• hts-sung-brant-2013
  • hts-stan-pci-2013
  • hts-award-2013
  • hts-rob-2013

Hawaii Tech Support Blog

Hawaii Tech Support has been serving the Honolulu area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: We All Make Mistakes, but Try To Avoid These Computing Ones

Tip of the Week: We All Make Mistakes, but Try To Avoid These Computing Ones

Mistakes happen, especially where technology is involved. There are plenty of ways that user error can occur when using a computer--many of which are avoidable through simple preventative measures. For our tip this week, we’ll go over some behaviors to avoid when using a computer.

Continue reading
0 Comments

2017 Wrap Up

2017 Wrap Up

2017 started with a mission to improve our IT service and help our clients with new technologies. Over the last year, we refined our support operations to better support our clients and continue to improve on our service delivery. Hawaii Tech Support will go through major software upgrades in the next two months, improving the quality of information available to our technicians and clients and allowing us to better support our clients. Our help desk service will also roll out a new chat support feature that improves the time to resolve issues, helping our clients get back to work faster.

Continue reading
0 Comments

Hackers May Meet Their Match With AI

Hackers May Meet Their Match With AI

There are many organizations in the world that simply can’t have cybercriminals and hackers interfering with their data. One of these organizations, CERN (whose acronym translates to the European Laboratory for Particle Physics) has far too powerful of a computer grid to allow hackers to access it. To keep it safe, CERN has deployed what may be the future of cybersecurity: artificial intelligence.

Continue reading
0 Comments

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

A major vulnerability has been discovered that affects everyone that uses Wi-Fi. Key Reinstallation Attack, or KRACK, affects the core encryption protocol that most Wi-Fi users depend upon to shield their browsing from others, Wi-Fi Protected Access 2 (WPA2).

Continue reading
0 Comments

Leaks From Apple Show the Newest iPhones To Be A New Approach

Leaks From Apple Show the Newest iPhones To Be A New Approach

It seems hard to believe that the smartphone has been around for over a decade. When Apple rolled out the first iPhone in 2007, it triggered a momentous shift in the way people access information. Over the past 10 years these devices have gone from somewhat of a novelty to a staple of modern computing. More data is transmitted and accessed by smartphone than by any other means, and Apple has been at the forefront of this computing shift from its inception.

Continue reading
0 Comments

Sign Up For Our Newsletter

Mobile? Grab this Article!

QR-Code dieser Seite
Back to Top