Toll-Free 

855.411.EDTS (3387)


Augusta, GA

706.722.6604


Greenville, SC

864.250.9112


Columbia, SC

803.250.4656


Asheville, NC

828.318.0916


Savannah, GA

912.421.7700

Cyber Security Alert: W-2 Phishing Scams

Delano Collins   ::  2/27/18 8:23 AM

W-2 Phishing Scams Target Payroll Departments in Pursuit of Employee Data

Don’t rush through your unread emails this tax season. Sophisticated W-2 phishing scams are likely to hit your inbox soon.

Read More

Topics: Security Alerts, Phishing, Cyber Security Tips, Most Popular

Backing Up Your Business: Natural Disaster Preparation Checklist

Charles Johnson   ::  11/30/17 11:25 AM

As we close a particularly difficult hurricane season, we're more thankful than ever to have found an innovative backup solution developer and partner, Datto. Following Hurricanes Harvey and Irma, Datto was on location helping install and deploy emergency backups.

These backups help anyone threatened by business downtime recover company data and resume operations almost instantly. Because the threat of downtime doesn't disappear with hurricane season, we've compiled a list to help you prepare your business for a potential natural disaster or power outage.

Read More

Topics: Backup and Disaster Recovery, Business Continuity, Cyber Security, Datto, Most Popular

4 Ways to Safeguard Your Credit Card This Holiday Season

Charles Johnson   ::  11/22/17 4:42 PM

While payment card theft is a year-round problem, criminals take particular advantage of the rush of the Holiday Season.

Rushed, enthusiastic shoppers are less likely to take notice of phony URLs or payment card skimmers. Here are a few ways you can stay ahead of the criminals this season and safeguard your card:

Read More

Topics: PII, PCI, PCI-DSS, Security Tips, Phishing, Cyber Security, Cyber Security Tips, Most Popular

5 Questions to Ask Your Accountant About Their Cyber Security

Charles Johnson   ::  11/14/17 10:56 AM

Your social security number, address, and DOB might go for a few bucks on the black market. Sadly, when sold in bundles,  $2 per record is enough to bring in a legitimate cash prize for hackers—giving them ample motivation to hack into your accountant’s network.

Read More

Topics: Cyber Security, Cyber Security Policies & Procedures, Cyber Security Tips, Finance & Accounting, Most Popular

3 Cyber Security Discussions That Have Moved from the Server Room to the Board Room

Charles Johnson   ::  10/25/17 12:01 PM

By 2021, cybercrime will cost the world economy an estimated $6 trillion annually¹. No longer solely the concern of IT departments, the greatest transfer of economic wealth in history must be addressed — as a top priority — by stakeholders of businesses and nonprofits of all sizes. 

Read More

Topics: Cyber Security, EDTS Cyber, Cyber Security Policies & Procedures, Most Popular

5 Basic Steps You Can Take to Protect Your Business from Ransomware [Infographic]

Delano Collins   ::  9/20/17 1:42 PM

Ransomware is not just "trending" among hackers. The first known case occurred in 1983 and, over the past 24 years, has evolved into cyber criminals' most favored tool for making fast cash from unwitting businesses of all sizes. 

Read More

Topics: Phishing, Ransomware, Cyber Security, EDTS Cyber, Most Popular

What is Cyber Security?

Delano Collins   ::  9/6/17 2:21 PM

Cyber security, sometimes shortened to "cyber," is the protection of computers, computer networks, and digital information from unwanted use and harm.

Read More

Topics: Cyber Security, EDTS Cyber, Most Popular

What's the Difference Between a Security Incident and an Event? [Infographic]

Charles Johnson   ::  9/6/17 8:52 AM

The terms "security incident" and "security event" are used by cyber security professionals to describe potential data breaches, but what is the real difference between the two — and which one poses the most threat to your company?

Read More

Topics: Cyber Security, EDTS Cyber, Security Monitoring, Most Popular

15 Examples of Phishing Emails from 2016-2017

Charles Johnson   ::  7/21/17 3:34 PM

When most people think of cyber-attacks and data breaches, they think of a hooded hacker hammering away at the keyboard in a dark corner somewhere using complex commands to get past firewalls and steal passwords.

The reality is that imposter emails, or phishing emails, are the most common entry point for hackers. And unfortunately, the perpetrators of this simple scam don’t have to know a lick of code to pull it off.

Read More

Topics: Social Engineering, Cyber Security, Phishing, Security Alerts, Most Popular