Software matters. What your employees use can impact your firm and your customers. Pay attention. Make rules. New software applications In the pre-pandemic phase, even when companies had staff working from home they were fewer in number and a lot of them even came...
Blog
Why Your Network Security and HIPAA Compliance Are So Important
Why Your Network Security and HIPAA Compliance Are So Important Staying on the right side of the law isn’t the only reason that healthcare and insurance companies need HIPAA compliance assessments. A professional compliance assessment also provides benefits that will...
Power Outages: How They Affect Your Michigan Company’s IT
Power outages are a much more serious problem than just a few minutes or hours of lost productivity and work. There are also long term consequences for tech businesses that may not be as obvious. National and Local Outages As a general rule, power outages in the...
Cybersecurity for Credit Unions: Keeping Safe in 2020
Credit Unions throughout Michigan are looking to enhance their network and data security practices. A credit union’s success is based on relationships, and relationships are built on trust. This is why a credit union’s reputation is one of its most valuable...
How Does Technology Empower Credit Unions?
As finance technology continues to experience dynamic growth, credit unions are strategically responding to gain a strategic advantage. As such, more and more credit unions are investing in their own digital transformation, and now provide more features and benefits...
IT for Credit Unions in the Detroit Area
The Heiden team believes in the Credit Union cooperative model and we specialize in helping credit unions make strategic IT decisions that make the best use of their technology budgets. For almost three decades, we’ve been using proven technologies to address the...
Strengthening your cybersecurity policies
Strengthening your cybersecurity policies Formulating strong IT policies and laying down the best practices for your staff to follow is one of the best ways to prevent your business from becoming a victim of cybercrime. In this blog, we explore the various areas your...
Employee training and Cybersecurity
Employee training & Cybersecurity Employee training will form a big part of the cybersecurity initiative that you will take on as an organization. You need to train your employees to identify and respond correctly to cyberthreats. Here are some employee training...
Poison Attacks: A quick overview
Poison Attacks: A quick overview Smart technology is everywhere. Not just in our offices, but even in our day-to-day lives with tools like Google Home and Alexa becoming a commonplace. With technology becoming smarter every minute, the risks are increasing by the...
Protecting yourself against poison attacks
Data poisoning by way of logic corruption, data manipulation and data injection happen when the attacker finds a way to access your data set. The kind of poison attack varies depending on the level of access the attacker is able to achieve Here’s what you can do to...


