ResidentialBusinessWholesaleAbout Us
My AccountCheck EmailCheck VoicemailCustomer ServiceContact Us
 ›  ›  ›  › Security Risks

Protect your computer from potential threats by staying informed and up to date on the latest security threats. Learn about the different types of threats, their dangers, and their symptoms below.

If your computer's infected or experiencing any of the below symptoms, Hawaiian Telcom has partnered with McAfee, the world's leading security company, to provide you with the support you need. Visit McAfee's Virus Removal Services to get your computer back on track.

Security Threat Guide

What Is Spyware?
Spyware is a wide range of unwanted programs that exploit infected computers for commercial gain. They can deliver unsolicited pop-up advertisements, steal personal information (including financial information such as credit card numbers), monitor web-browsing activity for marketing purposes, or route HTTP requests to advertising sites.

What Is The Risk?
Most spyware compromises your computer's security and collects personal infromation from your computer, putting you at risk of identity theft. Spyware can also access your email and personal network sites, sending spam and spyware to your family and friends.

Symptoms
  • Advertisements pop up often
  • Unwanted toolbars are added to your web browser 
  • Your desktop or web browser appear different 
  • Your computer is running slower than usual
  • Friends and family report receiving strange email from you

What Is A Virus?
A virus is a manmade program or piece of code that causes an unexpected, usually negative, event. Viruses are often disguised games or images with clever marketing titles.

What Is The Risk?
Viruses can harm your computer, compromise its security, and damage valuable files.

 Symptoms
  • Your computer is running slower than usual 
  • Programs and applications may not run correctly
  • Your computer freezes or spordically restarts
  • Error messages pop-up regularly
  • Programs or files are missing
  • Files you don't recognize appear on your computer

What Is A Worm?
Computer Worms are viruses that reside in the active memory of a computer and duplicate themselves. They may send copies of themselves to other computers through email or Internet Relay Chat (IRC).

What Is The Risk?
Worms, like viruses can harm your computer, compromise its security and damage valuable files. If your computer contracts a worm, the worm may send copies of itself to your family and friends, causing harm to their computers as well.

 Symptoms
  • Your computer is running slower than usual 
  • Programs and applications may not run correctly
  • Your computer freezes or sporadically restarts
  • Error messages pop-up regularly
  • New windows open sporadically
  • Files you don't recognize appear on your computer
  • Friends and family report receiving strange email from you

What Is A Trojan Horse?
Trojan horse program is a malicious program that pretends to be a benign application; a Trojan horse program purposefully does something the user does not expect. Trojans are not viruses since they do not replicate, but Trojan horse programs can be just as destructive.

What Is The Risk?
Trojan horses are typically contracted through email or Internet Relay Chat (IRC). They cause harm by damaging valuable files and compromising computer security, making your computer vulnerable to hackers and intruders. 

 Symptoms
  • Your computer is running slower than usual 
  • Programs and applications may not run correctly
  • Your computer freezes or sporadically restarts
  • Error messages pop-up regularly
  • Strange messages or images sporadically appear
  • Music plays sporadically
  • New windows open sporadically
  • Programs or files are missing
  • Files you don't recognize appear on your computer  

 What Is Phishing?
Phishing is a form of criminal activity using social engineering techniques through email or instant messaging. Phishers attempt to fraudulently acquire personal information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication.

What Is The Risk?
Typically, phishing emails ask recipients to click on the link in the email to verify or update contact details or provide credit card information. Like spam, phishing emails are sent to a large number of email addresses, with the expectation that someone will read the spam and disclose their personal information.

Symptoms
  • Emails that ask for personal information
  • Emails that direct you to other websites 
  • Emails that ask you to make a phone call 
  • Emails that ask you to log-in to verify an account
  • Emails that claim you have won a prize
  • Emails that threaten to close an account or discontinue a membership 
  • These emails may look legitimate, and have convincing logos or graphics 
 

The Hawaiian Telcom company names and logos and all related product and service names, design marks and slogans are the trademarks or service marks of Hawaiian Telcom, Inc., or its subsidiaries or affiliates (collectively "Hawaiian Telcom"). You are not authorized to use any Hawaiian Telcom name or mark in any advertising, publicity or in any other commercial manner without the prior written consent of Hawaiian Telcom, Inc. 

© 2017 Hawaiian Telcom. All Rights Reserved.  | Investor Relations | Yellow Pages | Careers | About Us  Privacy policy | Broadband Policy | Service Terms and Conditions | Tariffs | Site Map