June 27, 2018 | Corsica Technologies

South Carolina Insurance Entities – Take Cyber Action Now

On May 3, 2018, South Carolina Governor McMaster signed into law the South Carolina Department of Insurance Data Security Act. The Act intends to protect personal information managed by insurance agencies, brokers, and carriers in South Carolina from cybersecurity threats. South Carolina is the first state to implement a comprehensive cybersecurity law covering the insurance industry […]

June 21, 2018 | Corsica Technologies

Behind the Counter: A Brief History of EDTS Cyber

Reprinted with Permission from Behind the Counter, a Community Journals Publishing Group Corsica Technologies has been operating as a world-class, full-service technology consulting firm since 1999, focusing on designing, installing, optimizing and supporting networks. The company takes on clients’ most complex IT business challenges and applies innovative solutions designed to improve profitability – growing each client’s […]

June 21, 2018 | Corsica Technologies

Meet EDTS’s Sister Company, EDTS Cyber

Corsica Technologies has been operating as a world-class, full-service technology consulting firm since 1999, focusing on designing, installing, optimizing and supporting networks. The company takes on clients’ most complex IT business challenges and applies innovative solutions designed to improve profitability – growing each client’s business while reducing costs. In short order, the company became known […]

June 14, 2018 | Corsica Technologies

Common Cyber Scams

The risks organizations face from cyber threats are at epidemic levels.  The threats are sophisticated, attack your weakest links (your employees) and are continuing to evolve at an alarming rate.  Here are some of the most effective cyber scams Corsica Technologies sees facing organizations today. Email Account Compromise Email account compromise is on the rise, […]

June 12, 2018 | Corsica Technologies

Cyber Insurance is the Last, not First Step in Risk Mitigation

In the world of risk…specifically risk mitigation, cyber insurance is the last chapter in your cybersecurity playbook.  Let me explain:  The goal of any security plan is to mitigate (stop or reduce) threats as much as possible.  In a network, that means layered tools (firewall, anti-virus, backups), etc., along with policies, user education and other […]