Hawaii Tech Support Blog

Hawaii Tech Support has been serving the Hawaii area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Training is Crucial to Establishing a Security Strategy

Training is Crucial to Establishing a Security Strategy

Cybersecurity is one of those components to an IT strategy that is absolutely critical; you cannot ignore it in today’s age of ransomware and other high-profile hacks. In order to make sure that you are prepared to handle anything that comes your way, you must periodically test your security practices and assess how well your team can prepare for attacks. The question remains as to how often you should do this.

0 Comments
Continue reading

What You Need to Do If Your Business is Hacked

What You Need to Do If Your Business is Hacked

Few things are scarier for a modern business to consider than the idea that they will be hacked, regardless of that business’ size or industry. After all, hacking can, will, and does cause significant damage across basically all aspects of your organization. This is precisely why it is so important that—should a business be hacked—the proper steps are taken in response.

0 Comments
Continue reading

Be Mindful of Your Internal IT Security

Be Mindful of Your Internal IT Security

With all the threats covered in mass media nowadays, it can be too simple to get the mistaken impression that the biggest threats to your business are all external. We’re telling you right now that plenty of vulnerabilities first come from inside your business, both creating significant dangers independently and simplifying the job for external threats as well. Let’s go over a few of the dangers that could originate from inside your business itself.

0 Comments
Continue reading

Cybersecurity Can’t Be Based on Luck

Cybersecurity Can’t Be Based on Luck

Over a quarter of all data breaches happen to small businesses. The cost of a data breach is really prohibitive to your business’ operational and financial health. To keep your business’ data and infrastructure free of threats and relatively secure, small businesses will need a combination of useful technology tools and well-designed strategies. Let’s take a look at several steps your small business can take to secure itself from digital theft.

0 Comments
Continue reading

The Current State of Cybercrime Paints a Grim Picture for Businesses

The Current State of Cybercrime Paints a Grim Picture for Businesses

Over the past year, entrepreneurs have focused on how to do business during the global COVID-19 pandemic. The public health crisis has been an opportunity for fraudsters and hackers, and the result has been an increase in losses (compared to the second-worst period on record) by over 50 percent. Let’s consider the situation, and how it is—unfortunately—getting worse.

0 Comments
Continue reading

How Cybercriminals Are Keeping Themselves Entertained

How Cybercriminals Are Keeping Themselves Entertained

With the given pandemic, a lot of people have had a bit more time on their hands, so it makes sense that many are turning to streaming services and the like for their entertainment. Unfortunately, this has not gone unnoticed by cybercriminals.

Let’s take a few moments and examine the practice of credential stuffing.

0 Comments
Continue reading

What Are the Biggest Cybersecurity Concerns Going into 2020?

What Are the Biggest Cybersecurity Concerns Going into 2020?

Cybersecurity should always be a priority for a business, and cyber criminals are always evolving their tactics. As a result, it pays to keep an eye on the horizon for the next looming threats. Here, we’re reviewing a few threats that cybersecurity professionals say that businesses should be concerned about in the near future.

0 Comments
Continue reading

Automation Plays a Critical Role in Cybersecurity

Automation Plays a Critical Role in Cybersecurity

Automation is sometimes misconceived as a troublesome or unreliable addition to business. It’s not about replacing people with machines, it’s about getting more done with the people you have. Having an attitude that doubts technology and believes nothing can replace human processing can quickly put you at a disadvantage compared to your competitors.

0 Comments
Continue reading

Basic Cybersecurity Practices to Minimize Risk

Basic Cybersecurity Practices to Minimize Risk

With cybersecurity talent at such a critical shortage, data breaches that expose millions of people’s sensitive information are routine occurrences. It is one of the biggest problems that the modern business faces. Since shortages have businesses of all types scrambling for cybersecurity personnel we thought we’d put together a list of five things that every person should know about how to keep systems secure. 

0 Comments
Continue reading

Why is URL Manipulation a Security Concern?

Why is URL Manipulation a Security Concern?

If you’ve spent any time using a computer, you probably know what a URL is. It is the address of a website. It typically starts with “http//:” or “https://” and directs the Internet browser on where the user would like to surf. Nowadays a threat could be created by manipulating the URL. Today, we’ll take you through this threat. 

0 Comments
Continue reading

Expansion of Remote Work

Expansion of Remote Work

Is your business equipped with the necessary tooling to adopt remote working strategies? Remote workers have an incredible amount of benefits to contribute to your business’ operations. Remote work is not possible without a well-thought-out strategy. Today, we’ll review what your business needs in order to capitalize on remote workers. 

