Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Every so often, it’s nice to hear about when the good guys win and cybercriminals get their comeuppance. Three such cybercriminals have entered guilty pleas to charges related to major cybersecurity events.

0 Comments
Continue reading

Warning: It’s Now a Crime to Share Your Netflix Password

Warning: It’s Now a Crime to Share Your Netflix Password

“What’re you in for?” a prison inmate asks. “I shared my Netflix password with my sister,” you say. This conversation might be absurd, but according to a recent ruling in accordance with the Computer Fraud and Abuse Act, it’s one that could actually happen. Now, sharing your Netflix password to let someone catch up on their favorite TV show can be considered a federal offense.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Google Hackers Hosted Solutions Malware Backup Microsoft Network Security Software Data Windows 10 Innovation Internet User Tips Mobile Devices Smartphones Business Email Browser Hardware Efficiency Tech Term Smartphone Productivity VoIP Computer Business Continuity Disaster Recovery Data Backup IT Services Workplace Tips Miscellaneous Ransomware Android Cybercrime Business Management Productivity communications Automation Data Recovery Chrome Alert Windows Cloud Computing Network Outsourced IT Office Router Communication Managed IT Services Save Money Internet of Things Upgrade Server Artificial Intelligence Managed IT Services Telephone Systems Computers Social Media Cybersecurity Small Business Virtualization Quick Tips Windows 10 Money Law Enforcement Facebook Collaboration Office Tips Passwords App Spam Holiday Applications Health Wi-Fi Social Engineering Password IT Support How To Office 365 Mobile Device Two-factor Authentication Work/Life Balance Bandwidth Gadgets Bring Your Own Device Google Drive Gmail Operating System History Mobile Device Management Information Settings Word Remote Computing BDR Entertainment Keyboard Private Cloud Networking Managed Service Marketing HaaS Data Protection Data Breach Connectivity Hacking Application Sports Recovery Encryption Vulnerability Voice over Internet Protocol Data Management Phishing VPN Flexibility Safety Mobility Microsoft Office Scam Apps Mouse Managed Service Provider Data Security Electronic Medical Records CES Spam Blocking Identity Theft IT Management Google Docs Software as a Service Infrastructure Paperless Office DDoS Charger Best Practice Virtual Assistant Social User Error Content Management Telephony Government Budget IT Plan Website Public Cloud Firewall Employer-Employee Relationship Machine Learning Windows 7 Remote Monitoring Business Intelligence Downtime IT Support Telephone System Managed IT Wearable Technology Cleaning Hiring/Firing Blockchain Fraud Unsupported Software Saving Money Physical Security Access Control Update Data storage OneNote Botnet End of Support Patch Management USB Meetings PDF Redundancy YouTube Training BYOD Human Resources eWaste Mobile Computing Servers Data Storage Robot The Internet of Things Legal Retail Avoiding Downtime Comparison Internet Exlporer Black Market Battery Big Data Environment Going Green Hacker Emails HVAC Humor Wiring Public Computer Smart Tech Worker Commute Benefits Leadership Windows Server 2008 NarrowBand Customers Content Hosted Computing Cache HBO Specifications FENG Value Files Administrator Education Books Current Events Evernote Uninterrupted Power Supply Laptop Programming Wireless Smartwatch Biometrics Save Time Enterprise Content Management Windows 10s Unified Threat Management Search Experience Credit Cards Shortcuts Customer Relationship Management Password Manager Distributed Denial of Service Wireless Technology MSP Video Games Audiobook SaaS Inventory Data loss People Wireless Charging Wireless Internet Outlook Worker Digital Signature Microchip Computing Infrastructure Emergency Knowledge Touchpad Password Management Skype Camera How to Music Automobile Devices Hybrid Cloud Vendor Customer Service Smart Technology Business Mangement Flash Chromecast File Sharing Scalability Screen Mirroring Mobile Office Cortana Wire Frequently Asked Questions Millennials Shortcut Rootkit Accountants Notifications Search Engine Social Networking Network Congestion Software Tips Multi-Factor Security Tech Support Employer Employee Relationship Netflix HIPAA NIST Solid State Drive Start Menu Apple IBM Amazon Thought Leadership Display Fax Server Two Factor Authentication webinar Recycling Augmented Reality Instant Messaging Risk Management IT solutions Assessment Authentication Cast Computer Care IT Consultant Google Apps Smart Office Excel Workforce Monitor Travel Internet exploMicrosoft Bing Users Trending Running Cable Shadow IT Computer Accessories Cryptocurrency Audit Tools iPhone Warranty Troubleshooting Supercomputer Amazon Web Services Information Technology Security Cameras Conferencing Criminal Sync Streaming Media Relocation Remote Worker Politics Television Remote Work Nanotechnology WiFi Virtual Reality Transportation Samsung Workers Document Management Tip of the week Telecommuting Reputation Vendor Management Practices Root Cause Analysis Advertising Help Desk Techology Maintenance Bluetooth Staff Safe Mode Computer Fan Lithium-ion battery Printer Online Shopping Addiction Congratulations Webinar IT solutions Company Culture Compliance Printers Managing Stress Regulation CrashOverride Twitter Thank You
QR-Code