ResidentialBusinessWholesaleAbout Us
 › 
 › 
Author: Created: Tuesday, December 15, 2015 8:35:20 AM
Technology Blog
By Hawaiian Telcom on Tuesday, October 03, 2017 8:18:03 PM

This article was originally published in the Honolulu Star-Advertiser on October 3, 2017

Every business that collects and stores sensitive data is at risk because any vulnerability in the security of this data can result in devastating consequences for your business and your customers.

By Hawaiian Telcom on Tuesday, September 05, 2017 7:03:54 PM

This article was originally published in the Honolulu Star-Advertiser on September 5, 2017

With fiber optics, a lot of data can flow very quickly over great distances without any loss of bandwidth or fluctuations in performance.

By Hawaiian Telcom on Wednesday, August 09, 2017 1:49:52 AM

This article was originally published in the Honolulu Star-Advertiser on August 8, 2017

Most of us depend on broadband access every day, at work and at home. Laptops, personal computers, tablets, and smartphones powered by broadband connections enable us to communicate quickly with family, friends and business associates from around the world, to bank and shop from anywhere, or to simply watch TV.

By Hawaiian Telcom on Wednesday, July 12, 2017 5:48:04 AM

This article was originally published in the Honolulu Star-Advertiser on July 11, 2017



According to published reports, many victims of recent attacks were enticed to open the malware by an email purporting to be legitimate but actually downloaded malware or ransomware on their computers. This type of phishing email remains one of the biggest threats to companies today.

By Hawaiian Telcom on Tuesday, June 13, 2017 10:43:42 AM

This article was originally published in the Honolulu Star-Advertiser on June 13, 2017

References to fake news has certainly increased over the last two years. What is fake news?

By Hawaiian Telcom on Wednesday, May 24, 2017 10:48:05 AM

Q&A from Hawaiian Telcom University 2017 digital marketing panel

By Hawaiian Telcom on Friday, May 19, 2017 7:53:23 PM

This article was originally published in the Honolulu Star-Advertiser on May 19, 2017

Over the last three years, a number of news stories and guidance have been published about the dangers of ransomware and ways to protect your information. However, the world is still susceptible.

By Hawaiian Telcom on Saturday, April 29, 2017 3:26:19 AM

This article was originally published in the Honolulu Star-Advertiser on April 18, 2017

A recent survey by Fluent identified YouTube, Instagram, Snapchat and Facebook as the most popular networks used by adults age 18 to 24. Naturally, many preteens and teenagers are clamoring for accounts on these social networking platforms, adding to the many challenges of parenting on top of school, extracurricular activities, family, holidays and all the associated drama.

By Hawaiian Telcom on Tuesday, March 21, 2017 9:20:08 PM

This article was originally published in the Honolulu Star-Advertiser on March 21, 2017

Whether you prepare your own filings or use a professional tax preparer, there are cybersecurity actions that you should consider.

By Hawaiian Telcom on Monday, February 27, 2017 6:39:27 PM

HBH began with an in-house Microsoft Exchange server handling all email communications across the organization’s 175 mailboxes. When the server crashed it was evident HBH needed to consider a cloud-based managed service.

By Hawaiian Telcom on Friday, February 24, 2017 1:21:45 AM

This article was originally published in the Honolulu Star-Advertiser on February 21, 2017

Unauthorized leaks of information are usually enabled by individuals who had access to sensitive information and purposely used that information beyond their authorization or distributed it to unauthorized parties.

By Hawaiian Telcom on Friday, February 24, 2017 1:12:11 AM

This article was originally published in the Honolulu Star-Advertiser on January 24, 2017

Software development is currently unregulated, which has upsides and downsides. But there are indications that this may be about to change.

By Hawaiian Telcom on Tuesday, November 29, 2016 9:23:29 PM

This article was originally published in the Honolulu Star-Advertiser on November 29, 2016

Voice-enabled applications have reached a critical mass, as they are now essential components of all major computing platforms and literally in the hands of hundreds of millions of people through mobile devices.

