About Us:


Since 1997, EDI has been a value-added provider of high quality computer components, systems, servers, and computing solutions. Headquartered in Norcross, Georgia, EDI maintains a presence throughout the eastern United States and many European markets.

At EDI, we recognize that business policies and practices that serve the technology community provide an important business advantage, both for us and our customers. As a prominent distributor of computer components and white-box systems, we affect the communities where we do business. As such, we build quality relationships with clients and develop strong vendor alliances. For us, there are multiple benefits – better financial returns, increased opportunities, more efficient operations, higher employee motivation, and improved goodwill between us, our vendors, and our customers. For our customers, there is a triple bottom line – more efficient service, increased selection, and smart savings.

Leveraging our strengths (accelerated delivery time, affordable pricing, assorted purchase options, and exceptional customer service), we plan to improve product accessibility and affordability, provide innovative solutions, and continuously improve our service and products. To achieve this goal, EDI pursues an individual relationship with each customer and tailors services to meet each customer’s specific needs. By contributing to the success of our customers, we hope to stimulate the use of technology throughout a variety of industry sectors, including schools, government institutions, and corporations.

Wednesday, August 30, 2017

Labor Day 2017

A friendly reminder that Eastern Data will be closed on Monday, September 4, 2017 in observance of Labor Day, and will reopen regular business hours on Tuesday, September 5, 2017.
We at Eastern Data wish you a very safe and happy Holiday Weekend!






Picture designed by freepik.com

Microsoft Incentive Rewards September 2017

During the month of September, we will donate $1 per Microsoft product sold to the DAV, supporting our disabled veterans.


Tuesday, August 29, 2017

Helping those in Texas in their time of need / Avoiding Hurricane Harvey Scammers

Be on the lookout for scammers trying to capitalize on the historic flooding in Texas. Be cautious of unsolicited emails trying to make you a victim to malicious cyber activity seeking to capitalize on Hurricane Harvey. Users are advised to exercise caution in handling any email with subject line, attachments, or hyperlinks related to Hurricane Harvey, even if it appears to originate from a trusted source. Fraudulent emails will often contain links or attachments that direct users to phishing or malware-infected websites. Emails requesting donations from duplicitous charitable organizations commonly appear after major natural disasters.

You may also see an increased level of malicious activity around other phishing emails in an effort to entice their targets to reveal login credentials. It’s always better to double check anything that looks suspicious and if you fall victim don’t hide it or try to deal with it yourself. Immediately report it to your local IT team and allow the team help you deal with it.

If you're looking to help our Friends and Neighbors suffering in Texas, there are plenty of resources available where you can help - here is a list of different resources that will actually help those in need, via NPR.

General Relief:









Blood:




Shelter:



Food:


People with Disabilities:


Kids:


Animals:



Thursday, July 27, 2017

Four ways to enhance your endpoint security

Four ways to enhance your endpoint security


Modern technology presents a potential security nightmare for IT. Ransomware attacks and well-publicized cases such as the loss of a laptop with sensitive data by a US Secret Service agent have highlighted the risks involved in defending critical assets against loss or theft.

With more data than ever being stored on mobile and other external devices, supported by ‘bring your own device’ (BYOD) policies, what features should IT decision-makers look for in ensuring suitable endpoint security solutions?

Full article here.

Monday, June 19, 2017