Hawaii Tech Support Blog

Stanley Lau is the founder of Hawaii Tech Support. With nearly 20 years of experience in IT and consulting, Stan first helps businesses understand their technology needs then implements the best solution. Stan holds a Bachelor of Science in Computer Science and Engineering from UCLA.

March Brings A Lot of IT Awareness

March Brings A Lot of IT Awareness

Sometime recently, novelty holidays have popped up for almost anything. Many of which just aim to celebrate the things about our lives that make life worth living. Take any random day, like May 12. There are a half-dozen “holidays” that day: National Limerick Day, National Odometer Day, National Nutty Fudge Day, National Fibromyalgia Awareness Day, National Receptionists’ Day, and National Third Shift Workers Day. So, May 12 runs the gamut of human existence. 

0 Comments
Continue reading

Tip of the Week: The Different Options for Powering Down Windows

Tip of the Week: The Different Options for Powering Down Windows

While your attention is likely more dedicated to how you use your computer while it’s on, it is just as important to consider the different ways that you can turn your computer off, in a manner of speaking. The varied options present in the Start menu will each have their own effect, so it is important to be aware of what these differences are. Let’s review what each option does so that you’ll be able to use them more appropriately.

0 Comments
Continue reading

What You Need to Know About Managed IT Services

What You Need to Know About Managed IT Services

Working in technology can be illuminating. We constantly are coming across situations that we’ve never seen before. Sometimes this is the result of how fast technology moves, and sometimes it has to do with a business’ IT strategy; but, regardless of the issues we are asked to fix, we realize that without our clients, we’d be nothing. That’s why we decided to discuss some of the variables that every business owner should know about managed IT services.

0 Comments
Continue reading

Blockchain Technology is Advancing Health Technology

Blockchain Technology is Advancing Health Technology

Healthcare is a hot-button issue regardless of where you live. As a result you’d think that the industry would be one of the first to implement new information technology. Unfortunately, the healthcare industry has sometimes lagged behind other industries on the deployment of new IT tools. One technology that is being used in the development of new IT tools for healthcare is blockchain. Let’s discuss how blockchain technology is being utilized and how it can change the face of patient care going forward.

0 Comments
Continue reading

Be Mindful of Your Internal IT Security

Be Mindful of Your Internal IT Security

With all the threats covered in mass media nowadays, it can be too simple to get the mistaken impression that the biggest threats to your business are all external. We’re telling you right now that plenty of vulnerabilities first come from inside your business, both creating significant dangers independently and simplifying the job for external threats as well. Let’s go over a few of the dangers that could originate from inside your business itself.

0 Comments
Continue reading

Pros and Cons of Biometric Security

Pros and Cons of Biometric Security

A lot has been made about biometric authentication over the past decade, so much so that it has been loosely integrated into a lot of the access control mechanisms on most modern mobile devices. Fingerprint scanners, retina scanners, and facial recognition are all part of the transition to biometrics to enhance security and privacy. For modern businesses, however, implementing biometrics can have some major drawbacks. Today, we will go over the pros and cons of biometric authentication.

0 Comments
Continue reading

Solid Leadership Will Take Your Business Places

Solid Leadership Will Take Your Business Places

Many small business owners are in a very tough position. Not only have they had to navigate months of government-mandated limitations, health scares, and rising vendor prices, they also don’t have any definitive answers to when this whole period might be over; and, what a new normal will look like when it is. For these reasons it is crucial that an organization has solid leadership in place. 

0 Comments
Continue reading

Tip of the Week: Keep Your Gmail Messages Private

Tip of the Week: Keep Your Gmail Messages Private

Gmail has proven to be as secure as most other email platforms, but email is email and there are times when you send an email that isn’t opened promptly and you’d rather not have the information in that message get sent around or archived where you can’t control it. Now Gmail has added a feature that allows users to send messages that will delete themselves in a predetermined time frame, and work to keep the contents of those messages from being shared. Let’s take a look at them today.

0 Comments
Continue reading

Test Your Backup Before You Regret Not Doing It

Test Your Backup Before You Regret Not Doing It

If there is one thing that you could take away from our blog it is that data backup is an integral part of any business continuity strategy. Unfortunately, there are so many different parts to it that it’s not surprising some data could slip through the cracks if not maintained properly. If you’re not actively taking measures to keep disasters from derailing your business’ progress, you stand to lose more than some data. Let’s take a look at some of the critical parts of a data backup and disaster recovery process and why it is essential to give them a test regularly. 

0 Comments
Continue reading

Have You Prepared Your Employees to Catch Phishing Attempts?

