Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Tech: Social Media

Know Your Tech: Social Media

You see the term “social media” thrown around all the time, but what does it mean for both individual users and whole businesses? Organizations that understand the importance of social media have a unique advantage over other businesses in the same industry, be it a way to attract more consumers or a way to protect against common security threats that find their home on these websites.

0 Comments
Continue reading

How Much Time Do You Spend on These Websites?

How Much Time Do You Spend on These Websites?

The Internet is massive. It’s simultaneously a never-ending shopping mall, the biggest library that you’ve ever seen, and movie theater. According to a study conducted by MIT, the average American now spends a full day of their week (24 hours) online...and that’s just an average. We all know people who are locked into the Internet from the moment they wake up and stay locked in until they go to sleep. Surprisingly, people only spend their time on a handful of the over 644 million websites that populate the Internet. Today we will take a look at the four most visited sites on the Internet and examine why users spend so much time visiting them.

0 Comments
Continue reading

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

While it’s a security best practice to keep strangers off of your Facebook account, you might feel that it’s understandable to accept an unknown request for the sake of networking or otherwise. This isn’t the ideal way to approach Facebook, but you do have a unique opportunity to allow users to view your profile and follow your public posts, without the need to accept a friend request.

0 Comments
Continue reading

In Case of Emergency, Activate Facebook’s Safety Check

In Case of Emergency, Activate Facebook’s Safety Check

In 2014, Facebook launched Safety Check, a helpful tool allowing users to “check in” that they’re okay during a crisis event, like a natural disaster, mass shooting, etc. Recently, Facebook made a major change to Safety Check by allowing users affected by the crisis to activate the feature. This is yet another example of how social media is changing the way people find out about major events and react to them.

0 Comments
Continue reading

Tip of the Week: A Step-By-Step Guide to Downloading Your Facebook Information

Tip of the Week: A Step-By-Step Guide to Downloading Your Facebook Information

The longer you use Facebook, the more personal content you hand over to the social media empire. Sharing content is what drives the social media experience, but what if you want your content back? Surprisingly, Facebook makes this easy.

0 Comments
Continue reading

Tip of the Week: 3 Facebook Security Tips to Protect You and Your Friends

b2ap3_thumbnail_facebook_security_400.jpgWith social media playing such an important role in everyone’s day-to-day lives, one has to wonder to what degree this affects the security of online accounts and profiles. Social media might have revolutionized the way we communicate with others, but it’s also revolutionized the way that hackers stalk their victims. How vulnerable are you and the people you love when it comes to your Facebook settings?

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Google Hackers Backup Malware Hosted Solutions Microsoft Network Security Mobile Devices Software Data Internet Windows 10 Innovation User Tips Smartphones Business Email Hardware Browser Tech Term Efficiency Computer Business Continuity Smartphone Disaster Recovery VoIP Productivity Miscellaneous IT Services Ransomware Workplace Tips Data Backup communications Productivity Android Cybercrime Business Management Office Chrome Alert Automation Windows Outsourced IT Cloud Computing Data Recovery Network Save Money Artificial Intelligence Managed IT Services Upgrade Server Telephone Systems Computers Managed IT Services Communication Router Internet of Things Windows 10 Money Law Enforcement Virtualization Social Media Cybersecurity Small Business Facebook Quick Tips Collaboration IT Support Office 365 Office Tips Passwords Applications App Wi-Fi Password Spam How To Social Engineering Holiday Health History Remote Computing BDR Google Drive Bandwidth Gadgets Information Bring Your Own Device Two-factor Authentication Gmail Word Operating System Work/Life Balance Mobile Device Mobile Device Management Settings Microsoft Office Connectivity Scam Hacking Entertainment Marketing Mouse Managed Service Provider Voice over Internet Protocol Vulnerability Flexibility Keyboard Safety Networking Sports Encryption Data Management Mobility Data Breach Application VPN Apps Recovery Data Security Phishing Managed Service Private Cloud Data Protection HaaS Training IT Plan Website Internet Exlporer Government Telephony Content Management Remote Monitoring Windows 7 Public Cloud Machine Learning Managed IT Best Practice Downtime IT Support Telephone System Business Intelligence DDoS Mobile Computing Retail Unsupported Software Fraud Robot Blockchain Update User Error Physical Security Access Control Big Data OneNote Botnet Data storage End of Support Electronic Medical Records Charger Wearable Technology Cleaning Social Redundancy PDF Budget Human Resources BYOD Firewall Employer-Employee Relationship Data Storage Servers Avoiding Downtime Meetings Legal Hiring/Firing Black Market Comparison YouTube Battery Saving Money IT Management Google Docs Identity Theft Patch Management Spam Blocking CES eWaste USB Infrastructure Paperless Office Virtual Assistant The Internet of Things Software as a Service Credit Cards Search IT Consultant Administrator Windows 10s Lithium-ion battery Laptop Wireless Enterprise Content Management Smartwatch Data loss Environment Inventory Video Games Troubleshooting Supercomputer Unified Threat Management Password Manager Computer Accessories Digital Signature Politics Television MSP Outlook NarrowBand Wireless Charging Wireless Internet Computing Infrastructure Conferencing Shortcuts Password Management Vendor Management Devices How to Transportation Samsung Microchip Skype Touchpad Screen Mirroring Uninterrupted Power Supply Scalability Camera Flash Business Mangement Hybrid Cloud Maintenance Bluetooth People Accountants Public Computer File Sharing Frequently Asked Questions Millennials Distributed Denial of Service Wireless Technology Cortana Wire Emails Vendor HIPAA NIST Content Software Tips Multi-Factor Security Amazon Apple Thought Leadership Benefits Leadership Search Engine Solid State Drive Start Menu Cast Computer Care Authentication Instant Messaging Books Current Events Recycling Travel Mobile Office Monitor Experience Augmented Reality Excel Workforce Chromecast Google Apps Internet exploMicrosoft Smart Office Users Programming Biometrics Save Time Display Notifications Cryptocurrency Audiobook SaaS Trending Amazon Web Services iPhone Customer Relationship Management Bing Audit Tools WiFi Tech Support Remote Work Relocation Nanotechnology Emergency Knowledge Warranty Sync Criminal Information Technology Worker Root Cause Analysis Reputation Practices Music Automobile Remote Worker Tip of the week Telecommuting Workers Advertising Document Management Virtual Reality Security Cameras Staff Techology Safe Mode Online Shopping Addiction Customer Service Smart Technology Help Desk Computer Fan Shortcut Rootkit Running Cable Shadow IT Humor Smart Tech Social Networking Network Congestion Printer Going Green HVAC Customers Hosted Computing IBM Wiring Windows Server 2008 Streaming Media Worker Commute Employer Employee Relationship Netflix Hacker Value Risk Management IT solutions Assessment HBO Specifications Evernote Files Cache Education Fax Server Two Factor Authentication webinar FENG Thank You Company Culture Compliance Congratulations Printers Managing Stress CrashOverride Regulation Webinar Twitter IT solutions
QR-Code