Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Few Security Lessons Your Business Can Learn From Game of Thrones

A Few Security Lessons Your Business Can Learn From Game of Thrones

Security is a major concern for anything successful, and television programming is no different. Game of Thrones, the BBC’s epic production based on George R.R. Martin's book series A Song of Ice and Fire, has always been concerned with their security--and with the television series overtaking the book series, that concern has only grown as the production has brand new secrets to keep safe. As a result, the production has seen a steady increase in security.

Continue reading

It Only Takes 8 Seconds for a Hacker to Open Your Garage Door

b2ap3_thumbnail_garage_hackers_400.jpgHackers have proven to be a crafty and suspicious lot, and can take advantage of even the most benign technology to infiltrate networks. However, we don’t often associate them with objects in the physical world. Now, even something as simple as a decade-old communications device can be used to open the right garage doors.

Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Google Hackers Backup Malware Hosted Solutions Microsoft Network Security Software Data Windows 10 Innovation Internet User Tips Mobile Devices Smartphones Business Email Browser Hardware Efficiency Tech Term Business Continuity Disaster Recovery Smartphone Productivity VoIP Computer Data Backup IT Services Workplace Tips Ransomware Miscellaneous communications Android Productivity Cybercrime Business Management Office Automation Data Recovery Chrome Alert Windows Cloud Computing Outsourced IT Network Computers Communication Router Managed IT Services Save Money Internet of Things Upgrade Server Artificial Intelligence Managed IT Services Telephone Systems Social Media Virtualization Small Business Windows 10 Money Quick Tips Law Enforcement Cybersecurity Facebook Collaboration IT Support Office Tips Passwords Office 365 App Spam Applications Wi-Fi Health Social Engineering Password Holiday How To Word Remote Computing Information Mobile Device BDR Two-factor Authentication Bandwidth Bring Your Own Device Google Drive Gadgets Gmail Operating System Mobile Device Management Work/Life Balance History Settings Data Security Entertainment Microsoft Office Scam Marketing Private Cloud HaaS Networking Managed Service Hacking Sports Encryption Application Data Protection Vulnerability Connectivity Keyboard Recovery Voice over Internet Protocol Data Management VPN Flexibility Safety Data Breach Mobility Apps Phishing Mouse Managed Service Provider Internet Exlporer Robot Black Market USB Retail Comparison Battery Human Resources Spam Blocking IT Management Google Docs Servers Training DDoS Best Practice Telephony Identity Theft IT Plan Website Government CES User Error Social Remote Monitoring Infrastructure Paperless Office Budget Windows 7 Software as a Service Public Cloud Managed IT Downtime IT Support Big Data Business Intelligence Virtual Assistant Unsupported Software Content Management Electronic Medical Records Wearable Technology Cleaning Charger Update Physical Security Machine Learning Telephone System Saving Money OneNote Botnet Data storage End of Support Fraud Blockchain PDF Access Control Firewall Employer-Employee Relationship Meetings Redundancy YouTube BYOD Hiring/Firing Data Storage eWaste The Internet of Things Mobile Computing Avoiding Downtime Legal Patch Management Netflix Computer Fan Techology Amazon Web Services IBM Lithium-ion battery Warranty Cryptocurrency Employer Employee Relationship Going Green Security Cameras Remote Work Nanotechnology Risk Management Assessment Maintenance Remote Worker Humor Criminal Two Factor Authentication webinar Environment Practices NarrowBand Customers Workers Document Management IT Consultant Windows Server 2008 Help Desk Worker Commute Computer Accessories FENG Value Online Shopping Addiction Troubleshooting Supercomputer HBO Specifications Printer Files Education Staff Safe Mode Windows 10s Laptop Hacker Wireless Smart Tech Politics Television Wiring Search HVAC Conferencing Uninterrupted Power Supply Hosted Computing Vendor Management Distributed Denial of Service Programming Wireless Technology Biometrics Data loss Video Games Transportation Samsung People Bluetooth Customer Relationship Management Evernote Cache Outlook Administrator Computing Infrastructure Skype Touchpad Smartwatch Credit Cards Public Computer Unified Threat Management How to Enterprise Content Management Emails Inventory Content Chromecast Screen Mirroring MSP Scalability Password Manager Benefits Leadership Mobile Office Flash Shortcuts Hybrid Cloud Customer Service Wireless Charging Wireless Internet Books Current Events Notifications Frequently Asked Questions Millennials Microchip Digital Signature Social Networking Solid State Drive Start Menu Devices Experience Shortcut Software Tips Multi-Factor Security Camera Apple Password Management Save Time Tech Support Vendor Audiobook SaaS Cast Computer Care File Sharing Instant Messaging Business Mangement Accountants Worker Fax Server Travel Monitor Cortana Wire Emergency Knowledge IT solutions Excel Workforce Search Engine Internet exploMicrosoft Users Shadow IT Audit Tools Amazon Thought Leadership Music Automobile Trending iPhone HIPAA NIST Running Cable Display Information Technology Authentication Streaming Media WiFi Augmented Reality Relocation Recycling Smart Technology Sync Rootkit Root Cause Analysis Reputation Google Apps Smart Office Network Congestion Tip of the week Telecommuting Bing Advertising Virtual Reality Thank You Twitter Congratulations Webinar Company Culture Compliance CrashOverride Printers IT solutions Managing Stress Regulation