Have You Prepared Your Employees to Catch Phishing Attempts?

While it initially sounds promising to hear that the number of data breaches seen last year went down significantly, it is important to recognize that the number of data records leaked as a result more than doubled. One clear cause was the resurgence in the use of the underhanded malware variety known as ransomware. With this suggesting an increased threat of ransomware incoming, can you confidently say that your business’ team is ready to deal with it?

0 Comments
Continue reading

What Bases Should a BDR Cover?

What Bases Should a BDR Cover?

As much as you hope it will not happen to your business, a disaster could very well strike at any time—statistics have shown as much to be true. To remove some of the risks associated with disasters and the data loss they lead to; we recommend that you implement BDR into your business continuity strategies.

0 Comments
Continue reading

Are Apple Devices Immune to Threats? Don’t Bet On It

Are Apple Devices Immune to Threats? Don’t Bet On It

For a very long time, Apple has been requested to share a workaround for their platform security with law enforcement, which the company has refused outright. Their argument has been that doing so would inherently undermine their lauded security. Well, the feds have given up asking, because they went ahead and developed a workaround themselves… and in doing so, have revealed that iOS isn’t quite as secure as it was purported to be.

0 Comments
Continue reading

Improving Society Through Technology

Improving Society Through Technology

Ask someone what they think social media has done for society, and you will likely hear a series of complaints about how it is the driving force behind the most divisive period in human history. While their perspective is interesting, it is also wrong. Today, we thought we would take a look at how some of today’s most controversial technologies are working to improve society. 

0 Comments
Continue reading

Tip of the Week: Use Confidential Mode in Gmail to Feel Like a Secret Agent (or Secure Your Emails)

Tip of the Week: Use Confidential Mode in Gmail to Feel Like a Secret Agent (or Secure Your Emails)

Gmail is as secure as any comparable email platform, but there may be some messages you send that you’d rather not have hanging around in someone’s inbox. However, did you know that Gmail enables you to send messages that delete themselves after a set timeframe… while also preventing the contents from being forwarded, downloaded, copied, or printed?

0 Comments
Continue reading

Some IT Changes Can Be Problematic for Your Business

Some IT Changes Can Be Problematic for Your Business

The realities of the past year have made some businesses look to adjust their operational strategies. Many businesses that are, look to technology deployments as a way to make these adjustments. If the deployments don’t go as planned, however, it can have a major impact on business operations.

0 Comments
Continue reading

How You Can Use Workflow Automation to Make the Office Better

How You Can Use Workflow Automation to Make the Office Better

While a lot of the focus on any business’ use of technology may be on its front-facing solutions, there’s a lot to be said about the technology solutions that power these businesses behind the scenes. Let’s consider a few ways that businesses are benefiting from automating some of these background processes.

0 Comments
Continue reading

Prioritizing Security with Your Messaging Apps

Prioritizing Security with Your Messaging Apps

If you asked your average person whether they are okay with their personal information being taken and used by businesses, you’d probably come across quite a bit of dissent. Ironically, it seems that people will give it right over via social media programs, but you are beginning to see some pushback when using apps. WhatsApp, the messaging app owned by Facebook, that is known for end-to-end encryption, has told users that they will soon be forced to share their personal data with Facebook.

0 Comments
Continue reading

What Should We Expect the Workplace to Look Like After COVID-19?

What Should We Expect the Workplace to Look Like After COVID-19?

With numerous vaccines now being deployed, it finally seems that there is an end to the COVID-19 pandemic at some point in the future. While we still have some ways to go, it would be helpful to look ahead and plan for how we can implement some of the lessons this period has taught us—especially in the workplace.

0 Comments
Continue reading

Helpful Features Found in Google Docs

Helpful Features Found in Google Docs

Within Google Workspace is Google Docs, a useful word processing solution that can be accessed through your web browser. In case you’re new to using Google’s productivity software, we have decided to assemble a short introduction to some of Google Docs’ most useful tools and features.

0 Comments
Continue reading

Backup Is a Critical IT Function

Backup Is a Critical IT Function

Businesses generate and collect a huge amount of data and some of it is practically useless. Other files, however, are critical to your business and operations. The important files require redundancy. This is why it is important to back up your data. 

0 Comments
Continue reading

Latest Blog

While your attention is likely more dedicated to how you use your computer while it’s on, it is just as important to consider the different ways that you can turn your computer off, in a manner of speaking. The varied options present in the...

Contact Us

Learn more about what Hawaii Tech Support
can do for your business.

Hawaii Tech Support
PO Box 17159
Honolulu, Hawaii 96817

Account Login