Navigating the New VMware

Navigating the New VMware

Join us for a three-part webinar series April 25, May 2, and May 9 at 11:00 AM CST to learn about how you can navigate the VMware changes.
Read more
Comments off
Tech Connect

Tech Connect

Join us on Tuesday, May 7, at 10:30 AM CT at Holidays Pub & Grill for Tech Connect, a day of learning and networking.
Read more
Comments off
Collaboration Roadshow

Collaboration Roadshow

Join us for the HBS Collaborate Roadshow on May 16th in Des Moines to learn how Cisco Webex transforms the way organizations collaborate and connect.
Read more
Comments off
Home Plate Tailgate

Home Plate Tailgate

Join us on Wednesday, June 19, at 11:30 AM CT at Charles Schwab Field for the Home Plate Tailgate at the College World Series.
Read more
Comments off
Navigating Vendor Management

Navigating Vendor Management

To ensure security up and down your supply chain, you’ll need to establish which partners you can trust with data. Creating a full vendor management program requires a significant investment, but this guide summarizes key first steps.
Read more
Comments off
Incident Response Flow Chart

Incident Response Flow Chart

Developing an incident response plan and equipping your staff with the steps to execute that plan will give your organization its best chance at mitigating the negative impacts of a cyber-attack. Use this flow chart as a guide for how to respond to varying threat levels.
Read more
Comments off
Business Impact Analysis Planner

Business Impact Analysis Planner

A business impact analysis (BIA) provides a critical resource for making informed risk management decisions as it relates to the prioritization of your organization’s information systems to support the overall mission and business process. This planner will guide you through the first steps in conducting an effective BIA that points you towards the right investments for your overall risk assessment strategy.
Read more
Comments off
Field Guide to Ransomware

Field Guide to Ransomware

Non-stop ransomware headlines prove that these attacks are everybody’s problem. This e-book will explain what organizations of every size need to know about preventing an attack—and limiting the damage if it happens to you.
Read more
Comments off
10 Most Common Information Security Risks

10 Most Common Information Security Risks

We've compiled the risks our consulting team sees most frequently. This is where to focus to make the biggest difference in your security posture in the shortest period of time. Put these high-ROI jobs at the front of your IT team’s to-do list.
Read more
Comments off
Pen Test Bid Comparison Checklist

Pen Test Bid Comparison Checklist

You gave two vendors the same specs for your upcoming penetration test, and now you’re staring at two proposals with a $10,000 price difference. How do you break down the differences and identify whether the low bidder is offering you a great deal or just a lousy pen test? Use this guide to sort through the key factors for choosing a pen test that fits your goals. Download Guide
Read more
Comments off
Trends in Electronic Evidence

Trends in Electronic Evidence

In this paper, a U.S. Chief Magistrate Judge explains what she's looking for from attorneys and offers tips on how both sides in a case can winnow their work down to the ESI that really matters. Download Guide
Read more
Comments off
Digital Forensics Use Cases

Digital Forensics Use Cases

Use this guide to understand how a digital forensics investigator can support your work in a variety of legal scenarios. Download Guide
Read more
Comments off
Four Essentials for Every Cybersecurity Plan

Four Essentials for Every Cybersecurity Plan

Follow these recommendations for password policies, network management, data security, and social engineering to help lay the groundwork for policies that protect your systems, your data and your organization's future. Download Guide
Read more
Comments off
What to Expect with SOC 2®

What to Expect with SOC 2®

HBS has years of experience assisting companies with their SOC 2® process, and this document provides an overview of what we’ve learned about helping companies get a favorable report on the first try. Download Guide
Read more
Comments off
Protect Your Organization From Foreign Hackers

Protect Your Organization From Foreign Hackers

Don’t let bad actors from Russia—or any other country—take advantage of you. Most cyber-attacks start when an end user accidentally lets the bad guys into the system. Share these simple rules with your team to protect data at work and at home. Download Poster
Read more
Comments off
Can You Spot a Phishing Email?

Can You Spot a Phishing Email?

