ResidentialBusinessWholesaleAbout Us
 › 
 › 
By Hawaiian Telcom on Wednesday, February 3, 2016 10:01:21 AM

You invest in technology to operate your business, but do you really know how effective it is? As Hawaii’s Technology Leader, Hawaiian Telcom encourages you to conduct a start of the year assessment to determine your current state of technology and prepare your business for growth.

By Hawaiian Telcom on Wednesday, February 3, 2016 12:05:49 AM

Many people in your organization have purchased exciting, new gadgets that recently hit the market. From smartphones to the latest tablets, these devices may soon appear in your workplace as part of a growing trend called Bring Your Own Device (BYOD), but will it suit your company?

By Hawaiian Telcom on Wednesday, December 30, 2015 7:11:44 PM

This article was originally published in the Honolulu Star-Advertiser on December 29, 2015

Are you looking to add extra security to some of your online accounts? If yes, you may want to consider multifactor authentication, or MFA, options. Also known as two-factor or two-step verification, access is granted when you provide more than one item to validate your identity.

By Hawaiian Telcom on Wednesday, December 30, 2015 5:45:53 PM

This article was originally published in the Honolulu Star-Advertiser on December 29, 2015

Roughly 34,000 Hawaiian Telcom TV subscribers on Oahu could see black on the KGMB and KHNL stations come Friday. Hawaiian Telcom and Raycom Media, owner of Hawaii News Now channels KGMB (CBS) and KHNL (NBC), failed to reach a new agreement to continue the partnership at the start of the new year.

By Hawaiian Telcom on Tuesday, December 15, 2015 6:54:58 PM

This article was originally published in the Honolulu Star-Advertiser on September 9, 2014 

Few people had heard the term "catfishing" before Manti Te'o famously revealed last year that he had been a victim of the scam, which involves people who create fake social media profiles to pursue online romances. But Te'o is hardly alone in being duped by ficticious online personas, and most instances of catfishing have far greater--and often financial--consequences. Read what our Expert recommends so we don't fall prey to catfishing.

By Hawaiian Telcom on Tuesday, December 15, 2015 6:52:35 PM

This article was originally published in the Honolulu Star-Advertiser on August 12, 2014 

News broke last week that a Russian crime syndicate had amassed the largest known collection of Internet credentials, including 1.2 billion username-and-password combinations. Thanks to events such as this, Two-Factor Authentication, sometimes abbreviated 2FA, is gaining momentum. 2FA has been around for decades, but it only recently has become accessible to the general public. 

By Hawaiian Telcom on Tuesday, December 15, 2015 6:51:51 PM

This article was originally published in the Honolulu Star-Advertiser on July 15, 2014 

When news broke in late June about Facebook running unsanctioned psychological experiments on their user population in the name of science, the reaction was overwhelmingly negative. The truth is that Facebook experiments on its user base quite frequently, and probably constantly. Facebook isn't alone here: Other social media sites conduct research on their users or allow third parties (like the government) to conduct their own. What can we learn from the revelations about these activities?

By Hawaiian Telcom on Tuesday, December 15, 2015 9:06:26 AM

This article was originally published in the Honolulu Star-Advertiser on August 11, 2015

Are you considering a career in cybersecurity? There were more than 75,000 information security analyst positions available in 2012, and it is projected that the number will climb to over 100,000 jobs by 2022, according to the U.S. Department of Labor’s Occupational Outlook Handbook. Reports from Cisco and Symantec indicate a shortage of talent with over 1 million unfilled openings globally. Fortunately, formal education programs are available on Oahu.

By Hawaiian Telcom on Tuesday, December 15, 2015 9:05:29 AM

This article was originally published in the Honolulu Star-Advertiser on May 19, 2015

Virtual desktop infstracture, or VDI, allows you to access your desktop from any Internet-connected device, including PCs, Macs, tablets and smartphones. With VDI, your view will always be the same, regardless of device, wich is very attractive to businesses with mobile workforces. Here are some security-related advantages to this environment.

By Hawaiian Telcom on Tuesday, December 15, 2015 9:04:51 AM

This article was originally published in the Honolulu Star-Advertiser on April 21, 2015

How can the Internet be used for illegal or secret activity since everything is traceable? Why, the Deep Web, of course! Learn more...

