HTS Blog

Five tips to prevent VoIP eavesdropping

April 27th, 2017

Eavesdropping is the intentional act of secretly listening in on a conversation, usually not for the best of intentions. Although today the act also includes VoIP telephone systems, it’s not a recent trend. As exemplified by the SIPtap attacks of 2007 and the Peskyspy trojans of 2009, cybercriminals have had their eye on VoIP ever since it was introduced to the market.

Microsoft Word bug: What you need to know

April 26th, 2017

Software developers and hackers are in a constant game of cat and mouse. When cybercriminals find new security bugs to exploit, tech companies have to quickly release a solution that secures those vulnerabilities. Just this month, Microsoft released a patch to eliminate a Word exploit designed to steal user information.

Best new features in Windows 10

April 25th, 2017

Creators Update contains the most significant upgrades to Microsoft’s Windows 10. Some of the stand-out features include application enhancements, improved user experience, and a few productivity features that may seem too small to be noticed. These upgrades were recently rolled out, giving reason to personal and business users alike to get excited.

The phishing craze that’s blindsiding users

April 24th, 2017

Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam.

Why you need to back up your mobile devices

April 20th, 2017

There was a time when mobile phones were used exclusively for calling and texting. Now, they can do so much more. Regardless of your level of tolerance or skill for managing documents in such a small gadget, mobile devices allow you to send and receive email, download and upload media files, store data, and even close business deals.

Welcome Mike Shaw

April 20th, 2017

Please welcome Mike Shaw – joining Heritage’s growing team as our new Help Desk Support Network Engineer!

Mike comes to us from the IT education industry – working at both the Computer Systems Institute and the Chicago Public Schools – where he taught/trained and provided support.

An essential checklist for WordPress users

April 19th, 2017

Wake up. Take a shower. Get dressed. These are just some of the numerous tasks we do every single day. They may not be fun, but they are essential to our daily routine. Managing a website is very much the same. By going through the necessary steps, you can ensure the speed and security of your website.

Firmware: the threat most users overlook

April 18th, 2017

For decades, one of the most foundational principles of cyber security has remained the same: Always update and patch your software. But for most people, hardware is exempt from this process. They think of hardware as nothing more than a vessel for software to occupy -- and that’s totally incorrect.

Virtualization review: What is it again?

April 13th, 2017

Every now and then, we need to reset the conversation about virtualization and review how it works in its most basic form. With so many advances, it can be hard to keep up if you’re not a regular reader. This article not only defines virtualization and its benefits, it also includes a real-world workstation for you to experiment with!
What is virtualization?
The simplest definition is this: It’s the act of creating a virtual (rather than physical) version of something, including hardware platforms, storage devices, and computer network resources.

Ransomware traps Skype users with fake ads

April 12th, 2017

Skype has made many improvements to become the go-to audio and video communication tool. But as more people turn to Skype to conduct their business, hackers are sure to follow. Recently, Skype has been plagued with fake Flash ads, which if triggered, lead to devastating ransomware infections.