Hawaii Tech Support Blog

Stanley Lau is the founder of Hawaii Tech Support. With nearly 20 years of experience in IT and consulting, Stan first helps businesses understand their technology needs then implements the best solution. Stan holds a Bachelor of Science in Computer Science and Engineering from UCLA.

SMBs are Embracing Cloud-Hosted Technology

SMBs are Embracing Cloud-Hosted Technology

The cloud has helped many businesses push beyond their limits, but is your organization taking advantage of it? Depending on the needs of your specific business, the cloud can benefit your organization in ways you could never dream of just 20 years ago. We’ll go through some of the best ways the cloud can help your organization.

0 Comments
Continue reading

Today’s Small Businesses Lean Heavily on Remote Workers

Today’s Small Businesses Lean Heavily on Remote Workers

Were you among the 55.3 percent of employees who took their work devices on the road during this past holiday season? Chances are that if you have employees who find it difficult to complete their duties in the office, they’ll take it home with them over the holidays to make sure they don’t fall behind. Yet, they could potentially be exposing important data to risk, even if it means getting a little bit of work done here and there in the meantime.

0 Comments
Continue reading

Products as a Service is a Big Part of IT Deployment

Products as a Service is a Big Part of IT Deployment

Nowadays, businesses take advantage of so many solutions that it can be challenging just to keep them all in line, let alone managing and maintaining them all. Of course, the most difficult part of using so much technology is affording it. While you could certainly invest in software licenses for each and every one of you users’ systems, there is an alternative that you should certainly consider.

0 Comments
Continue reading

Threats 101: Danger on Your Network

Threats 101: Danger on Your Network

While modern security solutions have made great strides to protect businesses, there are still a lot of threats out there that can create problems for your organization. If you don’t take a proactive stance on security, you could potentially expose your network to incoming threats of all kinds. We’ll help your business understand what threats are out there, why they are dangerous, and what you can do to keep your organization secure.

0 Comments
Continue reading

Here’s How Companies Struggle with IT Security

Here’s How Companies Struggle with IT Security

No business can be successful if it’s constantly suffering from data breaches. Therefore, you should take measures to mitigate the issues caused by these threats before they present themselves. Here are four of the biggest issues your business could face in the field of network security.

0 Comments
Continue reading

Businesses Utilizing Cloud-Hosted HR and Payroll

Businesses Utilizing Cloud-Hosted HR and Payroll

Cloud computing can be used for many things, and nowhere is this more true than in the business environment. Organizations of all shapes and sizes use the cloud to keep operations moving forward. Some have even moved their entire human resources and payroll departments into the cloud. We’ll help you decide if this is the right approach for your organization.

0 Comments
Continue reading

Managed IT Services Delivers Substantial Value

Managed IT Services Delivers Substantial Value

One of the best reasons to implement managed IT services is the value it presents for your business compared to the alternatives. Businesses may have once depended on unreliable and expensive services to keep their IT up and running, but nowadays, it’s more efficient and, in most cases, more affordable than ever before. We’ll explain how managed service providers can create value opportunities for your business.

0 Comments
Continue reading

How Should You Invest in the Cloud?

How Should You Invest in the Cloud?

Hosted solutions are used in modern business practices for a variety of reasons, but by far the most common reason is because the business doesn’t necessarily have the staff or resources to take care of the solution in-house. The process of implementation will vary by business, but we can walk you through the process nonetheless, including building the solution, renting the solution, and buying the hosting space.

0 Comments
Continue reading

2018’s Cybersecurity Update

2018’s Cybersecurity Update

Cybersecurity has changed considerably since 2017, and any business that wants to survive in the evolving online environment needs to consider how they are protecting their assets. We want to take a look at precisely how cybersecurity has changed since 2017, including some of the notable statistics regarding the current state of online threats for today’s businesses.

0 Comments
Continue reading

3 Ways Email Encryption Keeps Your Messages Safe

3 Ways Email Encryption Keeps Your Messages Safe

Defining Encryption Encryption means that your data is scrambled in a way that obscures it from just anyone viewing it. What this means for email is that only the intended recipient can decrypt it, preventing those who might try to intercept it from being able to read it. For business email, this is particularly helpful.

0 Comments
Continue reading

What Does Your Technology Roadmap Look Like for 2019?

What Does Your Technology Roadmap Look Like for 2019?

