5 Most Common Network Security Threats Uncovered in Law Firms

Charles Johnson   ::  11/21/17 9:34 AM

EDTS Cyber has the immense privilege and responsibility of working closely with federally regulated industries as a third party auditor and Managed Security Services Provider (MSSP).

The legal industry shares many characteristics with federally audited industries like medical and financial, not the least of which are: 

  • Valuable data: lost legal records cost firms an average $221 per record 1. Data from legal files can be sold on the black market for $1 to thousands, depending on the nature of the information. 
  • Heavily targeted by attackers: 24% of law firms surveyed for the 2017 Ransomware Report reported attacks between Q2 2016 and Q2 2017. 
Read More

Topics: Cyber Security, Cyber Security Policies & Procedures, EDTS Cyber, Security Alerts, Security Monitoring, Security Tips, Legal

How to Identify a Qualified Cyber Security Company

Charles Johnson   ::  11/14/17 10:17 AM

According to research by Sophos, 32% of people advising others on cyber security matters fail to recognize today's basic threats.

With the growing national attention on cyber security, it's no surprise that opportunists are flocking to capitalize on fresh business opportunity. As a business owner or IT decision-maker looking for cyber security services, how can you identify the qualified providers?

Read More

Topics: Cyber Security, EDTS Cyber

3 Cyber Security Discussions That Have Moved from the Server Room to the Board Room

Charles Johnson   ::  10/25/17 12:01 PM

By 2021, cybercrime will cost the world economy an estimated $6 trillion annually¹. No longer solely the concern of IT departments, the greatest transfer of economic wealth in history must be addressed — as a top priority — by stakeholders of businesses and nonprofits of all sizes. 

Read More

Topics: Cyber Security, EDTS Cyber, Cyber Security Policies & Procedures, Most Popular

5 Basic Steps You Can Take to Protect Your Business from Ransomware [Infographic]

Delano Collins   ::  9/20/17 1:42 PM

Ransomware is not just "trending" among hackers. The first known case occurred in 1983 and, over the past 24 years, has evolved into cyber criminals' most favored tool for making fast cash from unwitting businesses of all sizes. 

Read More

Topics: Phishing, Ransomware, Cyber Security, EDTS Cyber, Most Popular

What is Cyber Security?

Delano Collins   ::  9/6/17 2:21 PM

Cyber security, sometimes shortened to "cyber," is the protection of computers, computer networks, and digital information from unwanted use and harm.

Read More

Topics: Cyber Security, EDTS Cyber, Most Popular

What's the Difference Between a Security Incident and an Event? [Infographic]

Charles Johnson   ::  9/6/17 8:52 AM

The terms "security incident" and "security event" are used by cyber security professionals to describe potential data breaches, but what is the real difference between the two — and which one poses the most threat to your company?

Read More

Topics: Cyber Security, EDTS Cyber, Security Monitoring, Most Popular