ResidentialBusinessWholesaleAbout Us
 › 
 › 
By Hawaiian Telcom on Tuesday, December 15, 2015 6:52:35 PM

This article was originally published in the Honolulu Star-Advertiser on August 12, 2014 

News broke last week that a Russian crime syndicate had amassed the largest known collection of Internet credentials, including 1.2 billion username-and-password combinations. Thanks to events such as this, Two-Factor Authentication, sometimes abbreviated 2FA, is gaining momentum. 2FA has been around for decades, but it only recently has become accessible to the general public. 

By Hawaiian Telcom on Tuesday, December 15, 2015 9:03:23 AM

This article was originally published in the Honolulu Star-Advertiser on March 24, 2015

Ransomware is a class of malicious software that infects and restricts access to your computer until a payment is made. The method of infection is similar to that of phishing attacks and spreads through compromised websites and email containing malicious attachments or links. The key difference is ransomware is more overt and confronts you shortly after you've been compromised. Prevention is the key to defending yourself.

By Hawaiian Telcom on Tuesday, December 15, 2015 9:02:29 AM

This article was originally published in the Honolulu Star-Advertiser on February 24, 2015

The Internet of Things (IoT) is a technology movement to enable connectivity to devices, from household items to industrial equipment. Learn what you must consider when evaluating and purchasing these devices.

By Hawaiian Telcom on Tuesday, December 15, 2015 9:01:00 AM

This article was originally published in the Honolulu Star-Advertiser on January 27, 2015

If you have an email address, you've probably been the target of a phishing scam. Find out how phishing attacks work and how to detect them.

By Hawaiian Telcom on Tuesday, December 15, 2015 9:00:06 AM

This article was originally published in the Honolulu Star-Advertiser on December 30, 2014

With countless data breaches occurring even at sizable companies like Sony, Home Depot and Target, it's evident that we need to better prepare and respond to data breaches. Here are five steps that can help.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:58:45 AM

Follow these tips to protect yourself from becoming a phishing scam victim.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:57:34 AM

This article was originally published in the Honolulu Star-Advertiser on December 2, 2014

The cybersecurity field is growing rapidly, with more new and vital roles to fill in government and the private sector than the number of qualified applicants. To prepare our future network defenders, CyberPatriot is working to inspire students toward careers in cybersecurity or STEM fields. CyberPatriot features a National Youth Cyber Defense Competition in which students defend networks against online adversaries. In 2013, Leilehua High School made it to the national finals! It's an exciting opportunity for Hawaii's middle and high school students to learn and test the waters in the cybersecurity realm.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:56:02 AM

This article was originally published in the Honolulu Star-Advertiser on October 7, 2014 

This month marks the 11th anniversary of the Department of Homeland Security's (DHS) National Cyber Security Awareness Month, an effort designed to remind the public of the hazards they might face while using the Internet. Read DHS's five weekly focus topics for this month and additional tips from our Expert.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:51:03 AM

Online advertising is big business. In 2013, U.S. online ad revenue reached $4.28 billion, surpassing broadcast television ads for the first time in history. That’s a 17% increase over the prior year. Unfortunately, as advertisers scramble to claim their slice of this growing pie, they sometimes leave the door open to cybercriminals who exploit weaknesses in the ad ecosystem to spread viruses and other malicious software through malicious advertisements or “malvertisements.”

By Hawaiian Telcom on Tuesday, December 15, 2015 8:45:16 AM

With Spring Break around the corner many of us will be traveling with our devices, so now is the perfect time to take a few steps toward mobile security, before it’s too late.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:43:46 AM

Scammers, hackers and identity thieves are constantly looking for ways to steal your personal information – and your money. They are also looking to recruit vulnerable computers into their vast “botnets”, that can then be used to send spam, spread viruses, or launch attacks against legitimate businesses over the Internet.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:26:49 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on March 24, 2015
Ransomware is a class of malicious software that infects and restricts access to your computer until a payment is made. The method of infection is similar to that of phishing attacks and spreads through compromised websites and email containing malicious attachments or links. The key difference is ransomware is more overt and confronts you shortly after you've been compromised. Prevention is the key to defending yourself.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:25:41 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on February 24, 2015
The Internet of Things (IoT) is a technology movement to enable connectivity to devices, from household items to industrial equipment. Learn what you must consider when evaluating and purchasing these devices.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:24:32 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on January 27, 2015
If you have an email address, you've probably been the target of a phishing scam. Find out how phishing attacks work and how to detect them.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:23:24 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on December 30, 2014
With countless data breaches occurring even at sizable companies like Sony, Home Depot and Target, it's evident that we need to better prepare and respond to data breaches. Here are five steps that can help.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:22:19 AM Technology Blog

Follow these tips to protect yourself from becoming a phishing scam victim.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:21:04 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on December 2, 2014
The cybersecurity field is growing rapidly, with more new and vital roles to fill in government and the private sector than the number of qualified applicants. To prepare our future network defenders, CyberPatriot is working to inspire students toward careers in cybersecurity or STEM fields. CyberPatriot features a National Youth Cyber Defense Competition in which students defend networks against online adversaries. In 2013, Leilehua High School made it to the national finals! It's an exciting opportunity for Hawaii's middle and high school students to learn and test the waters in the cybersecurity realm.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:17:55 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on October 7, 2014 
This month marks the 11th anniversary of the Department of Homeland Security's (DHS) National Cyber Security Awareness Month, an effort designed to remind the public of the hazards they might face while using the Internet. Read DHS's five weekly focus topics for this month and additional tips from our Expert.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:14:31 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on August 12, 2014 
News broke last week that a Russian crime syndicate had amassed the largest known collection of Internet credentials, including 1.2 billion username-and-password combinations. Thanks to events such as this, Two-Factor Authentication, sometimes abbreviated 2FA, is gaining momentum. 2FA has been around for decades, but it only recently has become accessible to the general public. 

By Hawaiian Telcom on Wednesday, December 9, 2015 1:12:18 AM Technology Blog

Online advertising is big business. In 2013, U.S. online ad revenue reached $4.28 billion, surpassing broadcast television ads for the first time in history. That’s a 17% increase over the prior year. Unfortunately, as advertisers scramble to claim their slice of this growing pie, they sometimes leave the door open to cybercriminals who exploit weaknesses in the ad ecosystem to spread viruses and other malicious software through malicious advertisements or “malvertisements.”

By Hawaiian Telcom on Wednesday, December 9, 2015 1:04:38 AM Technology Blog

With Spring Break around the corner many of us will be traveling with our devices, so now is the perfect time to take a few steps toward mobile security, before it’s too late.

By Hawaiian Telcom on Wednesday, December 9, 2015 12:26:16 AM Technology Blog

Scammers, hackers and identity thieves are constantly looking for ways to steal your personal information – and your money. They are also looking to recruit vulnerable computers into their vast “botnets”, that can then be used to send spam, spread viruses, or launch attacks against legitimate businesses over the Internet.