By Hawaiian Telcom on Tuesday, December 15, 2015 8:57:34 AM

This article was originally published in the Honolulu Star-Advertiser on December 2, 2014

The cybersecurity field is growing rapidly, with more new and vital roles to fill in government and the private sector than the number of qualified applicants. To prepare our future network defenders, CyberPatriot is working to inspire students toward careers in cybersecurity or STEM fields. CyberPatriot features a National Youth Cyber Defense Competition in which students defend networks against online adversaries. In 2013, Leilehua High School made it to the national finals! It's an exciting opportunity for Hawaii's middle and high school students to learn and test the waters in the cybersecurity realm.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:56:02 AM

This article was originally published in the Honolulu Star-Advertiser on October 7, 2014 

This month marks the 11th anniversary of the Department of Homeland Security's (DHS) National Cyber Security Awareness Month, an effort designed to remind the public of the hazards they might face while using the Internet. Read DHS's five weekly focus topics for this month and additional tips from our Expert.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:53:47 AM

We’d like to remind all our High-Speed Internet customers of the dangers of illegal downloading of music, movies, and television shows from the Internet. Hawaiian Telcom is receiving notices that some of our customers are copying or sharing songs, movies, and television programs from the Internet in violation of the copyright laws. These notices identify the Internet Protocol (IP) addresses of the alleged violators and threaten to take legal action against the violators. There are legal ways to find movies, television shows and music on the Internet. Learn more...

 

By Hawaiian Telcom on Tuesday, December 15, 2015 8:51:03 AM

Online advertising is big business. In 2013, U.S. online ad revenue reached $4.28 billion, surpassing broadcast television ads for the first time in history. That’s a 17% increase over the prior year. Unfortunately, as advertisers scramble to claim their slice of this growing pie, they sometimes leave the door open to cybercriminals who exploit weaknesses in the ad ecosystem to spread viruses and other malicious software through malicious advertisements or “malvertisements.”

By Hawaiian Telcom on Tuesday, December 15, 2015 8:50:21 AM

This article was originally published in the Honolulu Star-Advertiser on May 20, 2014 

In recent columns I've advocated for the general use of password managers as a mechanism to improve your password hygiene. Password managers generate strong passwords on a per-site basis and store them, eliminating the need for you to remember dozens of passwords for the different websites that you regularly visit. It also should eliminate the more common and very unsafe practice of reusing the same password on different websites. Naturally the question has come up: How safe are password managers? Aren't they the digital equivalent of putting all our eggs in one basket?

By Hawaiian Telcom on Tuesday, December 15, 2015 8:48:34 AM

This article was originally published in the Honolulu Star-Advertiser on March 25, 2014

Since word broke last month that Target was ultimately breached through a connection it had established with one of its vendors, many businesses are taking a hard look at what kind of access they've granted to their own vendors.

And with good reason. It will be a tough year or two for Target's shareholders, but Target will survive this. The sobering reality is that most small and medium businesses don't survive such events. With the average cost of a data breach spiraling to $188,000, 60 percent of small businesses shutter their doors within six months of a data breach.

So, what steps can small and medium-size businesses take to reduce the risk of a breach coming from an established connection with a vendor or business partner?

By Hawaiian Telcom on Wednesday, December 9, 2015 1:42:02 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on August 11, 2015
Are you considering a career in cybersecurity? There were more than 75,000 information security analyst positions available in 2012, and it is projected that the number will climb to over 100,000 jobs by 2022, according to the U.S. Department of Labor’s Occupational Outlook Handbook. Reports from Cisco and Symantec indicate a shortage of talent with over 1 million unfilled openings globally. Fortunately, formal education programs are available on Oahu.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:41:08 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on May 19, 2015
Virtual desktop infstracture, or VDI, allows you to access your desktop from any Internet-connected device, including PCs, Macs, tablets and smartphones. With VDI, your view will always be the same, regardless of device, wich is very attractive to businesses with mobile workforces. Here are some security-related advantages to this environment.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:40:23 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on April 21, 2015
How can the Internet be used for illegal or secret activity since everything is traceable? Why, the Deep Web, of course! Learn more...

