31 Spooky Days of Cybersecurity

October is Cybersecurity Month, and to celebrate, Heart posted a tip of the day to our Facebook page. We’ve decided to compile all those helpful tidbits into one post, so you can easily find and use these suggestions. Heart’s 31 Spooky Days of Cybersecurity 2016 You are an attractive target to hackers. Those who believe […]

Read the full article

Springfield Discusses Security and Collaboration

On Tuesday, October 25, Heart Technologies hosted local businesses to a Lunch & Learn at our Springfield branch. Guests enjoyed a delicious meal and discussed collaboration and security offerings from Cisco with local experts. Guests began to arrive at 11:30am to feast on a catered meal from 5 Flavors. Lunch options included grilled beef tenderloin […]

Read the full article

Is Someone Else Using Your Computer?

Living with another person–be that a roommate, significant other, child, or someone else–challenges you in more ways than one. One of those ways may be the use of your computer. Perhaps you don’t want your roommate stealing your study guides or you’ve grounded your son or daughter for misbehavior. Either way, someone’s accessing your device […]

Read the full article

How Much is Your Hacked Account Worth?

Scanning through my daily newsfeed, my eyes swept to a Sophos article titled “What your hacked account is worth on the Dark Web.” This concept weighs on my mind from time to time. Perhaps it’s come to your mind as well. We constantly hear about hackers breaking into accounts on this site or cyber criminals […]

Read the full article

Digital Trends in Online Shopping

We’ve been shopping online for years. For most, this is a positive experience. People love online shopping because for its convenience. You purchase what you need from the comfort of their home, and the order ships right to your door. A complaint that most online customers likely have is shipping costs. No one wants to […]

Read the full article

Hospital Hackers

If there’s one thing for sure, it’s this: Hackers have no boundaries. When many of us think of hacking, we think of spying on webpages, stealing personal data, and spending incredible amounts of money on our bank accounts. As we know, though, hackers are targeting companies with huge databases to get the information they desire. […]

Read the full article

Heart Technologies at LeadingAge Expo!

On April 5-6, Heart Technologies attended the LeadingAge Illinois Annual Meeting and Exposition in Schaumburg. The Heart team had a blast meeting visitors and discussing the abundance of offering Heart Technologies provides for hospitals, medical facilities, and senior living communities. At our booth, Heart displayed our new retractable signs. These signs share our overall message […]

Read the full article

Access to Our Information: Pros & Cons

Last month, we posted about the Apple and FBI showdown after the terrorist-driven shooting in San Bernardino in December of 2015. Since then, there has been little resolution. The courts have postponed the trial because the FBI believes they have a way to crack the phone without Apple’s assistance. Regardless of the status of this case, […]

Read the full article

Cybersecurity: Why It Matters That You Care

Cybersecurity is booming. If you work in the technology industry, follow technology news, or, likely, if you whisper the word “technology,” you will be bombarded with information about online hackers, account safety, privacy, and cybersecurity. This gets exhausting. When we are constantly inundated with information about the same topic over and over again, regardless of […]

Read the full article
Top