ResidentialBusinessWholesaleAbout Us
 › 
 › 
By Hawaiian Telcom on Tuesday, December 15, 2015 7:07:01 PM

This article was originally published in the Honolulu Star-Advertiser on November 3, 2015

With password breaches in recent years, it's become an imperative not to reuse passwords. People use simple passwords because it's too hard to remember strong ones. This is where a password manager can help.

By Hawaiian Telcom on Tuesday, December 15, 2015 6:54:58 PM

This article was originally published in the Honolulu Star-Advertiser on September 9, 2014 

Few people had heard the term "catfishing" before Manti Te'o famously revealed last year that he had been a victim of the scam, which involves people who create fake social media profiles to pursue online romances. But Te'o is hardly alone in being duped by ficticious online personas, and most instances of catfishing have far greater--and often financial--consequences. Read what our Expert recommends so we don't fall prey to catfishing.

By Hawaiian Telcom on Tuesday, December 15, 2015 6:52:35 PM

This article was originally published in the Honolulu Star-Advertiser on August 12, 2014 

News broke last week that a Russian crime syndicate had amassed the largest known collection of Internet credentials, including 1.2 billion username-and-password combinations. Thanks to events such as this, Two-Factor Authentication, sometimes abbreviated 2FA, is gaining momentum. 2FA has been around for decades, but it only recently has become accessible to the general public. 

By Hawaiian Telcom on Tuesday, December 15, 2015 9:02:29 AM

This article was originally published in the Honolulu Star-Advertiser on February 24, 2015

The Internet of Things (IoT) is a technology movement to enable connectivity to devices, from household items to industrial equipment. Learn what you must consider when evaluating and purchasing these devices.

By Hawaiian Telcom on Tuesday, December 15, 2015 9:01:00 AM

This article was originally published in the Honolulu Star-Advertiser on January 27, 2015

If you have an email address, you've probably been the target of a phishing scam. Find out how phishing attacks work and how to detect them.

By Hawaiian Telcom on Tuesday, December 15, 2015 9:00:06 AM

This article was originally published in the Honolulu Star-Advertiser on December 30, 2014

With countless data breaches occurring even at sizable companies like Sony, Home Depot and Target, it's evident that we need to better prepare and respond to data breaches. Here are five steps that can help.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:58:45 AM

Follow these tips to protect yourself from becoming a phishing scam victim.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:57:34 AM

This article was originally published in the Honolulu Star-Advertiser on December 2, 2014

The cybersecurity field is growing rapidly, with more new and vital roles to fill in government and the private sector than the number of qualified applicants. To prepare our future network defenders, CyberPatriot is working to inspire students toward careers in cybersecurity or STEM fields. CyberPatriot features a National Youth Cyber Defense Competition in which students defend networks against online adversaries. In 2013, Leilehua High School made it to the national finals! It's an exciting opportunity for Hawaii's middle and high school students to learn and test the waters in the cybersecurity realm.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:56:02 AM

This article was originally published in the Honolulu Star-Advertiser on October 7, 2014 

This month marks the 11th anniversary of the Department of Homeland Security's (DHS) National Cyber Security Awareness Month, an effort designed to remind the public of the hazards they might face while using the Internet. Read DHS's five weekly focus topics for this month and additional tips from our Expert.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:53:47 AM

We’d like to remind all our High-Speed Internet customers of the dangers of illegal downloading of music, movies, and television shows from the Internet. Hawaiian Telcom is receiving notices that some of our customers are copying or sharing songs, movies, and television programs from the Internet in violation of the copyright laws. These notices identify the Internet Protocol (IP) addresses of the alleged violators and threaten to take legal action against the violators. There are legal ways to find movies, television shows and music on the Internet. Learn more...

 

By Hawaiian Telcom on Tuesday, December 15, 2015 8:51:03 AM

Online advertising is big business. In 2013, U.S. online ad revenue reached $4.28 billion, surpassing broadcast television ads for the first time in history. That’s a 17% increase over the prior year. Unfortunately, as advertisers scramble to claim their slice of this growing pie, they sometimes leave the door open to cybercriminals who exploit weaknesses in the ad ecosystem to spread viruses and other malicious software through malicious advertisements or “malvertisements.”

By Hawaiian Telcom on Tuesday, December 15, 2015 8:50:21 AM

This article was originally published in the Honolulu Star-Advertiser on May 20, 2014 

In recent columns I've advocated for the general use of password managers as a mechanism to improve your password hygiene. Password managers generate strong passwords on a per-site basis and store them, eliminating the need for you to remember dozens of passwords for the different websites that you regularly visit. It also should eliminate the more common and very unsafe practice of reusing the same password on different websites. Naturally the question has come up: How safe are password managers? Aren't they the digital equivalent of putting all our eggs in one basket?

