It’s getting harder and harder to cover all your IT needs with staff resources. Issues like employee churn, rising salaries, changing technologies and strategies, and limited skillsets all add to the challenge. This leads

Blog

Defend Against Ransomware Attacks With Backups—But Not Just Any Backups
“Regular backups are a great way to combat ransomware attacks.” You’ve heard it said before, at the end of news stories and PSA’s about ransomware like WannaCry and Nyetya, and it’s true—in theory. Traditional backups are actually almost as vulnerable to ransomware

Cybersecurity

What Is Cybersecurity?
Cyber security, sometimes shortened to “cyber,” is the protection of computers, computer networks, and digital information from unwanted use and harm. Cybersecurity is, essentially, processes and technologies put in place by people, often trained and certified in various cyber security

Company News

EDTS Cyber Approved by State of Georgia to Work With GCIC Systems & the CJIS Network
The State of Georgia has approved Corsica Technologies as a vendor qualified to access and support GCIC systems and the Criminal Justice Information System (CJIS) network. CJIS standards were first established by the FBI in 1992 to protect the privacy and authenticity

Cloud Technology

Wireless Networking
Wireless & Mobility I.T. Solutions Any business can adopt mobility as a business solution, keeping you competitive 24/7 in a rough and tumble business world. Mobility solutions are any technology tools that allow you to conduct business away from your

Cybersecurity

Data Protection
Corsica Technologies Security Audits Protecting your data and mission-critical information is a must in business today. Corsica Technologies helps clients with a range of highly effective and efficient back-up solutions that are secure, automated and guaranteed. You’ll enjoy back-up of

IT Compliance

I.T. Regulatory Compliance
Complying with local, state, federal, or industry specific agency regulation is a fact of life today, and it impacts your I.T. environment. Consider an I.T. partner like Corsica Technologies that can help you ensure that your I.T. systems meet regulations.

Cybersecurity

I.T. Planning in a Nutshell
Every successful business should consider a strategic plan addressing I.T. to improve business alignment, boost value and prioritize I.T. investment. Your I.T. plan should have a timeline of its own, and be revised as the business changes. It should include

IT Compliance

Growing Your I.T. Infrastructure to Grow Your Business
Growing your business requires having appropriate I.T. systems today. To be sure that your I.T. infrastructure will support your business growth, consider partnering with an IT outsourcing company like Corsica Technologies. Your I.T. partner can help you deal with the

Cybersecurity

Small Business Week 2016: Dream Big, Start Small
Small Business Week 2016 is being celebrated May 1-7. SBW is an annual celebration of the critical impact made by entrepreneurs and small biz owners.

Cybersecurity

How to Avoid Disaster Email Scams
With every natural disaster comes disaster email scams as cybercriminals follow the news. Learn how to avoid falling victim to one of these scams.

Cybersecurity

QuickTime for Windows Users: Time to Uninstall
QuickTime for Windows is no longer being supported or updated by Apple so it is strongly recommended that the program be uninstalled immediately.

Cybersecurity

How Healthy Is Your Computer Network?
Just like your patients need preventive care, wellness checks and your trusted expertise for those aches and pains, so too do your computers ,because “an ounce of prevention equals a pound of cure” is true for both people AND computers.