Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

0 Comments
Continue reading

Essential Cybersecurity Tips From The FBI

Essential Cybersecurity Tips From The FBI

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

0 Comments
Continue reading

These Police Officers Called for Backup... and it was Infected with Ransomware

These Police Officers Called for Backup... and it was Infected with Ransomware

The police exist to serve, protect, and enforce the law, but who can we turn to if even the cops are made victim of a cyberattack? This is the question the residents of Cockrell, Texas have to answer, as their police department fell victim to a ransomware attack known as the Osiris Ransomware.

0 Comments
Continue reading

Alert: New ATM Scam Can Steal 32,000 Card Numbers Per Machine

Alert: New ATM Scam Can Steal 32,000 Card Numbers Per Machine

Banks and companies that manage automated teller machines, better known as ATMs, have been warned against another method thieves have been utilizing to commit identity theft--by no less than the Secret Service.

0 Comments
Continue reading

According to FBI Director, Privacy is a Misnomer

According to FBI Director, Privacy is a Misnomer

There’s an ongoing debate concerning whether the United States Constitution gives the American government the right to access data held on electronic devices by its citizens. In case they didn’t make themselves heard clearly enough, the director of the FBI, James Comey, has released a statement at Symantec’s Annual Government Symposium. You might not like his answer.

0 Comments
Continue reading

A Law From 1986 Shouldn’t Govern Email Privacy in 2016

b2ap3_thumbnail_congress_to_hear_arguments_for_ecpa_reform_400.jpgAre you familiar with the protections in place that ensure that your digital communications remain private? What’s keeping an entity like the government from going through your emails? In the United States, the government uses a loophole in an outdated law to access the digital information they want from its citizens. If you’re concerned about privacy, you need to be informed about such laws and loopholes.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Google Hackers Hosted Solutions Malware Backup Internet Innovation Network Security User Tips Mobile Devices Microsoft Software Windows 10 Data Smartphones Productivity Efficiency Email Hardware Workplace Tips Business Browser Tech Term VoIP Productivity communications Business Continuity Computer Smartphone Disaster Recovery IT Services Ransomware Miscellaneous Business Management Android Data Backup Cybercrime Windows Cloud Computing Alert Server Network Outsourced IT Chrome Office Automation Data Recovery Quick Tips Telephone Systems Windows 10 Artificial Intelligence Managed IT Services Computers Managed IT Services Router Save Money Internet of Things Communication Upgrade Money Small Business Law Enforcement Collaboration IT Support Health Cybersecurity Virtualization Social Media Facebook Gadgets Spam Social Engineering Applications Operating System Wi-Fi Office 365 Password Office Tips Passwords How To Mobile Device App Holiday Work/Life Balance Bandwidth Information Bring Your Own Device Two-factor Authentication Gmail Mobile Device Management Settings Google Drive BDR History Remote Computing Private Cloud Encryption Word Application Meetings Recovery Flexibility Scam Microsoft Office Paperless Office Voice over Internet Protocol Managed Service Vulnerability Safety Data Protection Mobility Connectivity Apps Entertainment Marketing Keyboard Mouse Managed Service Provider Data Breach Sports Networking Data Security HaaS Data Management Hacking Phishing VPN IT Support Servers Patch Management Downtime USB IT Plan Website Telephony Remote Monitoring Physical Security YouTube Windows 7 Data storage CES Business Intelligence End of Support Saving Money Identity Theft Training Managed IT Infrastructure eWaste Unsupported Software Software as a Service Update Virtual Assistant The Internet of Things PDF Botnet Content Management Internet Exlporer OneNote Machine Learning Big Data Best Practice Telephone System Electronic Medical Records DDoS Redundancy Legal Blockchain Mobile Computing Fraud Charger User Error BYOD Battery Robot Access Control Black Market Retail Data Storage Save Time Avoiding Downtime Firewall Employer-Employee Relationship Wearable Technology Cleaning Comparison IT Management Google Docs Government Social Hiring/Firing Augmented Reality Spam Blocking Budget Human Resources Cryptocurrency Public Cloud Criminal Network Congestion Tech Support Google Search HBO Specifications Computing Infrastructure Customer Relationship Management Remote Work Nanotechnology Rootkit Warranty FENG Value Document Management IBM Security Cameras How to Practices Employer Employee Relationship Netflix Remote Worker Windows 10s Touchpad Workers Help Desk Data loss Scalability Staff Safe Mode Two Factor Authentication webinar Business Technology Hybrid Cloud Online Shopping Addiction Risk Management Assessment HVAC IT Consultant Running Cable Shadow IT Proactive IT Outlook Customer Service Smart Tech Printer Troubleshooting Supercomputer Hacker Apple Social Networking Hosted Computing Computer Accessories Streaming Media Wiring Skype Shortcut Screen Mirroring Instant Messaging Conferencing Biometric Security Flash Evernote Cache Politics Television Monitor IT solutions Enterprise Content Management Transportation Samsung Net Neutrality Frequently Asked Questions Millennials Internet exploMicrosoft Users Fax Server Credit Cards Vendor Management Lithium-ion battery Administrator Password Manager Environment Smartwatch Software Tips Multi-Factor Security iPhone Inventory Bluetooth Unified Threat Management Solid State Drive Start Menu Shortcuts Cast Computer Care Relocation Digital Signature Emails NarrowBand MSP Information Technology Wireless Charging Wireless Internet Public Computer Travel Reputation Password Management Benefits Leadership ISP Excel Workforce Advertising Virtual Reality Devices Content Microchip Business Mangement Books Current Events Uninterrupted Power Supply Employee Trending Camera Audit Tools Techology People Vendor WiFi Humor Accountants Distributed Denial of Service Wireless Technology File Sharing Sync Going Green Maintenance Cortana Wire Experience Root Cause Analysis Customers HIPAA NIST Cryptomining Tip of the week Telecommuting Worker Commute Amazon Thought Leadership Audiobook SaaS Search Engine Recycling Emergency Knowledge Digital Signage Files Education Authentication Worker Computer Fan Music Automobile Mobile Office Display Search Chromecast Laptop Wireless Google Apps Smart Office Bing Video Games Smart Technology Database Windows Server 2008 Programming Biometrics Amazon Web Services Notifications CrashOverride Company Culture Thank You Compliance Webinar Managing Stress Congratulations Printers Regulation IT solutions Twitter
QR-Code