If you have ever used email (which we all have), it’s likely that you have seen a spoofed email in your inbox. Spoofing happens so often because it is an easy and relatively simple way for scammers to deceive businesses—and unsuspecting consumers—into thinking that they are interacting with a trusted party.
Read MoreLet me introduce you to Business email compromise (BEC), also known as email account compromise (EAC). Sounds pretty straightforward, right? Unfortunately, it isn't.
Read MoreThe threat of cyberattacks - specifically ransomware attacks - is rising according to Homeland Security Secretary Alejandro Mayorkas.
Read MoreOne of the main reasons why IT projects fail is because it’s so easy to put off long-term goals when you’re always dropping everything to respond to urgent, day-to-day problems that arise. Traditionally, IT has been a reactive kind of profession. Something breaks and is immediately fixed. True growth potential comes in when businesses shift their perception of IT operations from a reactive approach to a proactive one. If you’re considering an IT overhaul to a managed provider, here are four ways to get you started.
Read MoreBeyond copiers and printers, CDS offers a full suite of technology solutions ranging from Managed Print Services, to Managed IT Services, and Project-Based IT Services, providing our customers a Single Source for all their business technology needs.
Read More