By Hawaiian Telcom on Wednesday, December 9, 2015 1:21:04 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on December 2, 2014
The cybersecurity field is growing rapidly, with more new and vital roles to fill in government and the private sector than the number of qualified applicants. To prepare our future network defenders, CyberPatriot is working to inspire students toward careers in cybersecurity or STEM fields. CyberPatriot features a National Youth Cyber Defense Competition in which students defend networks against online adversaries. In 2013, Leilehua High School made it to the national finals! It's an exciting opportunity for Hawaii's middle and high school students to learn and test the waters in the cybersecurity realm.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:17:55 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on October 7, 2014 
This month marks the 11th anniversary of the Department of Homeland Security's (DHS) National Cyber Security Awareness Month, an effort designed to remind the public of the hazards they might face while using the Internet. Read DHS's five weekly focus topics for this month and additional tips from our Expert.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:16:51 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on September 9, 2014 
Few people had heard the term "catfishing" before Manti Te'o famously revealed last year that he had been a victim of the scam, which involves people who create fake social media profiles to pursue online romances. But Te'o is hardly alone in being duped by ficticious online personas, and most instances of catfishing have far greater--and often financial--consequences. Read what our Expert recommends so we don't fall prey to catfishing.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:15:41 AM Technology Blog

We’d like to remind all our High-Speed Internet customers of the dangers of illegal downloading of music, movies, and television shows from the Internet. Hawaiian Telcom is receiving notices that some of our customers are copying or sharing songs, movies, and television programs from the Internet in violation of the copyright laws. These notices identify the Internet Protocol (IP) addresses of the alleged violators and threaten to take legal action against the violators. There are legal ways to find movies, television shows and music on the Internet. Learn more...

 

By Hawaiian Telcom on Wednesday, December 9, 2015 1:14:31 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on August 12, 2014 
News broke last week that a Russian crime syndicate had amassed the largest known collection of Internet credentials, including 1.2 billion username-and-password combinations. Thanks to events such as this, Two-Factor Authentication, sometimes abbreviated 2FA, is gaining momentum. 2FA has been around for decades, but it only recently has become accessible to the general public. 

By Hawaiian Telcom on Wednesday, December 9, 2015 1:13:32 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on July 15, 2014 
When news broke in late June about Facebook running unsanctioned psychological experiments on their user population in the name of science, the reaction was overwhelmingly negative. The truth is that Facebook experiments on its user base quite frequently, and probably constantly. Facebook isn't alone here: Other social media sites conduct research on their users or allow third parties (like the government) to conduct their own. What can we learn from the revelations about these activities?

By Hawaiian Telcom on Wednesday, December 9, 2015 1:12:18 AM Technology Blog

Online advertising is big business. In 2013, U.S. online ad revenue reached $4.28 billion, surpassing broadcast television ads for the first time in history. That’s a 17% increase over the prior year. Unfortunately, as advertisers scramble to claim their slice of this growing pie, they sometimes leave the door open to cybercriminals who exploit weaknesses in the ad ecosystem to spread viruses and other malicious software through malicious advertisements or “malvertisements.”

By Hawaiian Telcom on Wednesday, December 9, 2015 1:11:05 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on May 20, 2014 
In recent columns I've advocated for the general use of password managers as a mechanism to improve your password hygiene. Password managers generate strong passwords on a per-site basis and store them, eliminating the need for you to remember dozens of passwords for the different websites that you regularly visit. It also should eliminate the more common and very unsafe practice of reusing the same password on different websites. Naturally the question has come up: How safe are password managers? Aren't they the digital equivalent of putting all our eggs in one basket?

By Hawaiian Telcom on Wednesday, December 9, 2015 1:09:09 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on March 25, 2014

Since word broke last month that Target was ultimately breached through a connection it had established with one of its vendors, many businesses are taking a hard look at what kind of access they've granted to their own vendors.

And with good reason. It will be a tough year or two for Target's shareholders, but Target will survive this. The sobering reality is that most small and medium businesses don't survive such events. With the average cost of a data breach spiraling to $188,000, 60 percent of small businesses shutter their doors within six months of a data breach.

So, what steps can small and medium-size businesses take to reduce the risk of a breach coming from an established connection with a vendor or business partner?