31 Spooky Days of Cybersecurity

October is Cybersecurity Month, and to celebrate, Heart posted a tip of the day to our Facebook page. We’ve decided to compile all those helpful tidbits into one post, so you can easily find and use these suggestions. Heart’s 31 Spooky Days of Cybersecurity 2016 You are an attractive target to hackers. Those who believe […]

Read the full article

Heart Attends IWIL Symposium in Springfield

On Wednesday, September 7, Heart Technologies joined Illinois Women in Leadership (IWIL) for the Women’s Symposium. The Women’s Symposium welcomed women to Wyndham Hotel in Springfield. IWIL celebrated its fifth year of commending local women in business and leadership roles. IWIL Women’s Symposium The symposium consisted of a day full of speakers and motivators for […]

Read the full article

The Future of Video Conferencing

As August comes to a close and fall creeps in, many changes occur around us. Children go to school, students go back to college, and recent grads find their first full-time positions. With your family moving in opposite directions, how can you connect with them all? Video conferencing. Video conferencing sounds very business-like, but it […]

Read the full article

Do Staff Smartphones Put Medical Data at Risk?

Is Medical Data a True Priority to Your Hospital Employees? Recent surveys showed that IT executives in hospitals and other medical facilities worry about their staff using personal devices when dealing with medical data. Why do they worry? A number of reasons: Staff may lack adequate password protection. Devices may not possess security software to […]

Read the full article

Temporary Tattoos and Technology Coming Together

As a kid, I loved “Inspector Gadget.” I longed to be able to click one button and have anything you needed at your fingertips. I dreamed of one day being able to have access to everything with the push of a button. Now, that technology is available through smartphones and tablets and computers…Yet, there’s still […]

Read the full article

Is Someone Else Using Your Computer?

Living with another person–be that a roommate, significant other, child, or someone else–challenges you in more ways than one. One of those ways may be the use of your computer. Perhaps you don’t want your roommate stealing your study guides or you’ve grounded your son or daughter for misbehavior. Either way, someone’s accessing your device […]

Read the full article

Simple Cybersecurity Measures For Any Business

According to a 2015 press release by Small Business Committee, 71% of cyber attacks occur at business consisting of less than 100 employees. Does your business fall into this category? If so, you could be next! No one wishes for their company to be attacked. Thankfully, taking the proper steps helps prevent malicious online activity. […]

Read the full article
Top