Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

0 Comments
Continue reading

Essential Cybersecurity Tips From The FBI

Essential Cybersecurity Tips From The FBI

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

0 Comments
Continue reading

These Police Officers Called for Backup... and it was Infected with Ransomware

These Police Officers Called for Backup... and it was Infected with Ransomware

The police exist to serve, protect, and enforce the law, but who can we turn to if even the cops are made victim of a cyberattack? This is the question the residents of Cockrell, Texas have to answer, as their police department fell victim to a ransomware attack known as the Osiris Ransomware.

0 Comments
Continue reading

Alert: New ATM Scam Can Steal 32,000 Card Numbers Per Machine

Alert: New ATM Scam Can Steal 32,000 Card Numbers Per Machine

Banks and companies that manage automated teller machines, better known as ATMs, have been warned against another method thieves have been utilizing to commit identity theft--by no less than the Secret Service.

0 Comments
Continue reading

According to FBI Director, Privacy is a Misnomer

According to FBI Director, Privacy is a Misnomer

There’s an ongoing debate concerning whether the United States Constitution gives the American government the right to access data held on electronic devices by its citizens. In case they didn’t make themselves heard clearly enough, the director of the FBI, James Comey, has released a statement at Symantec’s Annual Government Symposium. You might not like his answer.

0 Comments
Continue reading

A Law From 1986 Shouldn’t Govern Email Privacy in 2016

b2ap3_thumbnail_congress_to_hear_arguments_for_ecpa_reform_400.jpgAre you familiar with the protections in place that ensure that your digital communications remain private? What’s keeping an entity like the government from going through your emails? In the United States, the government uses a loophole in an outdated law to access the digital information they want from its citizens. If you’re concerned about privacy, you need to be informed about such laws and loopholes.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Hackers Google Backup Malware Hosted Solutions Microsoft Software Data Windows 10 Internet Innovation User Tips Mobile Devices Network Security Smartphones Email Browser Hardware Business Tech Term Efficiency Disaster Recovery Smartphone Productivity VoIP Computer Business Continuity Data Backup IT Services Workplace Tips Ransomware Miscellaneous Android Cybercrime Productivity Business Management communications Alert Cloud Computing Automation Chrome Data Recovery Windows Outsourced IT Network Office Save Money Communication Upgrade Artificial Intelligence Server Computers Telephone Systems Managed IT Services Router Managed IT Services Internet of Things Money Law Enforcement Social Media Virtualization Small Business Quick Tips Windows 10 Facebook Collaboration Holiday Office Tips Passwords Applications Wi-Fi App Spam IT Support Password Office 365 Health Social Engineering Cybersecurity How To Remote Computing Word Work/Life Balance Google Drive Two-factor Authentication Bandwidth Bring Your Own Device BDR Gadgets Information Gmail Operating System Mobile Device Management Mobile Device Settings History Marketing Data Security Phishing Networking Flexibility Safety Encryption Sports Scam Application Microsoft Office Mobility Data Management Recovery Apps VPN Voice over Internet Protocol Vulnerability Keyboard Private Cloud Managed Service HaaS Data Breach Managed Service Provider Mouse Data Protection Entertainment Connectivity Hacking DDoS Downtime Avoiding Downtime IT Support Best Practice Machine Learning Hiring/Firing Telephone System Comparison Fraud IT Management Physical Security Google Docs Patch Management User Error Blockchain Spam Blocking Social Access Control Data storage USB End of Support Budget IT Plan Website Wearable Technology Cleaning Telephony PDF Training Remote Monitoring Windows 7 Managed IT Business Intelligence Saving Money Unsupported Software Human Resources Update Legal Big Data Meetings Servers YouTube OneNote Black Market Botnet Battery Electronic Medical Records Charger Identity Theft eWaste CES Redundancy The Internet of Things Infrastructure Software as a Service Paperless Office Virtual Assistant Mobile Computing BYOD Government Firewall Employer-Employee Relationship Internet Exlporer Robot Data Storage Content Management Retail Public Cloud NarrowBand MSP Inventory Root Cause Analysis Music Automobile Password Manager Maintenance Shortcuts Tip of the week Telecommuting Computing Infrastructure Digital Signature Computer Fan Touchpad Wireless Charging Microchip Wireless Internet How to Smart Technology Camera Devices Scalability Network Congestion Uninterrupted Power Supply Password Management Hybrid Cloud Rootkit Distributed Denial of Service Wireless Technology File Sharing IBM People Business Mangement Vendor Windows Server 2008 Employer Employee Relationship Netflix Accountants FENG Value Risk Management Assessment Programming Cortana Biometrics Search Engine Wire HBO Apple Specifications Two Factor Authentication webinar Amazon Customer Relationship Management Thought Leadership Instant Messaging IT Consultant HIPAA Windows 10s NIST Chromecast Augmented Reality Authentication Data loss Monitor Troubleshooting Supercomputer Mobile Office Recycling Display Internet exploMicrosoft Users Computer Accessories Politics Television Notifications Google Apps Bing Smart Office Outlook iPhone Conferencing Vendor Management Amazon Web Services Customer Service Warranty Relocation Transportation Samsung Tech Support Cryptocurrency Skype Information Technology Remote Work Social Networking Remote Worker Nanotechnology Screen Mirroring Reputation Criminal Shortcut Security Cameras Flash Advertising Virtual Reality Bluetooth Practices Techology Public Computer Workers Help Desk Document Management Frequently Asked Questions Millennials Emails Content Online Shopping Fax Server Printer Addiction Software Tips Humor Multi-Factor Security Benefits Leadership Running Cable Shadow IT Staff Solid State Drive Going Green IT solutions Safe Mode Start Menu Streaming Media Wiring Smart Tech Cast Customers Computer Care Books Current Events Hacker HVAC Worker Commute Hosted Computing Travel Experience Excel Files Workforce Education Save Time Tools Wireless Audiobook SaaS Lithium-ion battery Evernote Administrator Cache Trending Search Audit Laptop Credit Cards Unified Threat Management WiFi Video Games Emergency Knowledge Environment Smartwatch Enterprise Content Management Sync Worker IT solutions Congratulations Company Culture Compliance Printers Managing Stress Regulation Twitter CrashOverride Webinar Thank You
QR-Code