HTS Blog

The phishing craze that’s blindsiding users

April 24th, 2017

Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam.

Why you need to back up your mobile devices

April 20th, 2017

There was a time when mobile phones were used exclusively for calling and texting. Now, they can do so much more. Regardless of your level of tolerance or skill for managing documents in such a small gadget, mobile devices allow you to send and receive email, download and upload media files, store data, and even close business deals.

Welcome Mike Shaw

April 20th, 2017

Please welcome Mike Shaw – joining Heritage’s growing team as our new Help Desk Support Network Engineer!

Mike comes to us from the IT education industry – working at both the Computer Systems Institute and the Chicago Public Schools – where he taught/trained and provided support.

An essential checklist for WordPress users

April 19th, 2017

Wake up. Take a shower. Get dressed. These are just some of the numerous tasks we do every single day. They may not be fun, but they are essential to our daily routine. Managing a website is very much the same. By going through the necessary steps, you can ensure the speed and security of your website.

Firmware: the threat most users overlook

April 18th, 2017

For decades, one of the most foundational principles of cyber security has remained the same: Always update and patch your software. But for most people, hardware is exempt from this process. They think of hardware as nothing more than a vessel for software to occupy -- and that’s totally incorrect.

Virtualization review: What is it again?

April 13th, 2017

Every now and then, we need to reset the conversation about virtualization and review how it works in its most basic form. With so many advances, it can be hard to keep up if you’re not a regular reader. This article not only defines virtualization and its benefits, it also includes a real-world workstation for you to experiment with!
What is virtualization?
The simplest definition is this: It’s the act of creating a virtual (rather than physical) version of something, including hardware platforms, storage devices, and computer network resources.

Ransomware traps Skype users with fake ads

April 12th, 2017

Skype has made many improvements to become the go-to audio and video communication tool. But as more people turn to Skype to conduct their business, hackers are sure to follow. Recently, Skype has been plagued with fake Flash ads, which if triggered, lead to devastating ransomware infections.

Did Microsoft commit a security breach?

April 11th, 2017

In case you didn’t know, Microsoft provides Office 365 users with a free document-sharing platform called docs.com. It’s a great new tool for publishing files intended for public viewing. The downside is, sensitive documents are published without the file owners’ permission.

Benefits of social media policy reviews

April 10th, 2017

Does your business have a social media policy? If so, when was the last time you updated it? If you're taking too long to answer these questions, that isn’t a good sign. Because you should be conducting regular reviews, at least annually. You'd enjoy innumerable benefits, and deter your employees from obsessing over Snapchat filters in the process.

Microsoft says goodbye to Windows Vista

April 7th, 2017

We live in a digital era where innovations are emerging quicker than the speed of light. This means older operating systems might soon be discontinued. Case in point, Microsoft Vista. After a 10-year run, Microsoft is set to discontinue support for Vista users from April 11th onwards.