If you have ever used email (which we all have), it’s likely that you have seen a spoofed email in your inbox. Spoofing happens so often because it is an easy and relatively simple way for scammers to deceive businesses—and unsuspecting consumers—into thinking that they are interacting with a trusted party.
Read MoreLet me introduce you to Business email compromise (BEC), also known as email account compromise (EAC). Sounds pretty straightforward, right? Unfortunately, it isn't.
Read MoreThe threat of cyberattacks - specifically ransomware attacks - is rising according to Homeland Security Secretary Alejandro Mayorkas.
Read MoreSecurity breaches are just like car accidents—when they happen you can’t believe you missed the opportunity to avoid them. Since you can’t go back in time and reverse an attack, your best protection is prevention.
Read MoreBeyond copiers and printers, CDS offers a full suite of technology solutions ranging from Managed Print Services, to Managed IT Services, and Project-Based IT Services, providing our customers a Single Source for all their business technology needs.
Read More