By Hawaiian Telcom on Thursday, November 03, 2016 1:56:01 AM

This article was originally published in the Honolulu Star-Advertiser on November 1, 2016

The distributed denial of service (DDoS) attack on Oct. 21 prevented access to major websites and services, including Twitter, Netflix, Reddit, CNN, sites based in Europe and hundreds more.

By Hawaiian Telcom on Saturday, October 29, 2016 3:48:26 AM
Keep your business up to security snuff with these critical information and tips.
By Hawaiian Telcom on Friday, October 28, 2016 7:16:50 AM

This article was originally published in Hawaii Business Magazine, July 2016

Top-of-the-line security keeps your business safe.

By Hawaiian Telcom on Thursday, October 13, 2016 9:45:14 PM

This article was originally published in the Honolulu Star-Advertiser on October 4, 2016

October is National Cybersecurity Awareness Month. The purpose of this annual campaign is to raise awareness about cybersecurity.

By Hawaiian Telcom on Tuesday, August 09, 2016 8:27:37 PM

This article was originally published in the Honolulu Star-Advertiser on August 9, 2016

On July 27 Apple CEO Tim Cook announced that Apple recently sold the billionth iPhone. It is a staggering achievement. The first iPhone was sold in 2007, and it took only nine years to sell 1 billion.

By Hawaiian Telcom on Wednesday, July 13, 2016 2:07:18 AM

This article was originally published in the Honolulu Star-Advertiser on July 12, 2016

With summer in full swing, many of us are traveling to the mainland and foreign destinations for vacations and business. Along with our toothbrushes, clothes and other traveling essentials, we are bringing our internet-enabled mobile devices such as smartphones and laptops. These devices have become essential for maintaining communications while away, enabling business on the go and making it possible to share every moment of your traveling experience in real time.

By Hawaiian Telcom on Saturday, June 25, 2016 2:42:50 AM

This article was originally published in Hawaii Business Magazine in July 2016.

Technological advances open up a world of opportunity for businesses, providing ways to get products and services to customers as efficiently as possible. Unfortunately, new technology offers more opportunity to hackers, too.

By Hawaiian Telcom on Thursday, June 16, 2016 8:28:27 AM

As new and innovative technologies are constantly emerging, it is important for your business to embrace these changes by adapting to customers’ needs.

By Hawaiian Telcom on Thursday, June 16, 2016 6:26:42 AM

This article was originally published in the Honolulu Star-Advertiser on May 17, 2016

Bill Gates predicted the death of the password in 2004, and others have wished for its demise over the years. However, only now are we starting to see passwords being incrementally replaced in the technology we use.

By Hawaiian Telcom on Wednesday, June 15, 2016 8:47:40 PM

This article was originally published in the Honolulu Star-Advertiser on June 14, 2016

If I were to choose a word that encapsulates the focus of the cybersecurity industry for the last two years, it would be “encryption.” However, the boon in increased encryption has created new challenges for enterprises.

By Hawaiian Telcom on Wednesday, June 15, 2016 8:32:23 PM

This article was originally published in the Honolulu Star-Advertiser on May 17, 2016

Bill Gates predicted the death of the password in 2004, and others have wished for its demise over the years. However, only now are we starting to see passwords being incrementally replaced in the technology we use.

By Hawaiian Telcom on Wednesday, April 20, 2016 1:47:13 AM

This article was originally published in the Honolulu Star-Advertiser on April 19, 2016

A recent study analyzing cybersecurity education at top American universities found that none of the top 10 computer science programs requires cybersecurity as a course for graduation. This means that thousands of computer experts who will be building our future technology might have no formal cybersecurity training.

By Hawaiian Telcom on Wednesday, March 23, 2016 5:42:50 AM

This article was originally published in the Honolulu Star-Advertiser on February 23, 2016

As data breaches become more common, we tend to pay less attention when we hear about hackers stealing millions of records containing sensitive personal and financial information. It’s becoming just another news story.

By Hawaiian Telcom on Tuesday, March 22, 2016 9:25:54 PM

This article was originally published in the Honolulu Star-Advertiser on March 22, 2016

The strength of the encryption hinges on the complexity of the conversion process, authorization process and special key. Strong encryption takes years to crack without the special key, but weak encryption can be cracked in seconds.

