Hawaii Tech Support Blog

Hawaii Tech Support has been serving the Hawaii area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Phishing is a Threat, Even By Phone

Phishing is a Threat, Even By Phone

Telework has become crucial for businesses to sustain themselves right now, as remote work became a hard and fast requirement in the face of the coronavirus. However, if businesses aren’t careful, they could trade one issue for another in exposing themselves to security threats.

0 Comments
Continue reading

New Cyberattack Targeting Remote Workers

New Cyberattack Targeting Remote Workers

Since the onset of the coronavirus, many businesses have managed to sustain themselves through remote work—also commonly known as telework. While this strategy has allowed quite a few businesses to survive, it has also opened them up to security threats. Here, let’s focus on one such threat: vishing, or voice phishing.

0 Comments
Continue reading

Will We Soon Leave Passwords Behind?

Will We Soon Leave Passwords Behind?

If I were to tell you that one variable was responsible for more than 80 percent of cyberattacks, what would you guess that variable was? If you guessed “stolen access credentials,” you’d be correct. The traditional username/password combination may soon be a thing of the past as more tech companies transition to alternative authentication measures.

0 Comments
Continue reading

Are VPNs Really Secure?

Are VPNs Really Secure?

We’ve not been shy about promoting the use of VPNs (virtual private networks) as a means of protecting your security while you are online. However, we wanted to take a bit of time to specify what a VPN can - and cannot - do to help you.

0 Comments
Continue reading

Comparing the Relative Danger of AI-Aided Crimes

Comparing the Relative Danger of AI-Aided Crimes

When we think of cybercrime, most people’s minds go to one of two places. On the one hand, some think about the annoying, misspelled emails that are so obviously scams, while on the other, we can’t help but think about the hacks that we see in movies, where a criminal manages to overcome the best the government can incorporate into their defenses.

0 Comments
Continue reading

Ransomware is Still a Major Threat

Ransomware is Still a Major Threat

Ransomware is the scariest type of malware out there. It can have a myriad of negative effects on a business, yet it seems to still be on the fringe of the mainstream. Today, we thought we would give somewhat of a refresher course on ransomware. 

0 Comments
Continue reading

Your VPN Might Not Do its Job if You Don’t Keep it Updated

Your VPN Might Not Do its Job if You Don’t Keep it Updated

Small business owners are always on the lookout for that “special something” that will bring added value to their offering. In 2020, with COVID-19 sticking around, it has been difficult for businesses to commit to any new investments. To keep revenue coming in, a lot of businesses have been forced into allowing their staff to work remotely. To make this work, many have rolled out VPN for their business, but seemingly like everything else, there are very serious risks about leaning too heavily on your VPN. Let’s take a look at some of these risks.

0 Comments
Continue reading

Do You Know How to Build Solid Passwords?

Do You Know How to Build Solid Passwords?

The password is the core element of both data security and user authentication. This makes the construction of them extremely important to protecting digital assets. Unfortunately, not everyone understands how to construct passwords that actually work to protect the information on the other side. Today, we will discuss how to build a solid password that works to keep your digital resources safe.

0 Comments
Continue reading

Employment Scams Have Recently Exploded

Employment Scams Have Recently Exploded

With COVID-19 creating an unsure situation for so many businesses, and by extension their employees, these employees are suddenly finding themselves in a vulnerable position. Regardless of whether or not your employees are able to come into the office right now, it is important that you share the following information with them, as it may help to keep them out of a tough spot.

0 Comments
Continue reading

What We Can Learn from Some Foreboding Security Predictions

What We Can Learn from Some Foreboding Security Predictions

With the COVID-19 crisis far from over, many businesses have had their attention pulled away from their cybersecurity needs by the concerns that the current health crisis has generated. Here, we’ll be reviewing some of the observations that a group of 273 cybersecurity professionals have made, courtesy of an annual survey.

0 Comments
Continue reading

Reopen Your Business with Confidence

Reopen Your Business with Confidence

As the COVID-19 pandemic rolls on, many businesses continue to operate remotely with an eye toward reopening their office soon. Today, we thought it would be a perfect time to go over a couple of things that small business owners will need to address as people begin coming back into the workplace. 

