Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Tech: Social Media

Know Your Tech: Social Media

You see the term “social media” thrown around all the time, but what does it mean for both individual users and whole businesses? Organizations that understand the importance of social media have a unique advantage over other businesses in the same industry, be it a way to attract more consumers or a way to protect against common security threats that find their home on these websites.

0 Comments
Continue reading

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

While it’s a security best practice to keep strangers off of your Facebook account, you might feel that it’s understandable to accept an unknown request for the sake of networking or otherwise. This isn’t the ideal way to approach Facebook, but you do have a unique opportunity to allow users to view your profile and follow your public posts, without the need to accept a friend request.

0 Comments
Continue reading

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Ordinary fishing, where you hope for a simple-minded fish to latch onto your hook, relies on using a proper lure. The same can be said for the virtual method of phishing, where a hacker will use a similar type of “lure” to convince the target to bite. These phishing scams are especially useful for hackers who want to take advantage of social media to find new targets. A recent study has shown that this is a surprisingly effective method of phishing.

0 Comments
Continue reading

Tip of the Week: A Step-By-Step Guide to Downloading Your Facebook Information

Tip of the Week: A Step-By-Step Guide to Downloading Your Facebook Information

The longer you use Facebook, the more personal content you hand over to the social media empire. Sharing content is what drives the social media experience, but what if you want your content back? Surprisingly, Facebook makes this easy.

0 Comments
Continue reading

Tip of the Week: How to Avoid Oversharing on Social Media

b2ap3_thumbnail_social_network_security_400.jpgSocial media, as wonderful a tool for connecting and communicating as it is, does have its dangers. Fortunately, these risks may be mitigated through careful deliberation and pragmatic posting habits, but only if you know what they are. What follows are some easy habits to encourage a heightened state of security both digitally and in the physical world.

0 Comments
Continue reading

You Can’t Afford to Ignore a Ticked Off Customer

b2ap3_thumbnail_angry_customers_400.jpgHaving confidence in your ability to run your business is an important thing to have, but it doesn’t matter how much confidence you have if your customers beg to differ. After all, without them, your business wouldn’t be where it is today. This is why it’s important to listen to what your customers say, and if it’s not positive, you need to resolve the problem as quickly as possible.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Hackers Google Hosted Solutions Backup Malware Network Security Microsoft Innovation User Tips Mobile Devices Software Data Internet Windows 10 Smartphones Business Email Browser Hardware Efficiency Tech Term Computer Business Continuity Disaster Recovery Smartphone VoIP Productivity Workplace Tips Ransomware Miscellaneous Data Backup IT Services Productivity communications Android Cybercrime Business Management Network Alert Office Chrome Data Recovery Automation Outsourced IT Windows Cloud Computing Managed IT Services Telephone Systems Artificial Intelligence Communication Save Money Upgrade Computers Managed IT Services Router Internet of Things Server Collaboration Money Law Enforcement Cybersecurity Virtualization Social Media Windows 10 Small Business Facebook Quick Tips Social Engineering Health IT Support How To Office 365 Applications Wi-Fi Office Tips Passwords Password App Spam Holiday Gadgets Bring Your Own Device Information Gmail Operating System Mobile Device Management Settings Word History BDR Google Drive Remote Computing Mobile Device Work/Life Balance Bandwidth Two-factor Authentication Hacking Microsoft Office Scam Managed Service Data Protection Flexibility Data Security Mouse Managed Service Provider Connectivity Entertainment Safety Keyboard Marketing Mobility Apps Networking Data Breach Sports Encryption Application Data Management Vulnerability Voice over Internet Protocol VPN Private Cloud Recovery Phishing HaaS Meetings Government Saving Money USB Servers Redundancy YouTube Public Cloud Downtime IT Support Training BYOD eWaste Identity Theft CES Physical Security The Internet of Things Infrastructure Paperless Office Data Storage Virtual Assistant Data storage Internet Exlporer End of Support Avoiding Downtime Software as a Service Comparison Mobile Computing Big Data Content Management Electronic Medical Records Spam Blocking DDoS Robot Machine Learning PDF IT Management Google Docs Best Practice Retail Telephone System Charger User Error Fraud Blockchain Access Control Telephony IT Plan Website Legal Windows 7 Social Remote Monitoring Firewall Employer-Employee Relationship Business Intelligence Wearable Technology Cleaning Budget Battery Managed IT Black Market Hiring/Firing Unsupported Software Update OneNote Botnet Patch Management Human Resources Software Tips Multi-Factor Security Employer Employee Relationship Netflix Remote Work Nanotechnology Search Solid State Drive Start Menu Customer Service IBM Criminal Laptop Wireless Bing Practices Video Games Social Networking Risk Management Assessment Workers Document Management Warranty Cast Computer Care Shortcut Two Factor Authentication webinar Staff Safe Mode Security Cameras Excel Workforce Running Cable Shadow IT Online Shopping Addiction Computing Infrastructure Remote Worker Travel IT Consultant Help Desk Trending IT solutions Computer Accessories Smart Tech How to Audit Tools Streaming Media Fax Server Troubleshooting Supercomputer HVAC Touchpad Hosted Computing Scalability Sync Politics Television Hybrid Cloud Printer WiFi Conferencing Hacker Tip of the week Telecommuting Vendor Management Evernote Cache Wiring Root Cause Analysis Lithium-ion battery Transportation Samsung Environment Bluetooth Credit Cards Apple Computer Fan Enterprise Content Management Emails Inventory Instant Messaging NarrowBand Public Computer Password Manager Administrator Digital Signature Monitor Smartwatch Windows Server 2008 Content Wireless Charging Wireless Internet Internet exploMicrosoft Users Unified Threat Management Maintenance Benefits Leadership Shortcuts HBO Specifications Uninterrupted Power Supply Devices iPhone MSP FENG Value Books Current Events Password Management Save Time Relocation Windows 10s Distributed Denial of Service Experience Wireless Technology Business Mangement Information Technology Microchip People Accountants Reputation Audiobook SaaS Cortana Wire Advertising Virtual Reality Camera Data loss Techology Vendor Outlook Worker Amazon Thought Leadership File Sharing Programming Biometrics Emergency Knowledge HIPAA NIST Mobile Office Authentication Humor Skype Customer Relationship Management Music Chromecast Automobile Recycling Going Green Search Engine Customers Flash Google Apps Smart Office Worker Commute Screen Mirroring Notifications Smart Technology Cryptocurrency Display Frequently Asked Questions Millennials Tech Support Rootkit Amazon Web Services Files Education Augmented Reality Network Congestion CrashOverride Thank You Webinar Congratulations Company Culture Compliance IT solutions Managing Stress Regulation Printers Twitter
QR-Code