By Hawaiian Telcom on Wednesday, February 03, 2016 10:01:21 AM

You invest in technology to operate your business, but do you really know how effective it is? As Hawaii’s Technology Leader, Hawaiian Telcom encourages you to conduct a start of the year assessment to determine your current state of technology and prepare your business for growth.

By Hawaiian Telcom on Wednesday, February 03, 2016 12:05:49 AM

Many people in your organization have purchased exciting, new gadgets that recently hit the market. From smartphones to the latest tablets, these devices may soon appear in your workplace as part of a growing trend called Bring Your Own Device (BYOD), but will it suit your company?

By Hawaiian Telcom on Friday, January 29, 2016 12:09:45 AM

Last year there was a lot of hype around the term “cybersecurity intelligence” from information security service providers and consultants. Behind this buzz were substantive government actions that were intended to increase the sharing of intelligence on cyberthreats between the private industry and federal agencies.

By Hawaiian Telcom on Wednesday, December 30, 2015 7:11:44 PM

This article was originally published in the Honolulu Star-Advertiser on December 29, 2015

Are you looking to add extra security to some of your online accounts? If yes, you may want to consider multifactor authentication, or MFA, options. Also known as two-factor or two-step verification, access is granted when you provide more than one item to validate your identity.

By Hawaiian Telcom on Wednesday, December 30, 2015 5:45:53 PM

This article was originally published in the Honolulu Star-Advertiser on December 29, 2015

Roughly 34,000 Hawaiian Telcom TV subscribers on Oahu could see black on the KGMB and KHNL stations come Friday. Hawaiian Telcom and Raycom Media, owner of Hawaii News Now channels KGMB (CBS) and KHNL (NBC), failed to reach a new agreement to continue the partnership at the start of the new year.

By Hawaiian Telcom on Wednesday, December 16, 2015 5:08:43 AM

The unfortunate truth is that as cyber-crime continues to become more sophisticated, we will be more vulnerable to data breaches if we don't adapt to these threats. With that in mind, let's shift the focus from prevention only to establishing controls that help you prepare for a breach and minimize its impact.

By Hawaiian Telcom on Tuesday, December 15, 2015 7:08:09 PM

People often view information security as a technical problem for the IT staff to worry about. In reality, safeguarding intellectual property, sensitive customer information, financial data and the systems that keep your business running is a company-wide responsibility. As a leader, you can protect your business by thinking and talking about security in terms of risk management and how it affects your company’s goals.

By Hawaiian Telcom on Tuesday, December 15, 2015 7:07:01 PM

This article was originally published in the Honolulu Star-Advertiser on November 3, 2015

With password breaches in recent years, it's become an imperative not to reuse passwords. People use simple passwords because it's too hard to remember strong ones. This is where a password manager can help.

By Hawaiian Telcom on Tuesday, December 15, 2015 6:57:01 PM

This article was originally published in the Honolulu Star-Advertiser on November 4, 2014 

If you're not among the tens of millions of American consumers who have had their credit cards and other personal information breached in the last few months, you're in the shrinking minority. Here are some tips consumers can use to protect themselves.

By Hawaiian Telcom on Tuesday, December 15, 2015 6:54:58 PM

This article was originally published in the Honolulu Star-Advertiser on September 9, 2014 

Few people had heard the term "catfishing" before Manti Te'o famously revealed last year that he had been a victim of the scam, which involves people who create fake social media profiles to pursue online romances. But Te'o is hardly alone in being duped by ficticious online personas, and most instances of catfishing have far greater--and often financial--consequences. Read what our Expert recommends so we don't fall prey to catfishing.

By Hawaiian Telcom on Tuesday, December 15, 2015 6:52:35 PM

This article was originally published in the Honolulu Star-Advertiser on August 12, 2014 

News broke last week that a Russian crime syndicate had amassed the largest known collection of Internet credentials, including 1.2 billion username-and-password combinations. Thanks to events such as this, Two-Factor Authentication, sometimes abbreviated 2FA, is gaining momentum. 2FA has been around for decades, but it only recently has become accessible to the general public. 