It only takes a few seconds to trigger a chain of events that could be detrimental to your organization. This infographic breaks down how one click could quickly turn into thousands of dollars. Download Poster
Read more
Comments off
Election Scam Awareness

Election Scam Awareness

Voting scams are at an all-time high. If you receive a text message from an unknown number, do not tap on any links. To confirm your voter registration and polling place, visit usa.gov/election-office. Download Poster
Read more
Comments off
Tips for Safe Holiday Shopping

Tips for Safe Holiday Shopping

Falling for scams not only costs you money but may give hackers access to all of your personal and workplace files. Follow these best practices to make sure that the only place you spend your money is with your favorite retailer. Download Poster
Read more
Comments off
Holiday Scam Awareness

Holiday Scam Awareness

Amid all the holiday cheer, it’s easy to let your guard down. But cybercriminals are counting on your busy schedule and the online shopping boom to distract you. So slow down, read your notifications carefully and look for anything that seems out of place before tapping links. Download Poster
Read more
Comments off
The Cost of an Email Phishing Attack

The Cost of an Email Phishing Attack

It only takes a few seconds to trigger a chain of events that could be detrimental to your organization. This infographic breaks down how one click could quickly turn into thousands of dollars. View Infographic
Read more
Comments off
Spotting Business Email Compromise

Spotting Business Email Compromise

BEC attacks use sophisticated techniques that can trick all but the most attentive email users. Attackers typically impersonate a legitimate contact asking for a transfer of funds. But when victims send the money, it lands in a bank account controlled by the bad guys. This infographic shows the key stages of business email compromise. View Infographic
Read more
Comments off
Types of Penetration Testing

Types of Penetration Testing

A thorough penetration testing campaign involves social engineering, vulnerability scanning, and the manual hacking of computer systems, networks, and web applications. This overview shows how a professional pen testing team tries to exploit a variety of attack vectors, just as a real hacker would. View Infographic
Read more
Comments off
Penetration Testing Explained

Penetration Testing Explained

Penetration testing provides a real-world test of your security posture by sending an ethical hacker to break in using the same techniques as real bad guys. View Infographic
Read more
Comments off
Digital Signage Best Practices

Digital Signage Best Practices

Discover best practices for digital signage to engage audiences, boost sales, and enhance communication. Learn planning, content, and evaluation tips.
Read more
Comments off
What is a vCIO?

What is a vCIO?

Discover how a Virtual Chief Information Officer (vCIO) can streamline your IT operations, enhance efficiency, and drive innovation at reduced costs.
Read more
Comments off
What is a Human Firewall?

What is a Human Firewall?

Discover the role of a human firewall in cybersecurity. Learn how to strengthen your defense by using your most valuable resource: your people.
Read more
Comments off
Who Should Manage the Firewall?

Who Should Manage the Firewall?

Explore the benefits of a managed firewall service. Discover how firewall management can streamline your operations and safeguard against cyber threats.
Read more
Comments off
Law Firm Finds Reliable Digital Forensics Partner

Law Firm Finds Reliable Digital Forensics Partner

Strong digital forensics work can deliver wins in the courtroom—or produce settlements before cases get that far. Weinhardt attorneys count on HBS to produce evidence in cases from small civil litigation to corporate investigations. 
Read more
Comments off
IT Company Assessing Risk to Protect Clients

IT Company Assessing Risk to Protect Clients

A company managing clients’ IT infrastructure can’t afford a breach. That’s why this IT solution provider took recommendations from their colleagues and hired HBS to conduct a risk assessment.
Read more
Comments off
Accounting Firm Leads the Way with Data Security

Accounting Firm Leads the Way with Data Security

Like all CPA firms, MHCS handles highly sensitive personal and business information. When their system administrator began to envision what a cyberattack could do to their company, he called HBS for a risk assessment. 
Read more
Comments off
Penetration Testing on the IoT Front Lines

Penetration Testing on the IoT Front Lines

As the provider of security systems and other building controls, Baker Group needs total confidence that they’re handing customers a secure facility. Baker Group trusts HBS as its partner for risk assessments and penetration tests.
Read more
Comments off
Shaping the Future of Networking with HBS & Arista

Shaping the Future of Networking with HBS & Arista

RECORDING AVAILABLE - HBS has partnered with Arista Networks, a trailblazer in leaf spine architecture. Arista Networks' innovative cloud operating system EOS takes center stage in this transformation, offering real-time network state-based telemetry and monitoring while adhering to open standards.
Read more
Comments off
Microsoft Dynamics GP Update

