Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

0 Comments
Continue reading

Tip of the Week: You May Want to Remove Your Wi-Fi Information From the WiGLE Database

Tip of the Week: You May Want to Remove Your Wi-Fi Information From the WiGLE Database

The next time you look at your device’s available Wi-Fi connections when in public, take a look at what some of the local connection names are. Chances are that you’ll see some names that match a nearby organization or family. Others might still be using the default SSID, like Linksys/Netgear-something-or-other. Others might get a little more creative. The latter example may have the right idea; using an obscure wireless network name is much more secure than naming your connection after what it’s associated with.

0 Comments
Continue reading

Tip of the Week: Sharing Files Between 2 PCs is as Easy as Dragging and Dropping

b2ap3_thumbnail_person_network_400.jpgWhat’s the best way to share files between your different personal devices and computers? It turns out that you can share files over your home’s network, and you don’t have to be an IT technician to do it.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Hackers Google Hosted Solutions Backup Malware Microsoft User Tips Network Security Mobile Devices Software Data Internet Windows 10 Innovation Smartphones Business Email Hardware Browser Efficiency Tech Term Computer Business Continuity Smartphone Disaster Recovery VoIP Productivity Workplace Tips Ransomware Miscellaneous IT Services Data Backup communications Cybercrime Business Management Android Productivity Network Cloud Computing Outsourced IT Office Chrome Automation Windows Data Recovery Alert Artificial Intelligence Managed IT Services Computers Router Save Money Managed IT Services Internet of Things Upgrade Communication Server Telephone Systems Windows 10 Virtualization Social Media Facebook Small Business Quick Tips Money Law Enforcement Collaboration Applications Health Wi-Fi Holiday Password Office Tips IT Support Passwords How To App Office 365 Spam Cybersecurity Social Engineering Operating System Mobile Device Management Settings Information Google Drive Work/Life Balance History Remote Computing Mobile Device Word BDR Bandwidth Gadgets Bring Your Own Device Two-factor Authentication Gmail Flexibility Vulnerability Safety Voice over Internet Protocol Phishing Mobility Apps Entertainment Marketing Mouse Managed Service Provider Managed Service Data Protection Scam Microsoft Office Connectivity Encryption Networking Sports Private Cloud HaaS Data Security Keyboard Data Management Application Hacking VPN Recovery Data Breach Human Resources Managed IT Data storage Business Intelligence End of Support eWaste Unsupported Software Hiring/Firing Servers PDF Update The Internet of Things OneNote Botnet Patch Management Internet Exlporer USB Identity Theft CES Best Practice DDoS Mobile Computing Infrastructure Paperless Office Redundancy Retail Virtual Assistant Legal Robot Training Content Management Black Market User Error BYOD Battery Data Storage Machine Learning Telephone System Avoiding Downtime Blockchain Big Data Wearable Technology Cleaning Social Fraud Comparison Software as a Service Budget Access Control IT Management Google Docs Government Electronic Medical Records Spam Blocking Public Cloud Charger Downtime IT Support Telephony Meetings IT Plan Website Remote Monitoring Physical Security Firewall Employer-Employee Relationship YouTube Saving Money Windows 7 Shortcut Cryptocurrency Emergency Knowledge Running Cable Shadow IT Social Networking Amazon Web Services Outlook Worker Camera Skype Music Automobile Vendor Remote Work Nanotechnology Apple File Sharing Streaming Media Criminal Search Engine IT solutions Practices Screen Mirroring Smart Technology Instant Messaging Fax Server Workers Document Management Flash Lithium-ion battery Staff Safe Mode Monitor Network Congestion Online Shopping Addiction Frequently Asked Questions Millennials Internet exploMicrosoft Rootkit Users Solid State Drive Start Menu IBM Display Environment Smart Tech Software Tips Multi-Factor Security iPhone Employer Employee Relationship Netflix Augmented Reality HVAC Risk Management Information Technology Assessment Bing Hosted Computing Cast Computer Care Relocation Two Factor Authentication webinar NarrowBand Warranty Travel Reputation IT Consultant Evernote Cache Excel Workforce Advertising Virtual Reality Enterprise Content Management Audit Tools Troubleshooting Techology Supercomputer Security Cameras Uninterrupted Power Supply Credit Cards Trending Computer Accessories Remote Worker Maintenance Going Green Politics Television Help Desk People Inventory WiFi Humor Conferencing Distributed Denial of Service Wireless Technology Password Manager Sync Vendor Management Worker Commute Printer Digital Signature Root Cause Analysis Customers Transportation Samsung Wireless Charging Wireless Internet Tip of the week Telecommuting Password Management Computer Fan Hacker Devices Files Bluetooth Education Wiring Laptop Wireless Public Computer Mobile Office Search Emails Chromecast Programming Biometrics Business Mangement Content Administrator Notifications Accountants Benefits Video Games Leadership Customer Relationship Management Cortana Wire Windows Server 2008 HIPAA NIST FENG Value Books Current Events Smartwatch Tech Support Amazon Thought Leadership HBO Specifications Computing Infrastructure Unified Threat Management Touchpad Experience Shortcuts Authentication Save Time How to MSP Recycling Windows 10s Audiobook Hybrid Cloud SaaS Microchip Data loss Scalability Customer Service Google Apps Smart Office Twitter IT solutions Printers CrashOverride Thank You Congratulations Company Culture Compliance Webinar Managing Stress Regulation
QR-Code