By Hawaiian Telcom on Tuesday, December 15, 2015 6:51:51 PM

This article was originally published in the Honolulu Star-Advertiser on July 15, 2014 

When news broke in late June about Facebook running unsanctioned psychological experiments on their user population in the name of science, the reaction was overwhelmingly negative. The truth is that Facebook experiments on its user base quite frequently, and probably constantly. Facebook isn't alone here: Other social media sites conduct research on their users or allow third parties (like the government) to conduct their own. What can we learn from the revelations about these activities?

By Hawaiian Telcom on Tuesday, December 15, 2015 9:12:55 AM

In the spirit of giving this holiday season, a team of Hawaiian Telcom employees donated their time to further the work of the River of Life Mission. Every day the Mission helps hundreds of people visit from all walks of life to get meals, showers, clothing or help from social workers.

By Hawaiian Telcom on Tuesday, December 15, 2015 9:07:41 AM

Imagine being able to work form anywhere – at the office, home, the local café or on the go. Now you can with Desktop as a Service (DaaS) by SystemMetrics, a Hawaiian Telcom company. DaaS is a virtualized desktop

By Hawaiian Telcom on Tuesday, December 15, 2015 9:06:26 AM

This article was originally published in the Honolulu Star-Advertiser on August 11, 2015

Are you considering a career in cybersecurity? There were more than 75,000 information security analyst positions available in 2012, and it is projected that the number will climb to over 100,000 jobs by 2022, according to the U.S. Department of Labor’s Occupational Outlook Handbook. Reports from Cisco and Symantec indicate a shortage of talent with over 1 million unfilled openings globally. Fortunately, formal education programs are available on Oahu.

By Hawaiian Telcom on Tuesday, December 15, 2015 9:05:29 AM

This article was originally published in the Honolulu Star-Advertiser on May 19, 2015

Virtual desktop infstracture, or VDI, allows you to access your desktop from any Internet-connected device, including PCs, Macs, tablets and smartphones. With VDI, your view will always be the same, regardless of device, wich is very attractive to businesses with mobile workforces. Here are some security-related advantages to this environment.

By Hawaiian Telcom on Tuesday, December 15, 2015 9:04:51 AM

This article was originally published in the Honolulu Star-Advertiser on April 21, 2015

How can the Internet be used for illegal or secret activity since everything is traceable? Why, the Deep Web, of course! Learn more...

By Hawaiian Telcom on Tuesday, December 15, 2015 9:04:11 AM

Technology today is so pervasive. Our children have access to much more technology than many of us did when we were growing up. As parents, it’s important to keep a watchful eye on what your children are doing online, to know the games they play and websites they visit and to establish ground rules early.


By Hawaiian Telcom on Tuesday, December 15, 2015 9:03:23 AM

This article was originally published in the Honolulu Star-Advertiser on March 24, 2015

Ransomware is a class of malicious software that infects and restricts access to your computer until a payment is made. The method of infection is similar to that of phishing attacks and spreads through compromised websites and email containing malicious attachments or links. The key difference is ransomware is more overt and confronts you shortly after you've been compromised. Prevention is the key to defending yourself.

By Hawaiian Telcom on Tuesday, December 15, 2015 9:02:29 AM

This article was originally published in the Honolulu Star-Advertiser on February 24, 2015

The Internet of Things (IoT) is a technology movement to enable connectivity to devices, from household items to industrial equipment. Learn what you must consider when evaluating and purchasing these devices.

By Hawaiian Telcom on Tuesday, December 15, 2015 9:01:00 AM

This article was originally published in the Honolulu Star-Advertiser on January 27, 2015

If you have an email address, you've probably been the target of a phishing scam. Find out how phishing attacks work and how to detect them.