Microsoft Dynamics GP Update

The ERP Team at Heartland Business Systems (HBS) continues to support the Microsoft Dynamics GP platform as well as Microsoft Dynamics 365 Business Central.
Read more
Comments off
What’s New: Dynamics GP & Business Central

What’s New: Dynamics GP & Business Central

RECORDING AVAILABLE - This webinar will discuss the recent announcements from Microsoft about Dynamics GP, and the impacts. We will share information about cloud migration promotions being offered by Microsoft.
Read more
Comments off
Improving Security with Microsoft 365

Improving Security with Microsoft 365

RECORDING AVAILABLE - In this webinar, Heartland Business Systems will discuss the rollout of Granular Delegated Admin Privileges, what it means for you, how we access your tenant, and steps you can take to further secure your environment today.
Read more
Comments off
SASE Delivered Your Way

SASE Delivered Your Way

RECORDING AVAILABLE - Secure access service edge combines networking and security functions in the cloud to deliver seamless, secure access to applications, anywhere users work. The SASE model aims to consolidate these functions in a single, integrated cloud service.
Read more
Comments off
Dynamics GP Year-End Webinar

Dynamics GP Year-End Webinar

RECORDING AVAILABLE - Join us for training, best practices, helpful tips, tricks and more for the year end close process. This webinar will provide you with general information to help you through the year end season.
Read more
Comments off
Ask the FBI: Cybersecurity Tips

Ask the FBI: Cybersecurity Tips

An FBI Special Agent shares cybersecurity tips covering what to do when you suspect an attack, plus preventative steps that can prevent most breaches.
Read more
Comments off
Securing Your Supply Chain

Securing Your Supply Chain

Efficient operations increasingly require showing your clients that you handle data securely and ensuring that your suppliers do the same.
Read more
Comments off
What to Expect With SOC 2®

What to Expect With SOC 2®

Knowing what to expect from a SOC 2 audit may seem overwhelming, but with the correct readiness process you can have a successful report.
Read more
Comments off
How to Choose a Virtual CISO

How to Choose a Virtual CISO

Choose the right virtual CISO for your organization by looking for these traits of a pro ready to give executive-level guidance to your cybersecurity strategy.
Read more
Comments off
Power Apps: Digitally Transform Government Operations

Power Apps: Digitally Transform Government Operations

RECORDING AVAILABLE - Join us for our webinar to learn how Microsoft’s Power Platform is the solution that can enable your digital transformation. We will showcase examples of how you can drive efficiency, automate processes, and visualize data at your organization utilizing hundreds of pre-built connectors.
Read more
Comments off
Why Do You Need a SOC 2® Report?

Why Do You Need a SOC 2® Report?

Do you need to get a SOC 2® report? Discover six reasons why you may need a SOC 2® security report to create a competitive advantage and attract new clients.
Read more
Comments off
Is Your School Prepared for a Cyberattack?

Is Your School Prepared for a Cyberattack?

RECORDING AVAILABLE - In this high-level and technical session, learn what a successful cybersecurity program looks like and some of the specific ways your school can prevent, and if necessary, respond to ransomware and phishing attacks.
Read more
Comments off
Liftoff Your Phone System to the Cloud

Liftoff Your Phone System to the Cloud

RECORDING AVAILABLE - With centralized administration, security, and reliability you can trust, we keep the Webex Cloud always on and always up to date so you can focus on your business. Join us to learn more about Webex Cloud Calling and its robust features.
Read more
Comments off
Cost Advantages of Managed XDR

Cost Advantages of Managed XDR

Learn about key ways that managed XDR makes good business sense, not only by improving your security posture, but by actually saving you money.
Read more
Comments off
Why You Need a Data Flow Diagram

Why You Need a Data Flow Diagram

Discover the importance of Data Flow Diagrams (DFDs) in enhancing cybersecurity. Learn how DFDs reveal data paths, potential risks, and help secure your system.
Read more
Comments off
Branch Office for the Digital Era: Are You Prepared

Branch Office for the Digital Era: Are You Prepared

RECORDING AVAILABLE - Use SD-WAN to deploy cloud-based applications without compromise. Cisco’s secure SD-WAN solution delivers intent-based networking for the branch – with consistent user policies and strong integrated security.
Read more
Comments off
Are Passwords Obsolete?

