800.979.9413    Get SUPPORT

Heiden Technology Solutions Blog

Heiden Technology Solutions has been serving the Saginaw area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Webroot: The Antivirus You Should Be Using

Webroot

We get asked a lot, “What antivirus does Heiden use and why?”  After switching AV vendors last year we have been extremely pleased with Webroot. 

0 Comments
Continue reading

Tip of the Week: Give Your Desktop Some TLC

Tip of the Week: Give Your Desktop Some TLC

Maintaining a network of PCs can be a lot of work. We wouldn’t blame you for having trouble keeping your business’ computers up-to-date--especially if you don’t have a dedicated IT department on-site. It doesn’t have to feel impossible, though. With proactive technology maintenance and the following tips, you’ll be sure to stay productive throughout the workday.

0 Comments
Continue reading

Swipe With Care: Your ATM Might Be Controlled By A Hacker

Swipe With Care: Your ATM Might Be Controlled By A Hacker

One of the most enticing credentials that hackers desire is your credit card number, along with its expiration date and the code on the back. Hackers are also willing to go great lengths to achieve their goal of stealing these credentials, even so far as to make physical changes to automatic teller machines (ATMs) to do so. In fact, hackers will often install skimming devices on ATMs that are so subtle that they can be difficult to detect.

0 Comments
Continue reading

Tip of the Week: 3 Useful Microsoft Word Features

Tip of the Week: 3 Useful Microsoft Word Features

Microsoft Office’s Word is undoubtedly one of the most popular word processing software in the world, perhaps even the most popular. Still, there are many people who use Word on a regular basis without putting the majority of its features to use. Here’s three more Word capabilities that you’ll find very handy.

0 Comments
Continue reading

Artificial Intelligence Can Be Useful To Hackers, Too

Artificial Intelligence Can Be Useful To Hackers, Too

Man matching wits with computer isn’t new territory. In 1830, a locomotive raced a horse to see which was superior in terms of speed and distance. 1956 saw the first time a human played chess against a computer. Today, the time has come when an artificial intelligence has begun to break into a new territory that was dominated by humans for thousands of years: crime.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Cloud Privacy Best Practices Technology Microsoft Software Hackers Hardware Small Business Business Computing Google Chrome Backup Business Management Smartphones Email Malware Android Managed IT Services How To Outsourced IT Data Breach IT Services Managed IT Services App Spam Business Continuity Hosted Solutions Data Browser User Tips Cybersecurity Productivity Cloud Computing Data Storage Passwords Windows 10 Phishing Computers Spam Blocking Efficiency Law Enforcement HaaS Office 365 Operating System Word Saving Money Ransomware Mobile Device Management Money Unsupported Software Collaboration Network Security Computer Care Samsung Gadgets Data Backup Value Innovation Social Media Virtualization Data Security Cybercrime Internet Office Tips Bring Your Own Device Skype Computer FENG Communication Leadership Outlook IT Support Facebook Managed Service Provider Start Menu Quick Tips Network Microsoft Office Frequently Asked Questions Training Tools OneNote IT Management webinar Excel Vendor Management Automation Patch Management Assessment Google Drive Conferencing Tip of the week Windows 10s Charger Managed IT Downtime Television IT Plan Emails Mobile Devices Windows Server 2008 Public Cloud Cleaning Bandwidth Botnet Root Cause Analysis Public Computer Windows 7 Windows Router Disaster Recovery Travel Meetings Safety Software Tips Alert Flash The Internet of Things Vulnerability Networking Avoiding Downtime BYOD Netflix Smartphone Flexibility Redundancy Solid State Drive Private Cloud Knowledge Automobile Employer-Employee Relationship Data Recovery Data loss Miscellaneous Physical Security IT Support Battery Sync Audit Loyalty Network Congestion Artificial Intelligence Business Screen Mirroring Worker Telephone Systems Telephony Windows 10 Computer Fan SaaS Cast IT Consultant Office Server Update VoIP Wi-Fi HBO Settings Rootkit Computing Infrastructure Electronic Medical Records Work/Life Balance Cortana WiFi Instant Messaging 5G Wireless Technology Experience Applications IBM Hacker Marketing Save Money Content Emergency Customer Relationship Management IP Address Save Time Audiobook Video Games Website Music Health Remote Monitoring Customer Service CrashOverride Mobile Office Entertainment Remote Computing Domains Wearable Technology Scam Virtual Reality Hard Drives Employer Employee Relationship Holiday Public Speaking Password Transportation Worker Commute Two-factor Authentication Lithium-ion battery Webinar Computer Accessories How to Augmented Reality Benefits Tech Support Apps IT solutions Bluetooth Mobility Black Market Productivity USB Firewall Hacking Hiring/Firing Budget Competition Risk Management Fun Big Data Users Smart Technology Politics Scalability Upgrade Troubleshooting Two Factor Authentication Data Management Wireless Books Education Search Workplace Tips Presentation Keyboard

Newsletter Sign Up