0 Comments
Continue reading

What Companies Need to Do to Seriously Thwart Cyberattacks

What Companies Need to Do to Seriously Thwart Cyberattacks

If you don’t think that your business is under attack from the Internet, you’re likely to be running an organization that will be decimated by a cyberattack. If you want to avoid this scenario, you will have to be prepared to do what you can to keep it safe. This entails following some strict rules and being smart about where and when to deploy security checkpoints. We looked at what today’s cyberattack entails and what an organization needs to do in order to keep the threats that are bandying about from having a marked effect on your business.

0 Comments
Continue reading

Lunch & Learn: Cybersecurity Hygiene for Business Owners

hooded-computer-hacker-stealing-information
Hawaii Tech Support is hosting a “Cybersecurity Hygiene for Business Owners” Lunch & Learn at Dave & Buster’s at 1030 Auahi St. Honolulu from 11:30am – 1pm on Thursday, April 25, 2019.
0 Comments
Continue reading

2018’s Cybersecurity Update

2018’s Cybersecurity Update

Cybersecurity has changed considerably since 2017, and any business that wants to survive in the evolving online environment needs to consider how they are protecting their assets. We want to take a look at precisely how cybersecurity has changed since 2017, including some of the notable statistics regarding the current state of online threats for today’s businesses.

0 Comments
Continue reading

HTS Hosts "The Business Owner's Guide to Cybersecurity Hygiene" Brunch & Learn

HTS Hosts "The Business Owner's Guide to Cybersecurity Hygiene" Brunch & Learn

Did you know that 28% of Incidents and Data Breaches are attributed to staff or others INSIDE an organization according to Verizon’s 2018 data breach report? Are you aware of what type of data your employees are accessing and what it's being used for? In today's climate of constant cyber threats, you can't afford to be complacent. This course is a part of Hawaii Tech Support’s Educational Brunch & Learn series, designed exclusively for business owners. Join us for a scrumptious breakfast at The Pacific Club and discover best practices & cybersecurity tools on how to protect your business.

Continue reading

Business Owner’s Guide to Cybersecurity Hygiene

Business Owner’s Guide to Cybersecurity Hygiene

Hawaii Tech Support Hosts July 27th “Business Owner’s Guide to Cybersecurity Hygiene” at Pacific Club 8am-9:30a.m.

Continue reading

Threats are Changing - Are You Prepared to Change with Them?

Threats are Changing - Are You Prepared to Change with Them?

Security is a part of business that is constantly changing and evolving. What worked ten years, five years, or even two years ago may not be relevant in today’s security environment. What are some of the major changes that your company can expect to see in the coming years? We’ll walk you through some of the ways that security will be changing in the foreseeable future, and what you can do about it.

Recent comment in this post
Ivan Doyle
The preparation is done for the movement of the strong elements for the humans. The idea of the fixation and uploading on https://... Read More
Monday, 03 December 2018 07:40
1 Comment
Continue reading

Using 2017's Examples to Maintain Network Security in the New Year

Using 2017's Examples to Maintain Network Security in the New Year
ns ib 1
ns ib 2

Network security is a crucial consideration for every single business, especially ones that utilize the Internet. There were a lot of negatives and some positives that came out of 2017 in regards to cybersecurity. Below we have listed some of the most troubling cybersecurity statistics collected in 2017, and we’ve followed it up with suggestions on how to keep your business safe in 2018.

0 Comments
Continue reading

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

Join us and the Hawaii Chamber of Commerce to learn about the latest threats, trends and best practices available in the cybersecurity arena to protect your company.  

September 6, 2017

11:30 am to 1:00 pm

Plaza Club

900 Fort Street Mall, 20th Floor


Member $38

Young Professional $35

Non-member $42

In February of 2016, President Barack Obama passed a Cybersecurity National Action Plan. The plan implemented near-term actions and developed a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, and maintain public safety. Taking action against cybersecurity now will assist with ensuring economic and national security, as well as empowering Americans to take better control of their digital security.

0 Comments
Continue reading

Cybersecurity: A National Threat to Businesses Big and Small

Cybersecurity: A National Threat to Businesses Big and Small

It’s been a busy summer for our team with client projects here at Hawaii Tech Support.  However, before the summer ended, we had the opportunity to head outdoors and challenge ourselves to go beyond our comfort zones.  Our team met eighteen challenge elements that had us climbing, swinging and jumping around, high above the ground on an aerial adventure challenge course. It was also a great Ohana building activity as this outing was open to our HTS families to take on the challenge as well. You can find more photos of our summer adventure on our Facebook page.

0 Comments
Continue reading

Latest Blog

Have you ever wondered what would happen if we reduced the number of hours in the work week or shaved off an hour here or there during the workday? The discussion of a reduced or shorter work week is a common topic in productivity circles, ...

Contact Us

Learn more about what Hawaii Tech Support
can do for your business.

Hawaii Tech Support
PO Box 17159
Honolulu, Hawaii 96817

Account Login