ResidentialBusinessWholesaleAbout Us
 › 
 › 
By Hawaiian Telcom on Tuesday, November 24, 2015 1:35:56 PM

This article was originally published in the Honolulu Star-Advertiser on November 3, 2015

With password breaches in recent years, it's become an imperative not to reuse passwords. People use simple passwords because it's too hard to remember strong ones. This is where a password manager can help.

By Hawaiian Telcom on Monday, March 2, 2015 4:02:34 PM

This article was originally published in the Honolulu Star-Advertiser on February 24, 2015

The Internet of Things (IoT) is a technology movement to enable connectivity to devices, from household items to industrial equipment. Learn what you must consider when evaluating and purchasing these devices.

By Hawaiian Telcom on Wednesday, January 28, 2015 3:47:11 PM

This article was originally published in the Honolulu Star-Advertiser on January 27, 2015

If you have an email address, you've probably been the target of a phishing scam. Find out how phishing attacks work and how to detect them.

By Hawaiian Telcom on Tuesday, December 30, 2014 2:57:43 PM

This article was originally published in the Honolulu Star-Advertiser on December 30, 2014

With countless data breaches occurring even at sizable companies like Sony, Home Depot and Target, it's evident that we need to better prepare and respond to data breaches. Here are five steps that can help.

By Hawaiian Telcom on Friday, December 19, 2014 4:45:58 PM

Follow these tips to protect yourself from becoming a phishing scam victim.

By Hawaiian Telcom on Tuesday, December 2, 2014 10:11:05 AM

This article was originally published in the Honolulu Star-Advertiser on December 2, 2014

The cybersecurity field is growing rapidly, with more new and vital roles to fill in government and the private sector than the number of qualified applicants. To prepare our future network defenders, CyberPatriot is working to inspire students toward careers in cybersecurity or STEM fields. CyberPatriot features a National Youth Cyber Defense Competition in which students defend networks against online adversaries. In 2013, Leilehua High School made it to the national finals! It's an exciting opportunity for Hawaii's middle and high school students to learn and test the waters in the cybersecurity realm.

By Hawaiian Telcom on Monday, October 13, 2014 9:56:02 AM

This article was originally published in the Honolulu Star-Advertiser on October 7, 2014 

This month marks the 11th anniversary of the Department of Homeland Security's (DHS) National Cyber Security Awareness Month, an effort designed to remind the public of the hazards they might face while using the Internet. Read DHS's five weekly focus topics for this month and additional tips from our Expert.

By Hawaiian Telcom on Tuesday, September 9, 2014 2:34:40 PM

This article was originally published in the Honolulu Star-Advertiser on September 9, 2014 

Few people had heard the term "catfishing" before Manti Te'o famously revealed last year that he had been a victim of the scam, which involves people who create fake social media profiles to pursue online romances. But Te'o is hardly alone in being duped by ficticious online personas, and most instances of catfishing have far greater--and often financial--consequences. Read what our Expert recommends so we don't fall prey to catfishing.

By Hawaiian Telcom on Friday, August 15, 2014 12:33:30 PM

We’d like to remind all our High-Speed Internet customers of the dangers of illegal downloading of music, movies, and television shows from the Internet. Hawaiian Telcom is receiving notices that some of our customers are copying or sharing songs, movies, and television programs from the Internet in violation of the copyright laws. These notices identify the Internet Protocol (IP) addresses of the alleged violators and threaten to take legal action against the violators. There are legal ways to find movies, television shows and music on the Internet. Learn more...

 

By Hawaiian Telcom on Friday, August 15, 2014 11:32:37 AM

This article was originally published in the Honolulu Star-Advertiser on August 12, 2014 

News broke last week that a Russian crime syndicate had amassed the largest known collection of Internet credentials, including 1.2 billion username-and-password combinations. Thanks to events such as this, Two-Factor Authentication, sometimes abbreviated 2FA, is gaining momentum. 2FA has been around for decades, but it only recently has become accessible to the general public. 

By Hawaiian Telcom on Friday, June 20, 2014 9:20:37 AM
Online advertising is big business. In 2013, U.S. online ad revenue reached $4.28 billion, surpassing broadcast television ads for the first time in history. That’s a 17% increase over the prior year. Unfortunately, as advertisers scramble to claim their slice of this growing pie, they sometimes leave the door open to cybercriminals who exploit weaknesses in the ad ecosystem to spread viruses and other malicious software through malicious advertisements or “malvertisements.”
By Hawaiian Telcom on Tuesday, May 20, 2014 8:45:42 AM

This article was originally published in the Honolulu Star-Advertiser on May 20, 2014 

In recent columns I've advocated for the general use of password managers as a mechanism to improve your password hygiene. Password managers generate strong passwords on a per-site basis and store them, eliminating the need for you to remember dozens of passwords for the different websites that you regularly visit. It also should eliminate the more common and very unsafe practice of reusing the same password on different websites. Naturally the question has come up: How safe are password managers? Aren't they the digital equivalent of putting all our eggs in one basket?

By Hawaiian Telcom on Tuesday, April 22, 2014 8:25:24 AM
This article was originally published in the Honolulu Star-Advertiser on April 22, 2014 

With the recent Heartbleed vulnerability blowing up in the news, it's a good time to remind everyone that good passwords, and good password hygiene, are critical for the long-term protection of you and your online accounts. Site operators have a huge role to play in keeping their systems secure from hackers, but if you use weak passwords or don't change them often, you can weaken the site's security.

Here are some key tips for making sure you are doing your part in keeping your accounts secure...
By Hawaiian Telcom on Wednesday, March 13, 2013 8:37:32 AM

With Spring Break around the corner many of us will be traveling with our devices, so now is the perfect time to take a few steps toward mobile security, before it’s too late.

By Hawaiian Telcom on Thursday, November 29, 2012 4:43:56 PM

The bad guys routinely use a combination of methods to take advantage of the holiday shopping season.  We need to remain wary and question everything that looks appealing, especially among the deals that look too good to be true.   Schemes such as fake email campaigns, embedded links, intentionally misguided results from search engines, and messaging false ads from within social networks should be on your radar.

By Hawaiian Telcom on Sunday, October 7, 2012 8:41:02 PM

When internet fraudsters impersonate a business to trick you into giving out your personal information, it’s called phishing. Don't reply to email, text, or pop-up messages that ask for your personal or financial information. Don’t click on links within them either – even if the message seems to be from an organization you trust. It isn’t. Legitimate businesses don’t ask you to send sensitive information through insecure channels.

By Hawaiian Telcom on Sunday, October 7, 2012 8:40:04 PM

Crooks use clever schemes to defraud millions of people around the globe every year. They often combine sophisticated technology with age-old tricks to get people to send money or give out personal information. Many scammers insist that you wire money, or pressure you to make an important decision on the spot. Don’t fall for such tactics. Use these tips to help you avoid common scams.

By Hawaiian Telcom on Sunday, October 7, 2012 8:35:37 PM

Identity theft occurs when someone uses your name, your Social Security number, or some other personal, financial, or medical information without your permission to commit fraud or other crimes. Online threats like phishing, malware, or hacking can lead to identity theft.

If your personal information is lost, stolen, or otherwise compromised, you can minimize the potential damage from identity theft.