Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

An IT Christmas Carol

An IT Christmas Carol

The IT guy, Jacob left last month: to begin with. There is no doubt whatever about that. He left without an exit interview, and he didn’t seem very pleased with the way the situation played out. You could never tell if Scrooge cared or not. His demands have never wavered. He expected perfection and when mistakes were made, they were approached as catastrophic affronts to the sustainability of the business, even if that wasn’t the reality.

0 Comments
Continue reading

As 2018 Ends, Mobile Cyberthreats Won’t

As 2018 Ends, Mobile Cyberthreats Won’t

Mobile devices have made conducting business much more convenient, as the right application can allow transactions to be made from anywhere you may be reading this blog. However, this increased accessibility has come with a price - threats to mobile security - which requires any business to be aware of the state of cybersecurity, especially concerning mobile devices, now and in the foreseeable future.

0 Comments
Continue reading

Technology Has Influenced a Few Holiday Traditions

Technology Has Influenced a Few Holiday Traditions

Everyone has their own holiday traditions, and Christmastime is no exception. Some might stick to more traditional roots, while others focus on more contemporary trends to create a Christmas culture that changes with each passing year. Many of these newer traditions have been molded from modern technology solutions, so let’s celebrate both new and old holiday traditions by looking at how technology has changed them.

0 Comments
Continue reading

Tip of the Week: 6 Tips to Avoid Getting Scammed This Holiday Season

Tip of the Week: 6 Tips to Avoid Getting Scammed This Holiday Season

The ingenuity of criminals knows no bounds, especially when it comes to the holidays. You’d think that scammers would be merciful during this time of peace on Earth and goodwill to man. Nope. This is when they step up their scamming efforts, which means you need to be ever vigilant.

0 Comments
Continue reading

Monsters aren’t Real, But Ransomware Sure Is!

Monsters aren’t Real, But Ransomware Sure Is!

Halloween is a time when creatures like ghosts and goblins are celebrated rather than feared. Even adults use the holiday to lighten up and enjoy themselves, as they’re well aware that the monsters so often seen and heard about in stories are fictional. Unfortunately, the fact remains that there are monsters hiding in plain sight all around us, playing on the fears and misfortune of others--namely, hackers.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Google Hackers Hosted Solutions Backup Malware Microsoft Innovation User Tips Mobile Devices Data Software Internet Windows 10 Network Security Smartphones Business Hardware Email Browser Efficiency Tech Term Business Continuity Smartphone Computer Disaster Recovery VoIP Productivity Data Backup Workplace Tips Miscellaneous IT Services Ransomware communications Productivity Android Cybercrime Business Management Data Recovery Chrome Outsourced IT Office Windows Automation Cloud Computing Network Alert Artificial Intelligence Computers Save Money Managed IT Services Managed IT Services Router Internet of Things Upgrade Telephone Systems Server Communication Windows 10 Virtualization Facebook Social Media Collaboration Small Business Money Quick Tips Law Enforcement Applications Health Wi-Fi IT Support Office Tips Passwords Office 365 Password App Cybersecurity Social Engineering How To Holiday Spam Information Google Drive BDR History Remote Computing Bandwidth Mobile Device Gadgets Bring Your Own Device Gmail Operating System Mobile Device Management Word Work/Life Balance Settings Two-factor Authentication Entertainment Flexibility Scam Microsoft Office Safety Marketing Mobility Voice over Internet Protocol Managed Service Vulnerability Apps Data Protection Keyboard Mouse Managed Service Provider Encryption Sports Connectivity Data Management Data Breach VPN Networking Private Cloud HaaS Application Hacking Phishing Data Security Recovery Human Resources Physical Security Saving Money Internet Exlporer Data storage End of Support Servers Training Website Best Practice Telephony DDoS IT Plan Windows 7 Remote Monitoring PDF Business Intelligence Identity Theft User Error Managed IT CES Unsupported Software Big Data Infrastructure Paperless Office Virtual Assistant Electronic Medical Records Mobile Computing Software as a Service Update Charger Retail Legal Robot Wearable Technology Cleaning OneNote Botnet Content Management Black Market Battery Machine Learning Telephone System Redundancy Fraud Firewall Employer-Employee Relationship Blockchain BYOD Access Control Social Meetings Budget Government Hiring/Firing YouTube Data Storage Avoiding Downtime Public Cloud Comparison Downtime IT Support Patch Management eWaste USB Spam Blocking The Internet of Things IT Management Google Docs Cryptocurrency Risk Management Assessment Lithium-ion battery Windows Server 2008 Scalability Amazon Web Services Two Factor Authentication webinar Customer Service Bing Hybrid Cloud HBO Specifications Remote Work Nanotechnology IT Consultant Social Networking Environment Warranty FENG Value Criminal Shortcut Practices Troubleshooting Supercomputer Remote Worker Windows 10s Apple Workers Document Management Computer Accessories NarrowBand Security Cameras Staff Safe Mode Politics Television IT solutions Instant Messaging Online Shopping Addiction Conferencing Fax Server Help Desk Data loss Outlook Monitor Smart Tech Transportation Samsung Uninterrupted Power Supply Printer Internet exploMicrosoft Users HVAC Vendor Management Hosted Computing People Wiring Skype iPhone Bluetooth Distributed Denial of Service Wireless Technology Hacker Public Computer Flash Relocation Evernote Cache Emails Screen Mirroring Information Technology Frequently Asked Questions Millennials Reputation Credit Cards Benefits Leadership Administrator Advertising Virtual Reality Enterprise Content Management Content Software Tips Multi-Factor Security Techology Inventory Books Current Events Mobile Office Unified Threat Management Solid State Drive Start Menu Password Manager Maintenance Chromecast Smartwatch Digital Signature Experience Notifications MSP Humor Wireless Charging Wireless Internet Save Time Shortcuts Cast Computer Care Going Green Audiobook SaaS Excel Workforce Customers Devices Tech Support Microchip Travel Worker Commute Password Management Trending Emergency Knowledge Camera Audit Tools Files Education Business Mangement Worker Wireless Accountants Music Automobile File Sharing Sync Search Cortana Wire Programming Biometrics Vendor WiFi Laptop NIST Tip of the week Telecommuting Video Games Amazon Thought Leadership Smart Technology Customer Relationship Management Running Cable Shadow IT Search Engine Root Cause Analysis HIPAA Authentication Network Congestion Computer Fan Computing Infrastructure Recycling Rootkit Streaming Media Touchpad IBM Augmented Reality How to Google Apps Smart Office Employer Employee Relationship Netflix Display Twitter Thank You Webinar Congratulations CrashOverride Company Culture Compliance IT solutions Printers Managing Stress Regulation
QR-Code