Close this search box.

EDTS Cyber Approved by State of Georgia to Work With GCIC Systems & the CJIS Network

Cybersecurity awareness training in a glass office.
Cybersecurity awareness training in a glass office.

The State of Georgia has approved Corsica Technologies as a vendor qualified to access and support GCIC systems and the Criminal Justice Information System (CJIS) network.

CJIS standards were first established by the FBI in 1992 to protect the privacy and authenticity of vital criminal justice records throughout the nation by setting data security, handling, and encryption standards. CJIS standards have evolved with the cyber threat landscape and now include protocols surrounding wireless infrastructure, authentication, SaaS/cloud vendors, employee protocols, and more.

To meet and maintain compliance standards, many criminal justice agencies hire internal I.T. staff and I.T. security vendors like Corsica Technologies. Agencies must ensure the employees of their chosen vendor are meeting the strict requirements to receive clearance to work with or manage Criminal Justice Systems. Most states have taken the FBI’s recommendations and provided a process for obtaining clearance per CJIS requirements.

Corsica Technologies employees have undergone the training required by the State of Georgia and have met all federal standards required to manage the security well-being of Criminal Justice Information.

In addition to the Managed Security Services provided to agencies, Corsica Technologies also provides an Audit Readiness service to aid organizations in understanding where they may have gaps when it comes to meeting the CJIS requirements.

“We’re excited to help criminal justice organizations in the state of Georgia and beyond prepare for their federal audits,” says Delano Collins, CIO of Corsica Technologies. “Because our company practices are informed by over two decades years of IT and cyber security management, we have opened up the CJIS audit-readiness assessment with confidence that we can assist with a depth of expertise and compatible solutions to help any CJIS entity prepare and strengthen their security stance.”

Corsica Technologies has submitted all necessary information (including a list of relevant qualifications) to the FBI. In addition, Corsica Technologies employees carry other nationally recognized certifications, such as:

  • CISSP (Certified Information Systems Security Professional)
  • CISA (Certified Information Systems Auditor)
  • CCFP (Certified Cyber Forensics Professional)
  • CompTIA (a family of advanced technical certifications)

IT Auditor Robert Smith summarizes the CJIS assessment service offering this way: “We put boots on the ground at CJ facilities for the assessment process, during which our auditors mimic the processes of a federal auditor. Upon completion, auditors deliver an executive summary and counsel Information Officers as they develop a roadmap to meeting the complex compliance requirements.”

Because Corsica Technologies employees have been approved by the State of Georgia, all Corsica Technologies security services, such as 24/7 security monitoring and security awareness training, are available to GA agencies as they seek a better compliance standing.

“The threat landscape is dangerous and disturbing,” says Charles Johnson, Founder and CEO of Corsica Technologies. “In helping criminal justice organizations protect their information, we’re aiding their fight to protect all of people under their care—and our justice system as a whole.”

Learn more about Corsica Technologies’s CJIS Consulting & Assessment Services at www.edts.com/cjis-cyber-security-assessments.

About Corsica Technologies

Corsica Technologies serves clients across America 24.7.365 from four Southeastern offices in Augusta, GA, Columbia and Greenville, SC, and Asheville, NC. Corsica Technologies helps organizations protect their data, secure their systems, respond to cyber incidents, and educate their employees to act with discretion in the face of cyber threats. Corsica Technologies employees carry over 80 certifications and have come from across the US to be a part of our expert team. Learn more by calling 855.411.Corsica Technologies or visiting www.Corsica TechnologiesCyber.com.

Corsica Technologies runs concurrent with one of America’s most honored Managed I.T. providers, Corsica Technologies, which keeps clients’ systems running and optimized while maximizing their technology investment and removing the everyday burden of maintaining highest quality I.T. infrastructure. Learn more by calling 855.411.Corsica Technologies or visiting www.Corsica Technologies.com.

Corsica Technologies
Corsica provides personalized service and a virtual CIO (vCIO) who serves as a strategic advisor. When it comes to the complex integration of solutions for IT and cybersecurity, the whole is greater than the sum of its parts. We offer cybersecurity solutions, managed services, digital transformation, resale services, and one-off technology projects. Corsica unifies any combination of these services into a complete, seamless solution.

Related Reads

EDI in the supply chain - Corsica Technologies

Supply Chain EDI: What You Need To Know

EDI is the backbone of the supply chain. Without this technology, trading partners would have to rely on email, phone, or snail mail (gasp) to exchange business-critical documents. But EDI is complicated. There’s a lot to know, and it’s easy

Read more
Unlimited IT Support Services - Corsica Technologies

The End Of Metered Billing In Technology Services

Let’s be honest. When it comes to technology services, something is broken. Customers aren’t getting the consistency, responsiveness, and cost transparency they deserve. Meanwhile, MSPs (managed IT service providers) promise the moon with “all-in” pricing, yet they still allow tons

Read more
CPCSC - Canadian Program for Cyber Security Certification - Corsica Technologies

CPCSC For Canadian Defense Contractors: What We Know Today

With cybersecurity threats evolving rapidly, governments are taking steps to protect sensitive but unclassified information that they must share with their suppliers. This is a critical undertaking, as hackers can use sensitive information to inform their strategies—plus they can execute

Read more

Sign Up For Our Newsletter

Stay up-to-date on the Managed Services and Cybersecurity landscape, and be the first to find out about events and special offers.