Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Any Version of Internet Explorer Prior to 11 Can’t Be Trusted

Any Version of Internet Explorer Prior to 11 Can’t Be Trusted

We often talk about how important it is that your business use the most recent and up-to-date versions of your software solutions, but it’s not often that we get to say that people using Internet Explorer 11 have the right idea. As it turns out, nearly a quarter of all Windows PCs are still using unsupported versions of Internet Explorer, with half of them being found on computers still running Windows XP. What has this world come to?

Continue reading

Microsoft Ends Support For Internet Explorer 8, 9, and 10, What’s This Mean For Your Business?

b2ap3_thumbnail_ie_8_9_10_goes_bye_bye_400.jpgBad news for users still running outdated versions of Internet Explorer - Microsoft has ended support for its legacy web browser. What this means is that Internet Explorer 8, 9, and 10, will no longer be issued critical patches and security updates, making its continued use a security risk.

Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Hackers Google Hosted Solutions Malware Backup Network Security Microsoft Software Windows 10 Innovation User Tips Data Mobile Devices Internet Smartphones Browser Business Hardware Email Tech Term Efficiency Business Continuity Productivity Smartphone Computer VoIP Disaster Recovery Ransomware IT Services Data Backup Workplace Tips Miscellaneous communications Android Productivity Cybercrime Business Management Network Data Recovery Chrome Cloud Computing Alert Windows Office Automation Outsourced IT Computers Communication Upgrade Router Managed IT Services Internet of Things Server Managed IT Services Artificial Intelligence Save Money Telephone Systems Social Media Cybersecurity Small Business Quick Tips Windows 10 Money Virtualization Law Enforcement Facebook Collaboration Spam Office Tips Passwords Holiday Health App Applications Wi-Fi IT Support How To Office 365 Password Social Engineering Operating System Word Mobile Device Management Settings Mobile Device Two-factor Authentication Work/Life Balance Information History Google Drive Bandwidth Bring Your Own Device Remote Computing Gadgets Gmail BDR Networking Connectivity Keyboard Data Security Application Private Cloud Data Breach Entertainment HaaS Recovery Marketing Hacking Phishing Vulnerability Voice over Internet Protocol Encryption Sports Flexibility Microsoft Office Safety Data Management Scam Mouse Managed Service Provider VPN Mobility Apps Managed Service Data Protection Content Management Electronic Medical Records Legal Comparison Battery Spam Blocking Social Black Market Charger eWaste IT Management Google Docs Machine Learning Budget Telephone System The Internet of Things Blockchain Fraud Internet Exlporer Firewall Employer-Employee Relationship Telephony Access Control IT Plan Website Windows 7 Best Practice Remote Monitoring Government DDoS Business Intelligence Hiring/Firing Public Cloud Managed IT Saving Money Software as a Service Downtime User Error IT Support Unsupported Software Update Patch Management Human Resources OneNote Botnet USB Physical Security Servers End of Support Data storage Wearable Technology Cleaning Redundancy Training PDF Mobile Computing CES Robot Identity Theft BYOD Retail Meetings Data Storage Infrastructure Paperless Office Virtual Assistant Avoiding Downtime Big Data YouTube Enterprise Content Management Advertising Emails Virtual Reality Computer Fan Credit Cards Bing Reputation Public Computer Running Cable Shadow IT Benefits Leadership Streaming Media Inventory Warranty Content Techology Password Manager Windows Server 2008 Digital Signature Remote Worker Going Green Programming Biometrics Wireless Charging Wireless Internet Security Cameras Books Humor Current Events Password Management Save Time Lithium-ion battery Worker Commute FENG Value Customer Relationship Management Devices Help Desk Experience Customers HBO Specifications Files Education Windows 10s Printer Audiobook SaaS Environment Business Mangement Accountants Wiring Laptop Worker Wireless Data loss Cortana Wire Hacker Emergency Knowledge Search NarrowBand Outlook HIPAA NIST Customer Service Amazon Thought Leadership Music Automobile Video Games Smart Technology Computing Infrastructure Skype Social Networking Authentication Administrator Uninterrupted Power Supply Shortcut Recycling Flash Unified Threat Management Touchpad Rootkit People Screen Mirroring Google Apps Smart Office Smartwatch Network Congestion Distributed Denial of Service How to Wireless Technology Frequently Asked Questions Millennials IT solutions MSP Cryptocurrency Employer Employee Relationship Hybrid Cloud Netflix Fax Server Amazon Web Services Shortcuts IBM Scalability Two Factor Authentication webinar Solid State Drive Start Menu Remote Work Nanotechnology Microchip Risk Management Assessment Software Tips Multi-Factor Security Criminal Chromecast Practices Camera Mobile Office Cast Computer Care Workers Document Management Apple IT Consultant Excel Workforce Staff File Sharing Safe Mode Computer Accessories Notifications Travel Online Shopping Addiction Vendor Troubleshooting Supercomputer Instant Messaging HVAC Internet exploMicrosoft Conferencing Users Audit Tools Smart Tech Search Engine Politics Monitor Television Tech Support Trending Transportation iPhone Samsung Sync Hosted Computing Vendor Management WiFi Maintenance Tip of the week Telecommuting Augmented Reality Bluetooth Information Technology Root Cause Analysis Evernote Cache Display Relocation Congratulations Webinar Company Culture Compliance IT solutions Managing Stress Regulation Twitter CrashOverride Thank You Printers