Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Stuck Using a Public PC? Be Sure to Follow These 2 Privacy Tips

Tip of the Week: Stuck Using a Public PC? Be Sure to Follow These 2 Privacy Tips

Full disclosure: we don’t recommend doing anything important, or really anything at all, on a public computer. However, we understand that sometimes life works out in an unideal fashion, and sometimes you can be stuck doing something you shouldn’t, and otherwise wouldn’t. Even in these cases, there are steps you can take to preserve your security.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Google Hackers Backup Malware Hosted Solutions Microsoft Mobile Devices Network Security Software Data Windows 10 Innovation Internet User Tips Smartphones Business Email Browser Hardware Tech Term Efficiency Computer Business Continuity Disaster Recovery Smartphone VoIP Productivity Miscellaneous IT Services Data Backup Workplace Tips Ransomware Cybercrime Business Management communications Android Productivity Network Outsourced IT Office Chrome Automation Cloud Computing Data Recovery Windows Alert Managed IT Services Computers Router Managed IT Services Save Money Communication Upgrade Server Artificial Intelligence Telephone Systems Social Media Internet of Things Virtualization Small Business Quick Tips Money Law Enforcement Facebook Windows 10 Collaboration Password Cybersecurity How To Office Tips Passwords Holiday App Spam IT Support Office 365 Applications Wi-Fi Social Engineering Health Mobile Device Management Settings History Remote Computing Word Mobile Device Work/Life Balance Information Two-factor Authentication Bandwidth Bring Your Own Device Gadgets BDR Gmail Google Drive Operating System Mobility Apps Mouse Managed Service Provider Data Breach Entertainment Marketing Data Security Phishing Networking Private Cloud HaaS Sports Encryption Hacking Application Scam Recovery Microsoft Office Data Management VPN Voice over Internet Protocol Vulnerability Managed Service Flexibility Safety Data Protection Connectivity Keyboard Redundancy Machine Learning Charger eWaste The Internet of Things Telephone System Internet Exlporer BYOD Fraud Mobile Computing Blockchain Data Storage Access Control Robot Firewall Employer-Employee Relationship Legal Retail Black Market DDoS Battery Best Practice Avoiding Downtime Comparison Hiring/Firing IT Management Google Docs Spam Blocking User Error Social Patch Management Software as a Service Government Human Resources Budget USB IT Plan Website Telephony Servers Public Cloud Wearable Technology Cleaning Downtime IT Support Windows 7 Training Remote Monitoring Business Intelligence Managed IT Unsupported Software Identity Theft Saving Money Physical Security CES Data storage Infrastructure Paperless Office End of Support Meetings Update Big Data YouTube OneNote Botnet Virtual Assistant Electronic Medical Records Content Management PDF Computer Care Inventory Benefits Monitor Leadership Streaming Media Augmented Reality Password Manager Content Internet exploMicrosoft Users Display Cast Books Current Events Excel Workforce Wireless Charging Wireless Internet iPhone Bing Travel Digital Signature Trending Devices Save Time Relocation Lithium-ion battery Warranty Audit Tools Password Management Experience Information Technology WiFi Reputation Remote Worker Sync Business Mangement Audiobook SaaS Advertising Environment Virtual Reality Security Cameras Emergency Knowledge Techology NarrowBand Tip of the week Telecommuting Cortana Wire Maintenance Worker Help Desk Root Cause Analysis Accountants Amazon Thought Leadership Humor Printer Computer Fan HIPAA NIST Music Going Green Automobile Authentication Smart Technology Customers Wiring Recycling Worker Commute Uninterrupted Power Supply Hacker Network Congestion Distributed Denial of Service Wireless Technology Windows Server 2008 Google Apps Smart Office Rootkit Files People Education Laptop IBM Wireless HBO Specifications Amazon Web Services Programming Biometrics Employer Employee Relationship Netflix Search Administrator FENG Value Cryptocurrency Remote Work Nanotechnology Customer Relationship Management Two Factor Authentication webinar Video Games Unified Threat Management Windows 10s Criminal Risk Management Assessment Practices IT Consultant Chromecast MSP Workers Document Management Mobile Office Computing Infrastructure Shortcuts Data loss Troubleshooting Touchpad Supercomputer Outlook Online Shopping Addiction Computer Accessories How to Notifications Microchip Staff Safe Mode Smart Tech Customer Service Conferencing Scalability Camera Skype HVAC Politics Television Hybrid Cloud Tech Support Hosted Computing Social Networking Transportation Samsung File Sharing Flash Shortcut Vendor Management Vendor Screen Mirroring Frequently Asked Questions Millennials Evernote Cache Bluetooth Apple Search Engine Software Tips Multi-Factor Security Credit Cards Fax Server Emails Instant Messaging Solid State Drive Start Menu Enterprise Content Management IT solutions Public Computer Running Cable Shadow IT CrashOverride Webinar Thank You Company Culture Compliance IT solutions Congratulations Managing Stress Regulation Twitter Smartwatch Printers
QR-Code