IT

Blog Category

What is Social Engineering?

7/30/21

Cybercriminals have a wide variety of tactics they use to infiltrate networks, impersonate people or businesses, and steal all of the information they possibly can. What's similar about many of these tactics is that they all involve a process called social engineering. Find out what it is and how to prevent cybercriminals from using it against you or your business.

Read More

What is Phishing and Why is it a Threat?

7/30/21

In this blog post, I'll give you a few tips on how to protect yourself from phishing scams and explain why it's a threat to your business.

Read More

What is Spoofing and Why is it a Threat?

7/30/21

If you have ever used email (which we all have), it’s likely that you have seen a spoofed email in your inbox. Spoofing happens so often because it is an easy and relatively simple way for scammers to deceive businesses—and unsuspecting consumers—into thinking that they are interacting with a trusted party.

Read More

Why You Should Know About Business Email Compromise (BEC) and What to do to Prevent It

7/14/21

Let me introduce you to Business email compromise (BEC), also known as email account compromise (EAC). Sounds pretty straightforward, right? Unfortunately, it isn't.

Read More
1 / 4

About CDS

Beyond copiers and printers, CDS offers a full suite of technology solutions ranging from Managed Print Services, to Managed IT Services, and Project-Based IT Services, providing our customers a Single Source for all their business technology needs.

Read More

Explore Other Categories

Tags

Subscribe

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.