Are Passwords Obsolete?

Passwords don’t have many fans. They’re hard to remember and don’t even keep data safe. So what will replace them? Here are a few access tools coming on strong.
Read more
Comments off
Give Voice to Microsoft Teams

Give Voice to Microsoft Teams

RECORDING AVAILABLE - Join us for this webinar where we will outline the many advantages of migrating your phone system to Teams, the options available to you, the pitfalls to be aware of, and why HBS is your voice partner that can enable a quick and seamless migration to Teams Voice.
Read more
Comments off
The IT Audit Process

The IT Audit Process

Take steps to fully understand the phases of your audit to ensure that you have the appropriate resources and input available at each stage.
Read more
Comments off
How to Choose A Quality Pen Test

How to Choose A Quality Pen Test

A quality pen test will take a comprehensive approach and incorporate all the elements of an attack. Ask these questions for a pen test worth your investment.
Read more
Comments off
COVID Relief Funding for Education & Government

COVID Relief Funding for Education & Government

RECORDING AVAILABLE - Join Fortinet and Heartland Business Systems for a detailed discussion on making the most of your available CARES Act I and CARES Act II (CRRSA Act) funding. Secure remote or online learning, telework, and prepare your network for the influx of devices when people return to facilities.
Read more
Comments off
Virtual Food+Tech Connect

Virtual Food+Tech Connect

RECORDING AVAILABLE - Join us to learn about the technology solutions HBS offers that can help your organization reach its goals. Learn about new technologies and best practices from our senior engineers.
Read more
Comments off
The National Impact of CCPA

The National Impact of CCPA

On January 1, 2020, the California Consumer Privacy Act (CCPA) went into effect. Find out how this privacy bill will impact the rest of the country.
Read more
Comments off
A Look Back

A Look Back

The HBS roots date back to 1990, providing packaging labels to the grocery industry through then owner created Alferi Communications.
Read more
Comments off
Compliance is Not Security

Compliance is Not Security

Despite common misconceptions, compliance is not security. Knowing the difference and why it matters could mean better, long-term protection for your business.
Read more
Comments off
APIs with Swagger

APIs with Swagger

APIs play a crucial role in centralizing logic and enabling multi-channel usage, but often come with challenges. Enter Swashbuckle and its counterpart, Swagger.
Read more
Comments off
IT Control Gap Analysis

IT Control Gap Analysis

Discover the pillars of resilience to keep your business robust amid challenges. Embrace continuity with expert strategies.
Read more
Comments off
Introduction to IT Audits

Introduction to IT Audits

Read our comprehensive overview of the audit process and how IT management can insert themselves into this process to benefit from the exercise.
Read more
Comments off
SIEM Terms and Definitions

SIEM Terms and Definitions

SIEM is a powerful tool that provides a holistic view into an organization’s technology security. View our list of definitions of the most commonly used terms.
Read more
Comments off
How Does SIEM Work?

How Does SIEM Work?

SIEM works first by gathering all the event logs from configured devices. They are sent to a collector that typically runs on a virtual machine inside the host network.
Read more
Comments off
3 Tips for Detecting Malware

3 Tips for Detecting Malware

Detecting malware is becoming more difficult. Discover tips will help you identify malware even if your anti-malware tools fail to detect an infection.
Read more
Comments off
Hackers and ACH Fraud

Hackers and ACH Fraud

Risk of fraudulent transactions has grown significantly. Learn how to prevent hackers from using Automated Clearing House (ACH) fraud to drain your accounts.
Read more
Comments off
If Johnny jumped off a bridge…

If Johnny jumped off a bridge…

Make decisions based on your organization’s unique needs and culture, rather than following the crowd. Innovation lies in charting your own course.
Read more
Comments off

Building an IT Control Library

Navigating IT control objectives across ISO 27001, 27002, PCI-DSS, and SOX presents challenges. Learn how to build an effective information security management program.
Read more
Comments off
Botnets and Data Leakage

Botnets and Data Leakage

Defense is depth, and cybersecurity is no different. Trying to defend against an attack using only one defense mechanism is bound to fail.
Read more
Comments off