0 Comments
Continue reading

Why You Need to Audit Your Security

Why You Need to Audit Your Security

A security audit is designed to test the overall integrity of your business when it comes to its IT security. In today’s environment, businesses need to have strengthened fortifications in place to protect themselves from cyberthreats, and these fortifications need to be properly tested and reviewed over time. Let’s talk about some of the types of audits and their benefits, and how you can assess your security.

0 Comments
Continue reading

What We Can Learn from the 2020 Data Breach Investigations Report

What We Can Learn from the 2020 Data Breach Investigations Report

Starting in 2008, Verizon has produced a report outlining the cybersecurity incident trends that the previous year demonstrated. In doing so, they have provided a resource that gives businesses greater insights into where their cybersecurity efforts need to be focused. Let’s go over some of 2019’s trends and insights that were highlighted in the Verizon Business 2020 Data Breach Investigations Report (DBIR).

0 Comments
Continue reading

Where Is All of Your Data?

Where Is All of Your Data?

Quick question. If I were to ask you, on the spot, to tell me where all of your company data is, right this moment, could you tell me with absolute confidence? What if I could prove you wrong?

0 Comments
Continue reading

The Importance of Secure Conferencing

The Importance of Secure Conferencing

Conferencing has been an important tool for businesses as stay-at-home orders have moved their operations out of the office and into worker’s homes. While there are dozens of video conferencing solutions on the market, businesses should consider security just as much as they consider functionality. Today, we’ll take a look at security for your company’s conferencing solutions.

0 Comments
Continue reading

The Definitive Guide on Password Best Practices

The Definitive Guide on Password Best Practices

Protecting your online accounts, your data, and your customers’ information is now more important than ever. Industry and state-mandated compliances are now forcing businesses to tighten their cybersecurity, and it’s critical that every human being on the Internet take their own personal security seriously. This guide is designed to provide the best practices for strong passwords.

0 Comments
Continue reading

What You Need to Consider to Securely Permit Remote Work

What You Need to Consider to Securely Permit Remote Work

At any given time, a business needs to consider its security, but this need only exacerbates when its employees are working remotely. With the coronavirus pandemic still in play, the likelihood is that your employees are in this situation has risen dramatically. In order to maintain  your organizational security, you need to consider the many factors that a remote workforce can introduce.

0 Comments
Continue reading

Let’s Look at the Different Types of Ransomware

Let’s Look at the Different Types of Ransomware

The growing popularity of ransomware has been disconcerting to many IT professionals, particularly due to the different tactics that this malware variant has been spotted utilizing. In order to protect your business from these attacks, it helps to know how they work. We’ve put together a beginner’s field guide to ransomware types to help you identify (and hopefully avoid) it.

0 Comments
Continue reading

How to Talk Tech with People That Don’t Know About IT

How to Talk Tech with People That Don’t Know About IT

Businesses are looking to technology more than ever in a constant attempt to improve productivity and efficiency. One problem that some businesses face is that their staff isn’t exactly technologically savvy, making them difficult to communicate with about technical concepts. This month, we aim to help you do a better job of communicating with those workers who don’t know much about technology.

0 Comments
Continue reading

The Security Questions Surrounding Cloud Solutions

The Security Questions Surrounding Cloud Solutions

All types of businesses use cloud resources as a part of their IT infrastructure. It allows them to turn what was once a major capital expenditure into a controllable operating cost; and, it does it while offering solutions to almost any business problem. The one drawback that most IT professionals agree on is how to gain enough control over a cloud platform to ensure that the platform is secure. 

0 Comments
Continue reading

Latest Blog

While it may sound strange coming from a managed service provider, there is some wisdom to the adage, “if it ain’t broke, don’t fix it.” We know, we know… it sounds a little hypocritical for us to say something like this, when we spend so m...

Contact Us

Learn more about what Hawaii Tech Support
can do for your business.

Hawaii Tech Support
PO Box 17159
Honolulu, Hawaii 96817

Account Login