Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why You Should Rethink Routinely Changing Your Password

Tip of the Week: Why You Should Rethink Routinely Changing Your Password

One of the main ways to keep an account’s credentials secure is by changing them consistently. However, we ran across an article recently that plays “devil’s advocate” on the password security issue, and they made some fair points about how changing passwords too frequently can lead to decreased security as a whole.

Continue reading

Tip of the Week: How to Let a Friend Use Your PC Without Compromising Your Data

b2ap3_thumbnail_guest_account_400.jpgWe’ve all been in a situation where you’re asked by someone if they can use your personal computer for whatever reason; checking their social media, email, or just browsing the Internet. Some people, however, also want to protect their privacy, and allowing relatives to use your own account can become problematic. A quality solution to this issue is to create a guest account.

Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Hackers Google Backup Malware Hosted Solutions Microsoft Software Data Windows 10 Innovation Internet User Tips Mobile Devices Network Security Smartphones Business Email Browser Hardware Tech Term Efficiency Disaster Recovery Smartphone VoIP Productivity Computer Business Continuity Data Backup IT Services Workplace Tips Ransomware Miscellaneous Productivity Android Cybercrime Business Management communications Office Chrome Automation Alert Data Recovery Windows Outsourced IT Cloud Computing Network Save Money Communication Upgrade Artificial Intelligence Server Telephone Systems Computers Router Managed IT Services Managed IT Services Internet of Things Money Social Media Law Enforcement Virtualization Small Business Quick Tips Windows 10 Facebook Collaboration How To IT Support Office Tips Office 365 Passwords App Applications Cybersecurity Wi-Fi Spam Password Health Social Engineering Holiday Remote Computing Word BDR Google Drive Two-factor Authentication Bandwidth Bring Your Own Device Gadgets Gmail Information Operating System Work/Life Balance Mobile Device Management Mobile Device Settings History Connectivity Entertainment Hacking Marketing Data Security Networking Keyboard Sports Flexibility Encryption Application Safety Data Breach Data Management Recovery VPN Mobility Vulnerability Apps Voice over Internet Protocol Phishing Managed Service Private Cloud Mouse Managed Service Provider Scam HaaS Data Protection Microsoft Office Retail Content Management Robot Government Data Storage DDoS Machine Learning Avoiding Downtime Best Practice Public Cloud Downtime IT Support Telephone System Comparison Fraud Big Data Spam Blocking Blockchain IT Management Google Docs User Error Social Physical Security Electronic Medical Records Access Control Budget Data storage End of Support Charger Telephony IT Plan Website Wearable Technology Cleaning PDF Windows 7 Remote Monitoring Firewall Employer-Employee Relationship Managed IT Business Intelligence Human Resources Saving Money Unsupported Software Servers Hiring/Firing Update Meetings YouTube Legal OneNote Botnet Black Market Patch Management Battery Identity Theft USB Redundancy Software as a Service CES eWaste The Internet of Things Infrastructure Paperless Office Internet Exlporer Virtual Assistant Mobile Computing Training BYOD Credit Cards Laptop Troubleshooting Wireless Supercomputer Sync Shortcuts Enterprise Content Management Computer Accessories Search MSP WiFi Environment Tip of the week Microchip Telecommuting NarrowBand Password Manager Video Games Conferencing Root Cause Analysis Inventory Maintenance Politics Television Wireless Charging Wireless Internet Transportation Samsung Computer Fan Digital Signature Vendor Management Computing Infrastructure Camera Devices Touchpad Vendor Password Management Bluetooth How to File Sharing Uninterrupted Power Supply Public Computer Windows Server 2008 Search Engine Distributed Denial of Service Wireless Technology Business Mangement Scalability Emails People Hybrid Cloud Cortana Wire Benefits Leadership FENG Value Accountants Programming Biometrics Content HBO Specifications Amazon Thought Leadership Books Current Events Windows 10s Display HIPAA NIST Customer Relationship Management Apple Augmented Reality Experience Bing Chromecast Recycling Save Time Instant Messaging Data loss Mobile Office Authentication Google Apps Smart Office Monitor Notifications Audiobook Internet exploMicrosoft SaaS Users Outlook Warranty Tech Support Amazon Web Services Emergency Knowledge Skype Security Cameras Cryptocurrency Customer Service iPhone Worker Remote Worker Shortcut Music Information Technology Automobile Flash Help Desk Criminal Social Networking Relocation Screen Mirroring Remote Work Nanotechnology Workers Document Management Reputation Smart Technology Practices Advertising Virtual Reality Frequently Asked Questions Printer Millennials Running Cable Shadow IT Online Shopping Addiction IT solutions Techology Network Congestion Solid State Drive Start Menu Hacker Staff Safe Mode Fax Server Rootkit Software Tips Wiring Multi-Factor Security Smart Tech Going Green IBM Streaming Media HVAC Humor Employer Employee Relationship Netflix Cast Computer Care Excel Administrator Workforce Customers Two Factor Authentication webinar Travel Hosted Computing Risk Management Assessment Worker Commute Evernote Cache IT Consultant Audit Tools Smartwatch Lithium-ion battery Files Education Unified Threat Management Trending Thank You Congratulations Company Culture Compliance Printers Managing Stress Webinar Regulation Twitter IT solutions CrashOverride