Microsoft has increased the price for its Microsoft 365 business licensing in 2025. Whether you work with a provider for M365 managed services or handle everything yourself, you need to understand how price increases

IT Compliance

The 5 Most Common Network Security Threats Uncovered in Law Firms
Corsica Technologies has the immense privilege and responsibility of working closely with federally regulated industries as a third party auditor and Managed Security Services Provider (MSSP). The legal industry shares many characteristics with federally audited industries like medical and financial,

Blog

How to Identify a Qualified Cyber Security Company
According to research by Sophos, 32% of people advising others on cyber security matters fail to recognize today’s basic threats. With the growing national attention on cyber security, it’s no surprise that opportunists are flocking to capitalize on fresh business opportunity. As

Blog

Backing Up Your Business: Natural Disaster Preparation Checklist
Prepare your organization before disaster strikes. Backing up your business data and other Natural Disaster Preparation checklist

Blog

Data Backups Vs. Business Continuity
Don’t worry about data backups anymore. That’s right, I said it. Don’t even concern yourself with backing up your company’s data. The file recovery mindset is hurting you and your business. The cost of downtime spent recovering files and re-installing

Blog

3 Cyber Security Discussions That Have Moved From the Server Room to the Board Room
By 2021, cybercrime will cost the world economy an estimated $6 trillion annually Business Owners and Leaders NEED to be involved in!

Infographic

5 Basic Steps You Can Take to Protect Your Business from Ransomware
Ransomware is on the rise! Corsica’s security experts put together a list of 5 basic steps you can use to protect your organization

Blog

3 Must-Read Articles on the Equifax Data Breach
It’s already been a week since Equifax announced the massive security breach that affected 137 million consumers.

IT Compliance

Your Next CJIS Audit: What to Expect
Every agency that uses Criminal Justice Information Systems or data is audited at least once every 3 years. CJIS policies provide complex but effective guidelines to help you uphold the freedoms of those in your care. But alas, understanding the

Blog

Defend Against Ransomware Attacks With Backups—But Not Just Any Backups
“Regular backups are a great way to combat ransomware attacks.” You’ve heard it said before, at the end of news stories and PSA’s about ransomware like WannaCry and Nyetya, and it’s true—in theory. Traditional backups are actually almost as vulnerable to ransomware

Cybersecurity

What Is Cybersecurity?
Cyber security, sometimes shortened to “cyber,” is the protection of computers, computer networks, and digital information from unwanted use and harm. Cybersecurity is, essentially, processes and technologies put in place by people, often trained and certified in various cyber security

Company News

EDTS Cyber Approved by State of Georgia to Work With GCIC Systems & the CJIS Network
The State of Georgia has approved Corsica Technologies as a vendor qualified to access and support GCIC systems and the Criminal Justice Information System (CJIS) network. CJIS standards were first established by the FBI in 1992 to protect the privacy and authenticity

Cloud Technology

Wireless Networking
Wireless & Mobility I.T. Solutions Any business can adopt mobility as a business solution, keeping you competitive 24/7 in a rough and tumble business world. Mobility solutions are any technology tools that allow you to conduct business away from your