Ransomware adopting self-replication

Although some may have hoped that the threat of ransomware was on the decline, the reality is that it's quite the opposite. Until now, attacks seemed to be targeted directly at its victims, but Microsoft warns that may no longer be true. With their discovery of self-propagating ransomware it's vital to fully understand the possible risk of infection.

Ransomware, the malware that locks up infected systems and demands payment to return access to users, has been steadily increasing its infection rate over the course of this year ...

Read More


New security flaw in popular image uploader

ImageMagick, one of the internet's most widely used image processing services, is susceptible to attacks that may put your site at a huge risk of exploitation, according to recent reports. The discovery of this vulnerability means attackers could potentially steal your site's data, or corrupt it entirely. Let's take a look at what your SMB should be doing to protect itself from this security flaw.

What is ImageMagick?

ImageMagick is a tool that allows sites to easily crop, resize, and store images uploaded by third parties ...

Read More


VoIP: 5 security tips for SMBs

As SMBs continue their steady transition away from traditional telephony services in favor of VoIP, threats of cybercrime and fraud are more common than ever before. Risks to VoIP systems are distinctly unique from those posed to your other networks and understanding how to combat them is critical. Here are 5 tips for securing your organization's internet-based communication devices and services.

Types of threats

The majority of VoIP services involve live communications, which often seem far more innocuous than stored data ...

Read More


Learn from this NFL team's EMR fumble

ESPN recently reported that a laptop containing the medical records of thousands of NFL players was stolen from the car of a Washington Redskins' trainer. And while the team released a statement saying no health information protected under HIPAA guidelines was at risk, the incident shows that EMRs are vulnerable no matter the size of your company. That's why you need to have all medical records completely protected no matter where they are being stored.

And while the Redskins' situation was bad, an NFL spokesperson did state that the NFL EMR system was not ...

Read More


Microsoft's more secure Office web service

Earlier this month, Microsoft made a huge announcement regarding Office that hasn't received much attention. While there is a lot of interest in web-based versions of Microsoft Office, many organizations avoided the Office Online services for fear of compromising their privacy and security. However, they've announced a new version that allows businesses to host an Office Online Server locally. Keep reading to find out if this new service could be useful in your SMB.

Released in 2013, Office Web Apps offered access to powerhouse software packages like Word ...

Read More


Three Steps to Help Prevent Workplace Crime

Protecting your business from crime – both internal and external – takes effort. But with criminals looking to take advantage of you on every front, it's an effort you need to make. But where do you start? To non-security professionals, knowing what to do can be difficult. To make your challenge a little easier, we've boiled down business security to three basic, more manageable steps.

CLICK HERE FOR FULL VERSION



Heritage specializes in the convergence of the four key pillars of technology - the integration of IT, security, communications and print solutions - giving our clients one complete source and a trusted business partner for all their needs.

Heritage – the latest technology solutions with a tradition of quality craftsmanship and values