The Heroic Blog IT & Cybersecurity Tips

Illustration of a team of business professionals wearing superhero capes
Hand Holding a Phone
While “vishing” is by no means a new threat, it’s not something that has ever happened with sufficient frequency to get most people’s attention. So, if you haven’t heard the term before,...
CPU Chip illustration
Remember the Heartbleed scare we had a couple years back?  It was a nasty side-channel attack that was somewhat exotic and difficult to pull off, and it was absolutely devastating and sent...
Laptop, tablet and phone with cybersecurity training software
These days, companies spend significant sums of money to protect themselves from cyber criminals.  The threat matrix is vast, and attacks can come from almost any quarter. That is why many companies...
Messenger logo
According to research conducted by the cybersecurity firm PIXM, there is a massive phishing campaign that peaked in April and May of this year (2022) and it is still ongoing. The campaign...
Depiction of a hacker using a computer
You may not know the name Matthew Hickey, but you should thank him for a recent discovery that could save you a lot of grief. Hickey is the co-founder of a company...
Servers lined up in a data center
Are you planning on setting up an Exchange server soon or are you running one now?  If so, be aware that Microsoft is changing their guidance when it comes to the technology...
Illustration of an envelope with a paperclip attached
HTML attachments as an attack vector may seem a little old school. However, according to statistics compiled by Kaspersky Lab indicates that in 2022, that form of attack is not just simply...
Text reading "Cyber Security" shown with a lock icon on a textured background
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory that serves as a stark warning. If you’re using VMware products that are impacted by recently disclosed critical security flaws, either...
Colorful graphic showing locked files
The MalwareHunterTeam recently discovered a new ransomware operation that is particularly nasty.  Called Onyx, outwardly, the operation does what most ransomware campaigns do.  It gets inside a corporate network, exfiltrates the data...
User icon on a computer screen
Ask just about any IT security professional and they will tell you that weak user passwords are one of the biggest problems and most persistent threats to corporate networks. Users Continue Making...
style "OMG" on plain white background.
The Business Owner's Guide to Cybersecurity

Download the

Business Owner’s Guide to Cybersecurity

A meditating businessman in a red cape with a laptop and a shield.

Contact Heroic Technologies today to discuss your needs!

Our team of IT engineers and specialists has the experience and offers the support services you need to make these cloud computing services in San Jose & Portland Areas work for you.