31 Spooky Days of Cybersecurity

October is Cybersecurity Month, and to celebrate, Heart posted a tip of the day to our Facebook page. We’ve decided to compile all those helpful tidbits into one post, so you can easily find and use these suggestions. Heart’s 31 Spooky Days of Cybersecurity 2016 You are an attractive target to hackers. Those who believe […]

Read the full article

The One Google Docs Tool You Should Be Using

Google maintains its popularity because the company continually pumps out apps that work for individuals and groups alike. Google’s presence with schools and educational facilities boomed, and it’s because of this functionality.  This comes in the form of Google Docs. What is Google Docs? Google Docs allows Google users to create, write, collaborate, edit, and […]

Read the full article

The Future of Video Conferencing

As August comes to a close and fall creeps in, many changes occur around us. Children go to school, students go back to college, and recent grads find their first full-time positions. With your family moving in opposite directions, how can you connect with them all? Video conferencing. Video conferencing sounds very business-like, but it […]

Read the full article

Do Staff Smartphones Put Medical Data at Risk?

Is Medical Data a True Priority to Your Hospital Employees? Recent surveys showed that IT executives in hospitals and other medical facilities worry about their staff using personal devices when dealing with medical data. Why do they worry? A number of reasons: Staff may lack adequate password protection. Devices may not possess security software to […]

Read the full article

Temporary Tattoos and Technology Coming Together

As a kid, I loved “Inspector Gadget.” I longed to be able to click one button and have anything you needed at your fingertips. I dreamed of one day being able to have access to everything with the push of a button. Now, that technology is available through smartphones and tablets and computers…Yet, there’s still […]

Read the full article

Is Someone Else Using Your Computer?

Living with another person–be that a roommate, significant other, child, or someone else–challenges you in more ways than one. One of those ways may be the use of your computer. Perhaps you don’t want your roommate stealing your study guides or you’ve grounded your son or daughter for misbehavior. Either way, someone’s accessing your device […]

Read the full article

How Much is Your Hacked Account Worth?

Scanning through my daily newsfeed, my eyes swept to a Sophos article titled “What your hacked account is worth on the Dark Web.” This concept weighs on my mind from time to time. Perhaps it’s come to your mind as well. We constantly hear about hackers breaking into accounts on this site or cyber criminals […]

Read the full article
Top