A technology roadmap is a key asset to use when planning your business for the near future. IT is volatile and demands that you always think ahead, so if you want to make sure technology doesn’t become a major pain point for your organization, it’s best to start thinking ahead. We’re here to help you get started thinking about how your business technology should change and adapt over the course of 2019.

0 Comments
Continue reading

Tip of the Week: Extremely Useful Word Tips

Tip of the Week: Extremely Useful Word Tips





Microsoft Word is one of those computer applications that has so many tricks hidden in it that you constantly have opportunities to show off how much you’ve learned. These skills could make or break your job performance under the right conditions, and if you know how to use them efficiently, they can help you save your job if it’s in peril.

0 Comments
Continue reading

Bing Offers Malware and Filth

Bing Offers Malware and Filth

With a meager market share that is one-third the size of Google’s, one would think that Bing would be trying to keep controversy away from a user’s search results. However, the Microsoft search engine has recently encountered a few notable PR disasters that may be enough to convince some not to use it - especially if it leads to a security breach.

0 Comments
Continue reading

Are You Prepared to Weather Any Disaster?

Are You Prepared to Weather Any Disaster?

Do Your Research All disaster scenarios demand that you’re prepared with a business continuity plan, but the degree to which a business is susceptible to a natural disaster can vary by geographical location. Not all businesses will be vulnerable to hurricanes, for example, but there are countless other scenarios that could complicate things for your business. The statistics say that 30 percent of all downtime is caused by environmental factors, which includes anything from flooding and hurricanes to a little bit (or a lot of) humidity or extreme weather.

0 Comments
Continue reading

Tip of the Week: Who Should Have Admin Accounts?

Tip of the Week: Who Should Have Admin Accounts?

Why is an Admin Account Such a Big Deal? An administrator account is basically the highest level of privilege that you can give to someone on your network. Compared to the traditional user account, an admin account can do much, much more--and this isn’t necessarily a good thing. Keeping more traditional accounts than administrator accounts is a best practice because it minimizes risk to your network. This keeps an ordinary user from making drastic changes to a network, like installing software or moving important files around.

0 Comments
Continue reading

What Could Possibly Be Wrong with Your Computer?

What Could Possibly Be Wrong with Your Computer?

Try Turning it Off and On In a lot of ways, a computer is kind of like the human brain. If you don’t give it some rest every so often, it starts to grow sluggish. Imagine a good, proper reboot is a good night’s sleep for your computer, giving it a chance to restart functions that have been constantly going for the past several days. First, save any open files you’re working on. Next, click or tap on the Windows symbol in the Start menu, select the power icon, and hit Restart.

0 Comments
Continue reading

The Internet of Things Continues to Expand

The Internet of Things Continues to Expand

A Brief Review of the IoT An Internet of Things device tends to have its typical functionality along with additional connection to the Internet. The only real caveat is that the device needs to not be something that would ordinarily have Internet connection as its primary function. Consider fitness devices like watches that can send data to your phone for easy viewing, as well as devices like Amazon Echo that can help you control your home with voice commands.

0 Comments
Continue reading

Technology Basics: Accessory

Technology Basics: Accessory

Accessories may have been a major part of using a computer in the past, but smartphones and tablets have changed the name of the game, so to speak. Accessories still make up a large portion of the costs associated with purchasing a computer, but what exactly constitutes an accessory?

0 Comments
Continue reading

A Busy Staff Isn’t Always a Productive Staff

A Busy Staff Isn’t Always a Productive Staff

Idle Time in the Office The study conducted by the Harvard Business School showcased that employers lose $100 billion each year to time spent by employees remaining idle in the office. Even the researchers were shocked by the sheer magnitude of this number. Professor Teresa Amabile and Professor Andrew Brodsky expected significant loss from idle time, but were floored by the actual sum.

0 Comments
Continue reading

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Google’s Making Changes to Chrome, and Not Everyone’s Happy

Chrome 70 is yet another example of how divisive technology has the potential to be. On the one hand, a few of the changes have people excited about some clear benefits to security, but others worry that Chrome will no longer be as secure or as user-friendly. We’ll review some of the changes coming with Chrome 70, so you can decide for yourself.

0 Comments
Continue reading

Latest Blog

No business can be successful if it’s constantly suffering from data breaches. Therefore, you should take measures to mitigate the issues caused by these threats before they present themselves. Here are four of the biggest issues your busin...

Contact Us

Learn more about what Hawaii Tech Support
can do for your business.

Hawaii Tech Support
PO Box 17159
Honolulu, Hawaii 96817

Account Login