Your source for technology insights, news, events and education. ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­    ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­  
View in browser
newsletter header march 24 2026

FEATURED BLOG ARTICLE

WEEK OF MARCH 23 , 2026

Data Center Considerations

What to Look for in a Data Center...and What to Walk Away From

Read Time: 3 mins.

Choosing a data center is a decision that affects your uptime, security posture, compliance obligations and ability to scale.

Location matters. So does power redundancy, physical security, connectivity options, and the support model when something goes wrong at 2 AM. Miss one of these factors and you'll feel it eventually.


This article walks through the five criteria that belong in every data center evaluation—whether you're moving workloads for the first time or rethinking an existing setup.

Get the 5 Keys
Iran Cyber Threats

Last week, medical device maker Stryker confirmed it contained a cyberattack linked to a pro-Iran hacking group. Attackers gained access to Stryker's Microsoft device management environment and wiped tens of thousands of employee devices globally before the incident was stopped. It's among the most disruptive cyberattacks on a U.S. company in recent memory.

Our guidance hasn't changed: organizations that maintain strong security fundamentals are best positioned to weather any threat environment. Keep internet-facing systems updated, enforce MFA on remote access, verify your backups are functional and tested, and make sure your team knows how to spot a phishing attempt.

CISA: Iran Threat Advisories
CISA

If anything shifts that warrants specific action, we'll let you know. Questions about your security posture are always welcome.

Connect with Us
Azure-Site-Recovery-SwissTek

CASE STUDY

How to Use SOC 2® to Compete Above Your Weight Class

Read time: 5 mins
A SOC 2 report used to be a nice-to-have. For B2E, it became the difference between winning contracts and losing them to bigger competitors. Here's how they got it done.
See How They Did It
Device-code-phishing-attack-chain

BLOG ARTICLE

Device Code Phishing: The Attack That Bypasses Your MFA

Read time: 4 mins
Device code phishing doesn't need your password. It exploits a legitimate Microsoft authentication flow, and once it works, attackers have full access to your environment.

Learn How to Prevent It

News You Should Know

Microsoft_logo_(2012).svg
funding
See What's Available

Microsoft May Fund Your Next Project

Microsoft offers funded programs covering assessments, envisioning workshops, proofs of concept and deployment projects—often at little to no cost to you.

HBS has earned all six Microsoft designations and qualifies for a wide range of these programs. If you have a project on the horizon, it's worth finding out if Microsoft funding can help.

MSFT-EST-HBS-1024x576-1
See What's Changing

Microsoft Announces Extended Service Term

Starting May 4, Microsoft is changing how annual cloud subscriptions renew.

 

The Extended Service Term adds a prorated charge to align your cycle with a standardized renewal date. If your budget team hasn't seen this yet, now is the time.

Events & Webinars

20260220-CS60 Building Resilience with IT Risk Assessments_-Webinar (1)

Webinar: Cyber in 60: Building Resilience with IT Risk Assessments

Thursday, March 26th | 10am (CT)

IT risk assessments tell you where you're exposed before an attacker tells you. On March 26, Ben Hall and Jeff Franklin show how to use risk assessments to strengthen your security posture, manage third-party risk and align technology decisions with business strategy.

Register Now

View All Upcoming HBS Events

Was this email forwarded to you? Subscribe here.

HBS-Logo-2019-rgb-600-2

Technology. Cybersecurity. Comprehensive IT services.

LinkedIn

Heartland Business Systems, 1700 Stephen St, Little Chute, WI 54140, United States, inquiry@hbs.net

Manage preferences

©2026 Heartland Business Systems. All rights reserved.