Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Spot Three Forms of Phishing Attacks

How to Spot Three Forms of Phishing Attacks

One of the crazy things about hackers is that they will do whatever it takes to ensure that they steal as much information and sensitive data as possible. One of the more innovative ways that hackers spread threats is through spam. Unwanted messages have grown from simple annoyances, to the spread of unwanted software and malware, all the way to sophisticated attacks on targeted individuals known as phishing attacks. Do you have ways to secure your business?

0 Comments
Continue reading

Someone’s Trying To Phish You… Do You Play Along?

Someone’s Trying To Phish You… Do You Play Along?

Phishing scams have been popping up for years--their most infamous attack vector has even become a punchline: some long-lost relative stuck in a far-off country suddenly reaches out, offering riches, but only if so-much money is provided first. People from all walks of life have been duped by these scams, and while not all of them are this transparent, most are pretty easy to spot.

0 Comments
Continue reading

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Ordinary fishing, where you hope for a simple-minded fish to latch onto your hook, relies on using a proper lure. The same can be said for the virtual method of phishing, where a hacker will use a similar type of “lure” to convince the target to bite. These phishing scams are especially useful for hackers who want to take advantage of social media to find new targets. A recent study has shown that this is a surprisingly effective method of phishing.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Hackers Google Hosted Solutions Backup Malware Network Security Microsoft User Tips Mobile Devices Software Data Internet Windows 10 Innovation Smartphones Business Email Hardware Browser Efficiency Tech Term Business Continuity Computer Smartphone Disaster Recovery VoIP Productivity Miscellaneous Data Backup IT Services Ransomware Workplace Tips communications Android Cybercrime Business Management Productivity Network Alert Chrome Office Cloud Computing Automation Data Recovery Outsourced IT Windows Managed IT Services Artificial Intelligence Save Money Communication Upgrade Computers Managed IT Services Router Server Telephone Systems Internet of Things Cybersecurity Money Law Enforcement Virtualization Social Media Facebook Small Business Quick Tips Collaboration Windows 10 Health Applications Holiday Wi-Fi Office Tips How To Passwords App Password IT Support Spam Office 365 Social Engineering Mobile Device Management Settings History Remote Computing Work/Life Balance Information Google Drive Word Bandwidth Bring Your Own Device BDR Gadgets Two-factor Authentication Mobile Device Gmail Operating System Hacking Data Breach Entertainment Mouse Managed Service Provider Marketing Flexibility Safety Phishing Data Security Mobility Sports Networking Apps Encryption Scam Microsoft Office Managed Service Data Management Data Protection Application VPN Connectivity Recovery Private Cloud Keyboard Voice over Internet Protocol HaaS Vulnerability Public Cloud eWaste OneNote Botnet The Internet of Things Downtime IT Support Internet Exlporer Firewall Employer-Employee Relationship Redundancy Physical Security DDoS End of Support BYOD Best Practice Human Resources Mobile Computing Data storage Hiring/Firing Retail Data Storage Robot Servers Avoiding Downtime Patch Management PDF User Error USB Comparison Identity Theft IT Management Google Docs CES Spam Blocking Software as a Service Infrastructure Social Paperless Office Wearable Technology Cleaning Training Budget Virtual Assistant Legal Battery IT Plan Website Content Management Black Market Telephony Remote Monitoring Machine Learning Windows 7 Big Data Business Intelligence Meetings Telephone System Managed IT Fraud YouTube Unsupported Software Saving Money Blockchain Electronic Medical Records Government Charger Update Access Control Search Engine Streaming Media Cortana Wire Books Current Events Frequently Asked Questions Millennials Accountants Video Games Amazon Thought Leadership IT solutions Experience Computing Infrastructure Software Tips Multi-Factor Security HIPAA Fax Server NIST Save Time Solid State Drive Start Menu Authentication Audiobook SaaS How to Cast Computer Care Display Lithium-ion battery Recycling Touchpad Augmented Reality Travel Bing Google Apps Smart Office Emergency Hybrid Cloud Knowledge Excel Workforce Environment Worker Scalability Amazon Web Services NarrowBand Music Automobile Trending Cryptocurrency Audit Tools Warranty Remote Work Nanotechnology Apple WiFi Security Cameras Criminal Smart Technology Sync Remote Worker Root Cause Analysis Help Desk Workers Document Management Network Congestion Tip of the week Telecommuting Uninterrupted Power Supply Practices Maintenance Rootkit Instant Messaging Distributed Denial of Service Online Shopping Wireless Technology Addiction Internet exploMicrosoft IBM Users People Staff Safe Mode Monitor Employer Employee Relationship Netflix Computer Fan Printer Smart Tech Risk Management iPhone Assessment Hacker HVAC Two Factor Authentication webinar Wiring Information Technology IT Consultant Windows Server 2008 Hosted Computing Relocation Administrator Evernote Chromecast Cache Troubleshooting Advertising Supercomputer Virtual Reality HBO Specifications Mobile Office Programming Biometrics Reputation Computer Accessories FENG Value Credit Cards Politics Television Smartwatch Notifications Customer Relationship Management Enterprise Content Management Techology Conferencing Windows 10s Unified Threat Management Data loss Shortcuts Password Manager Going Green Transportation Samsung MSP Tech Support Inventory Humor Vendor Management Microchip Wireless Charging Wireless Internet Worker Commute Outlook Digital Signature Customers Bluetooth Devices Files Public Computer Education Customer Service Password Management Emails Skype Camera Content Search Screen Mirroring Vendor Business Mangement Social Networking Laptop Benefits Wireless Leadership Flash File Sharing Running Cable Shadow IT Shortcut Compliance Webinar Printers Managing Stress Regulation CrashOverride Twitter IT solutions Thank You Congratulations Company Culture
QR-Code