By Hawaiian Telcom on Tuesday, December 15, 2015 9:00:06 AM

This article was originally published in the Honolulu Star-Advertiser on December 30, 2014

With countless data breaches occurring even at sizable companies like Sony, Home Depot and Target, it's evident that we need to better prepare and respond to data breaches. Here are five steps that can help.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:58:45 AM

Follow these tips to protect yourself from becoming a phishing scam victim.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:57:34 AM

This article was originally published in the Honolulu Star-Advertiser on December 2, 2014

The cybersecurity field is growing rapidly, with more new and vital roles to fill in government and the private sector than the number of qualified applicants. To prepare our future network defenders, CyberPatriot is working to inspire students toward careers in cybersecurity or STEM fields. CyberPatriot features a National Youth Cyber Defense Competition in which students defend networks against online adversaries. In 2013, Leilehua High School made it to the national finals! It's an exciting opportunity for Hawaii's middle and high school students to learn and test the waters in the cybersecurity realm.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:56:02 AM

This article was originally published in the Honolulu Star-Advertiser on October 7, 2014 

This month marks the 11th anniversary of the Department of Homeland Security's (DHS) National Cyber Security Awareness Month, an effort designed to remind the public of the hazards they might face while using the Internet. Read DHS's five weekly focus topics for this month and additional tips from our Expert.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:53:47 AM

We’d like to remind all our High-Speed Internet customers of the dangers of illegal downloading of music, movies, and television shows from the Internet. Hawaiian Telcom is receiving notices that some of our customers are copying or sharing songs, movies, and television programs from the Internet in violation of the copyright laws. These notices identify the Internet Protocol (IP) addresses of the alleged violators and threaten to take legal action against the violators. There are legal ways to find movies, television shows and music on the Internet. Learn more...

 

By Hawaiian Telcom on Tuesday, December 15, 2015 8:51:03 AM

Online advertising is big business. In 2013, U.S. online ad revenue reached $4.28 billion, surpassing broadcast television ads for the first time in history. That’s a 17% increase over the prior year. Unfortunately, as advertisers scramble to claim their slice of this growing pie, they sometimes leave the door open to cybercriminals who exploit weaknesses in the ad ecosystem to spread viruses and other malicious software through malicious advertisements or “malvertisements.”

By Hawaiian Telcom on Tuesday, December 15, 2015 8:50:21 AM

This article was originally published in the Honolulu Star-Advertiser on May 20, 2014 

In recent columns I've advocated for the general use of password managers as a mechanism to improve your password hygiene. Password managers generate strong passwords on a per-site basis and store them, eliminating the need for you to remember dozens of passwords for the different websites that you regularly visit. It also should eliminate the more common and very unsafe practice of reusing the same password on different websites. Naturally the question has come up: How safe are password managers? Aren't they the digital equivalent of putting all our eggs in one basket?

By Hawaiian Telcom on Tuesday, December 15, 2015 8:49:34 AM

This article was originally published in the Honolulu Star-Advertiser on April 22, 2014

With the recent Heartbleed vulnerability blowing up in the news, it's a good time to remind everyone that good passwords, and good password hygiene, are critical for the long-term protection of you and your online accounts. Site operators have a huge role to play in keeping their systems secure from hackers, but if you use weak passwords or don't change them often, you can weaken the site's security.

Here are some key tips for making sure you are doing your part in keeping your accounts secure...

By Hawaiian Telcom on Tuesday, December 15, 2015 8:48:34 AM

This article was originally published in the Honolulu Star-Advertiser on March 25, 2014

Since word broke last month that Target was ultimately breached through a connection it had established with one of its vendors, many businesses are taking a hard look at what kind of access they've granted to their own vendors.

And with good reason. It will be a tough year or two for Target's shareholders, but Target will survive this. The sobering reality is that most small and medium businesses don't survive such events. With the average cost of a data breach spiraling to $188,000, 60 percent of small businesses shutter their doors within six months of a data breach.

So, what steps can small and medium-size businesses take to reduce the risk of a breach coming from an established connection with a vendor or business partner?

By Hawaiian Telcom on Tuesday, December 15, 2015 8:48:04 AM

This article was originally published in the Honolulu Star-Advertiser on February 25th, 2014

Many folks can't wait for tax season to kick off at the end of January so they can file their tax returns and get their refunds. But there's another group of people who are anxious to get started on your taxes, too: scammers.

