Sam Heiney

VP, Product at Impero Software – A skilled product team leader, Sam directs a global development operation that is responsible for the full Impero Software product suite.

Sam Heiney's Posts

Learn How Remote Support Software Has Revolutionized the IT Support Industry

IT support isn’t what it used to be - it’s better, faster and cheaper! And that’s thanks to the relatively new prevalence of remote support software. What used to take hours can now take minutes. What was a mere IT ...
Read More

What Is Remote Access? 8 Things to Know About Remote Access

If you’ve ever needed to access your desktop computer from a separate location, then remote desktop software is what you need. While remote access can be used in home networks, it is most commonly used on corporate networks so business owners, support ...
Read More

9 BEST PRACTICES for Keeping POS systems safe

Take these steps to secure your remote access and avoid being the next victim. North Country Business Products, a Point of Sale (PoS) services and solutions company based in Minnesota, announced a data breach on February 20, 2019. Full details have ...
Read More

Remote Access and GDPR Part 5: The Right-to-be-Forgotten

Hello and welcome once again to Impero's ongoing series on the upcoming General Data Protection Regulation and its impact on the use of remote access and control software. This week we’ll be digging into the “right-to-be-forgotten.” More specifically, the rights ...
Read More

Remote Access and GDPR Part 4: Data Minimization

Welcome back to Impero Connect's ongoing series on the 2018 General Data Protection Regulation, where we dive into the EU regulation and how it impacts the way we use remote access tools. Today our focus is on data minimization, at ...
Read More

Secure Remote Privileged Access for Your Vendors’ Technicians

Many organizations depend on a variety of external vendors to support their IT infrastructure, network and systems. In many cases, they overlook remote third-party access as a privileged access point that requires narrow security controls. “Most organizations granting remote privileged ...
Read More