Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Tech: Social Media

Know Your Tech: Social Media

You see the term “social media” thrown around all the time, but what does it mean for both individual users and whole businesses? Organizations that understand the importance of social media have a unique advantage over other businesses in the same industry, be it a way to attract more consumers or a way to protect against common security threats that find their home on these websites.

0 Comments
Continue reading

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

While it’s a security best practice to keep strangers off of your Facebook account, you might feel that it’s understandable to accept an unknown request for the sake of networking or otherwise. This isn’t the ideal way to approach Facebook, but you do have a unique opportunity to allow users to view your profile and follow your public posts, without the need to accept a friend request.

0 Comments
Continue reading

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Ordinary fishing, where you hope for a simple-minded fish to latch onto your hook, relies on using a proper lure. The same can be said for the virtual method of phishing, where a hacker will use a similar type of “lure” to convince the target to bite. These phishing scams are especially useful for hackers who want to take advantage of social media to find new targets. A recent study has shown that this is a surprisingly effective method of phishing.

0 Comments
Continue reading

Tip of the Week: A Step-By-Step Guide to Downloading Your Facebook Information

Tip of the Week: A Step-By-Step Guide to Downloading Your Facebook Information

The longer you use Facebook, the more personal content you hand over to the social media empire. Sharing content is what drives the social media experience, but what if you want your content back? Surprisingly, Facebook makes this easy.

0 Comments
Continue reading

Tip of the Week: How to Avoid Oversharing on Social Media

b2ap3_thumbnail_social_network_security_400.jpgSocial media, as wonderful a tool for connecting and communicating as it is, does have its dangers. Fortunately, these risks may be mitigated through careful deliberation and pragmatic posting habits, but only if you know what they are. What follows are some easy habits to encourage a heightened state of security both digitally and in the physical world.

0 Comments
Continue reading

You Can’t Afford to Ignore a Ticked Off Customer

b2ap3_thumbnail_angry_customers_400.jpgHaving confidence in your ability to run your business is an important thing to have, but it doesn’t matter how much confidence you have if your customers beg to differ. After all, without them, your business wouldn’t be where it is today. This is why it’s important to listen to what your customers say, and if it’s not positive, you need to resolve the problem as quickly as possible.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Google Hosted Solutions Hackers Malware Backup Internet Innovation User Tips Mobile Devices Network Security Microsoft Software Data Windows 10 Smartphones Efficiency Productivity Email Hardware Workplace Tips Business Browser VoIP Tech Term Productivity Computer communications Business Continuity Disaster Recovery Smartphone IT Services Data Backup Business Management Ransomware Miscellaneous Android Windows Cybercrime Network Cloud Computing Server Data Recovery Outsourced IT Office Chrome Automation Alert Artificial Intelligence Quick Tips Communication Telephone Systems Computers Managed IT Services Windows 10 Router Internet of Things Save Money Managed IT Services Upgrade Small Business Facebook Collaboration IT Support Health Cybersecurity Money Law Enforcement Social Media Virtualization Wi-Fi Spam Password Gadgets Social Engineering Office 365 Operating System Mobile Device Office Tips Passwords How To Holiday Applications App Work/Life Balance Word Google Drive Two-factor Authentication Bandwidth Bring Your Own Device Information Gmail BDR Mobile Device Management Private Cloud Settings History Remote Computing Phishing Encryption Application Safety Data Management Recovery Data Security VPN Mobility Apps Scam Microsoft Office Meetings Vulnerability Paperless Office Keyboard Voice over Internet Protocol Managed Service Mouse Managed Service Provider Data Protection HaaS Entertainment Connectivity Data Breach Hacking Marketing Networking Sports Flexibility Wearable Technology Cleaning Avoiding Downtime Patch Management Augmented Reality USB PDF Comparison Spam Blocking IT Management Google Docs Human Resources Cryptocurrency Saving Money Training Servers Telephony YouTube IT Plan Website Legal Battery Remote Monitoring Black Market Windows 7 eWaste Managed IT CES Big Data Identity Theft Business Intelligence Software as a Service Infrastructure The Internet of Things Unsupported Software Electronic Medical Records Charger Internet Exlporer Update Virtual Assistant Mobile Computing Government OneNote Retail Botnet Content Management Robot Machine Learning Public Cloud DDoS Save Time Best Practice Telephone System Firewall Employer-Employee Relationship Downtime IT Support Redundancy User Error Blockchain Fraud Social BYOD Access Control Hiring/Firing Physical Security End of Support Data Storage Budget Data storage Apple Root Cause Analysis HIPAA NIST Network Congestion Customer Relationship Management Tip of the week Amazon Telecommuting Thought Leadership Rootkit Display Mobile Office Computer Fan Recycling IBM Database Chromecast Authentication Employer Employee Relationship Netflix Bing Instant Messaging Google Apps Smart Office Risk Management Assessment Google Search Internet exploMicrosoft Users Two Factor Authentication webinar Warranty Monitor Notifications Security Cameras iPhone Tech Support IT Consultant Remote Worker Customer Service Windows Server 2008 Amazon Web Services FENG Shortcut Value Criminal Troubleshooting Supercomputer Business Technology Information Technology Social Networking HBO Remote Work Specifications Nanotechnology Computer Accessories Help Desk Relocation Windows 10s Workers Document Management Politics Television Proactive IT Advertising Virtual Reality Practices Conferencing Printer Reputation Vendor Management Hacker Running Cable Shadow IT Data loss IT solutions Staff Safe Mode Transportation Samsung Wiring Techology Fax Server Online Shopping Addiction Humor HVAC Biometric Security Going Green Streaming Media Outlook Smart Tech Bluetooth Skype Public Computer Net Neutrality Worker Commute Hosted Computing Emails Administrator Customers Cache Content Smartwatch Files Education Screen Mirroring Benefits Leadership Unified Threat Management Lithium-ion battery Flash Evernote Search Environment Enterprise Content Management Books Current Events MSP Laptop Wireless Frequently Asked Questions Credit Cards Millennials Shortcuts Solid State Drive Maintenance Start Menu Password Manager Experience ISP NarrowBand Software Tips Multi-Factor Security Inventory Microchip Video Games Wireless Charging Wireless Internet Audiobook SaaS Employee Computing Infrastructure Cast Computer Care Digital Signature Camera How to Uninterrupted Power Supply Travel Password Management Emergency Knowledge File Sharing Touchpad Excel Workforce Devices Worker Vendor Audit Tools Business Mangement Music Automobile Cryptomining Hybrid Cloud Distributed Denial of Service Wireless Technology Trending Search Engine Scalability People Biometrics Sync Cortana Wire Digital Signage WiFi Accountants Smart Technology Programming Managing Stress Regulation Twitter Thank You Webinar CrashOverride Congratulations Company Culture IT solutions Compliance Printers
QR-Code