The Internal Revenue Service incorrectly issued a massive $4 billion in fraudulent tax refunds in 2012, according to a report released by the Treasury Inspector's Office in 2013. The money was largely sent to people who stole Social Security numbers and other personal information about U.S. citizens and then filed fraudulent tax returns in their names, claiming huge refunds.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:47:23 AM

In today’s world, it’s all about mobility. Taking your life with you while on-the-go has become the norm and because of that, it’s more important than ever to keep your devices safe and secure. That’s why we’ve chosen Lookout Security & Antivirus as our App Pick of the Month.

Today’s mobile devices aren’t just used as phones any more - they’re tiny handheld devices that hold the details of our lives – and chances are, you don’t want the details of YOUR life being put into the wrong hands. Lookout Security & Antivirus offers essential protection for your phone and tablet against malware, viruses, loss and theft. It’s available to both IOS and Android devices. There’s a free basic version, or if you want enhanced protection with added security, the premium version is available for an additional cost.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:46:43 AM

This article was originally published in the Honolulu Star-Advertiser on October 8th, 2013

This October marks the 10th anniversary of National Cyber Security Awareness Month, which was launched by the Department of Homeland Security and the National Cyber Security Alliance to promote awareness about using the Internet responsibly.

This year’s theme -- “Our Shared Responsibility” -- notes that the Internet is a shared resource and securing it is our shared responsibility. The simple message is “STOP. THINK. CONNECT.” Understanding the consequences of your online actions and behaviors will greatly reduce the hazards of using the Internet.

On the National Cyber Security Alliance’s website staysafeonline.org, weekly themes deliver awareness education in different focus areas:

By Hawaiian Telcom on Tuesday, December 15, 2015 8:46:14 AM

This article was originally published in the Honolulu Star-Advertiser on November 5th, 2013

Last year’s “Cyber Monday” -- the Monday following the Thanksgiving holiday -- was the heaviest spending day of the year for the third straight year, ringing up nearly $1.5 billion in online sales. It was the first time that online sales had topped the $1 billion mark. This year, the National Retail Foundation projects a 13 to 15 percent increase in online sales.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:45:16 AM

With Spring Break around the corner many of us will be traveling with our devices, so now is the perfect time to take a few steps toward mobile security, before it’s too late.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:44:38 AM

The bad guys routinely use a combination of methods to take advantage of the holiday shopping season. We need to remain wary and question everything that looks appealing, especially among the deals that look too good to be true. Schemes such as fake email campaigns, embedded links, intentionally misguided results from search engines, and messaging false ads from within social networks should be on your radar.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:43:46 AM

Scammers, hackers and identity thieves are constantly looking for ways to steal your personal information – and your money. They are also looking to recruit vulnerable computers into their vast “botnets”, that can then be used to send spam, spread viruses, or launch attacks against legitimate businesses over the Internet.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:42:50 AM

When internet fraudsters impersonate a business to trick you into giving out your personal information, it’s called phishing. Don't reply to email, text, or pop-up messages that ask for your personal or financial information. Don’t click on links within them either – even if the message seems to be from an organization you trust. It isn’t. Legitimate businesses don’t ask you to send sensitive information through insecure channels.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:40:17 AM

Crooks use clever schemes to defraud millions of people around the globe every year. They often combine sophisticated technology with age-old tricks to get people to send money or give out personal information. Many scammers insist that you wire money, or pressure you to make an important decision on the spot. Don’t fall for such tactics. Use these tips to help you avoid common scams.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:39:23 AM

  1. Talk to your kids about the risks of being on the Internet. The Internet is a fascinating world for them, but make sure they understand the dangers.
  2. Understand that social networking often begins earlier than age 13: While Facebook has an official minimum age of 13, it is not enforceable, and many sites don’t restrict by age whatsoever. Growing numbers of elementary school children report having social networking profiles.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:38:43 AM

The security of your computer can affect the safety of your online experience – and your kids’. Talk to your kids regularly about the responsibility they have to protect the family’s personal information, and how to reduce the risk of their computer contracting a virus or other malicious software.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:35:24 AM

Identity theft occurs when someone uses your name, your Social Security number, or some other personal, financial, or medical information without your permission to commit fraud or other crimes. Online threats like phishing, malware, or hacking can lead to identity theft.

If your personal information is lost, stolen, or otherwise compromised, you can minimize the potential damage from identity theft.