31 Spooky Days of Cybersecurity

October is Cybersecurity Month, and to celebrate, Heart posted a tip of the day to our Facebook page. We’ve decided to compile all those helpful tidbits into one post, so you can easily find and use these suggestions. Heart’s 31 Spooky Days of Cybersecurity 2016 You are an attractive target to hackers. Those who believe […]

Read the full article

Springfield Discusses Security and Collaboration

On Tuesday, October 25, Heart Technologies hosted local businesses to a Lunch & Learn at our Springfield branch. Guests enjoyed a delicious meal and discussed collaboration and security offerings from Cisco with local experts. Guests began to arrive at 11:30am to feast on a catered meal from 5 Flavors. Lunch options included grilled beef tenderloin […]

Read the full article

How Many Businesses are Prepared for IoT Threats?

Computer Weekly released that recent survey results indicate only 34% of businesses are prepared for IoT threats. Why does this matter to your company? First, we must have a background knowledge of what IoT is. If you’re a little confused, check out our blog explaining this recent technology trend. IoT essentially covers any devices that […]

Read the full article

Is Someone Else Using Your Computer?

Living with another person–be that a roommate, significant other, child, or someone else–challenges you in more ways than one. One of those ways may be the use of your computer. Perhaps you don’t want your roommate stealing your study guides or you’ve grounded your son or daughter for misbehavior. Either way, someone’s accessing your device […]

Read the full article

How Much is Your Hacked Account Worth?

Scanning through my daily newsfeed, my eyes swept to a Sophos article titled “What your hacked account is worth on the Dark Web.” This concept weighs on my mind from time to time. Perhaps it’s come to your mind as well. We constantly hear about hackers breaking into accounts on this site or cyber criminals […]

Read the full article

Simple Cybersecurity Measures For Any Business

According to a 2015 press release by Small Business Committee, 71% of cyber attacks occur at business consisting of less than 100 employees. Does your business fall into this category? If so, you could be next! No one wishes for their company to be attacked. Thankfully, taking the proper steps helps prevent malicious online activity. […]

Read the full article

Your Vacation Tech Guidelines

As the last few weeks of summer approach, families frantically plan for one final vacation getaway. As children grow older, parents realize that each break may be your last chance to take a family vacation. Sports camps, summer jobs, and spending time with friends becomes more of an importance to young people as puberty progresses. […]

Read the full article
Top