The Heroic Blog IT & Cybersecurity Tips

Illustration of a team of business professionals wearing superhero capes
Phishing email icon
There is a new phishing campaign to keep a watchful eye on according to email security firm INKY. It’s a particularly fiendish one. The attackers have designed an email template that does...
Illustration of a criminal stealing a bag of passwords
Scammers delight in impersonating government agencies and well-known brands to lure email recipients into giving up their personal information. That information is then either exploited directly or sold to the highest bidder...
Prisoner behind bars
Chalk up another first for the hackers.  For the first time that we know of, a successful hacking attack caused prisoners in New Mexico to be confined to their cells for a...
Java development graphics on a computer screen
By now you’re almost certainly aware of the Log4j Java issue. It’s a serious and fixable flaw relating to java logging. Recently the United States Federal Trade Commission (FTC) has issued a...
Skype logo
Are you a Skype user?  If so be aware that Microsoft (the company that owns Skype) just added a handy new feature you may want to start taking advantage of right away....
Gears with the letters "SEO"
Do you own and operate a WordPress website?  Do you also use the “All in One” SEO plugin? If you answered yes to both of those questions, then be aware that you’ll...
Encryption graphic of a shield
Two months ago, Microsoft began rolling out support for end-to-end encryption for all Teams calls.  Given the pandemic and the increased demand for Teams and services like it, that was a very...
Whatsapp Logo
Whatsapp has had a tough year from a security standpoint and has suffered losses in the size of its user base as a result. To their credit, the company has been working...
Office illustration of a desk and laptop.
Microsoft is making a few UI changes across its entire product line in anticipation of rolling out Windows 11.  Early this year (2021) the company announced that they were updating the UI...
Online shopping concept showing a smartphone
The UK’s National Cyber Security Centre (NCSC) has identified more than 4,000 different retailers that have been compromised by hackers exploiting known vulnerabilities on checkout pages in order to divert payments and...
style "OMG" on plain white background.
The Business Owner's Guide to Cybersecurity

Download the

Business Owner’s Guide to Cybersecurity

A meditating businessman in a red cape with a laptop and a shield.

Contact Heroic Technologies today to discuss your needs!

Our team of IT engineers and specialists has the experience and offers the support services you need to make these cloud computing services in San Jose & Portland Areas work for you.