By Hawaiian Telcom on Tuesday, December 15, 2015 8:49:34 AM

This article was originally published in the Honolulu Star-Advertiser on April 22, 2014

With the recent Heartbleed vulnerability blowing up in the news, it's a good time to remind everyone that good passwords, and good password hygiene, are critical for the long-term protection of you and your online accounts. Site operators have a huge role to play in keeping their systems secure from hackers, but if you use weak passwords or don't change them often, you can weaken the site's security.

Here are some key tips for making sure you are doing your part in keeping your accounts secure...

By Hawaiian Telcom on Tuesday, December 15, 2015 8:45:16 AM

With Spring Break around the corner many of us will be traveling with our devices, so now is the perfect time to take a few steps toward mobile security, before it’s too late.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:44:38 AM

The bad guys routinely use a combination of methods to take advantage of the holiday shopping season. We need to remain wary and question everything that looks appealing, especially among the deals that look too good to be true. Schemes such as fake email campaigns, embedded links, intentionally misguided results from search engines, and messaging false ads from within social networks should be on your radar.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:42:50 AM

When internet fraudsters impersonate a business to trick you into giving out your personal information, it’s called phishing. Don't reply to email, text, or pop-up messages that ask for your personal or financial information. Don’t click on links within them either – even if the message seems to be from an organization you trust. It isn’t. Legitimate businesses don’t ask you to send sensitive information through insecure channels.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:40:17 AM

Crooks use clever schemes to defraud millions of people around the globe every year. They often combine sophisticated technology with age-old tricks to get people to send money or give out personal information. Many scammers insist that you wire money, or pressure you to make an important decision on the spot. Don’t fall for such tactics. Use these tips to help you avoid common scams.

By Hawaiian Telcom on Tuesday, December 15, 2015 8:35:24 AM

Identity theft occurs when someone uses your name, your Social Security number, or some other personal, financial, or medical information without your permission to commit fraud or other crimes. Online threats like phishing, malware, or hacking can lead to identity theft.

If your personal information is lost, stolen, or otherwise compromised, you can minimize the potential damage from identity theft.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:43:03 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on November 3, 2015
With password breaches in recent years, it's become an imperative not to reuse passwords. People use simple passwords because it's too hard to remember strong ones. This is where a password manager can help.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:25:41 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on February 24, 2015
The Internet of Things (IoT) is a technology movement to enable connectivity to devices, from household items to industrial equipment. Learn what you must consider when evaluating and purchasing these devices.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:24:32 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on January 27, 2015
If you have an email address, you've probably been the target of a phishing scam. Find out how phishing attacks work and how to detect them.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:23:24 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on December 30, 2014
With countless data breaches occurring even at sizable companies like Sony, Home Depot and Target, it's evident that we need to better prepare and respond to data breaches. Here are five steps that can help.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:22:19 AM Technology Blog

Follow these tips to protect yourself from becoming a phishing scam victim.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:21:04 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on December 2, 2014
The cybersecurity field is growing rapidly, with more new and vital roles to fill in government and the private sector than the number of qualified applicants. To prepare our future network defenders, CyberPatriot is working to inspire students toward careers in cybersecurity or STEM fields. CyberPatriot features a National Youth Cyber Defense Competition in which students defend networks against online adversaries. In 2013, Leilehua High School made it to the national finals! It's an exciting opportunity for Hawaii's middle and high school students to learn and test the waters in the cybersecurity realm.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:17:55 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on October 7, 2014 
This month marks the 11th anniversary of the Department of Homeland Security's (DHS) National Cyber Security Awareness Month, an effort designed to remind the public of the hazards they might face while using the Internet. Read DHS's five weekly focus topics for this month and additional tips from our Expert.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:16:51 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on September 9, 2014 
Few people had heard the term "catfishing" before Manti Te'o famously revealed last year that he had been a victim of the scam, which involves people who create fake social media profiles to pursue online romances. But Te'o is hardly alone in being duped by ficticious online personas, and most instances of catfishing have far greater--and often financial--consequences. Read what our Expert recommends so we don't fall prey to catfishing.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:15:41 AM Technology Blog

We’d like to remind all our High-Speed Internet customers of the dangers of illegal downloading of music, movies, and television shows from the Internet. Hawaiian Telcom is receiving notices that some of our customers are copying or sharing songs, movies, and television programs from the Internet in violation of the copyright laws. These notices identify the Internet Protocol (IP) addresses of the alleged violators and threaten to take legal action against the violators. There are legal ways to find movies, television shows and music on the Internet. Learn more...

 

By Hawaiian Telcom on Wednesday, December 9, 2015 1:14:31 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on August 12, 2014 
News broke last week that a Russian crime syndicate had amassed the largest known collection of Internet credentials, including 1.2 billion username-and-password combinations. Thanks to events such as this, Two-Factor Authentication, sometimes abbreviated 2FA, is gaining momentum. 2FA has been around for decades, but it only recently has become accessible to the general public. 

By Hawaiian Telcom on Wednesday, December 9, 2015 1:12:18 AM Technology Blog

Online advertising is big business. In 2013, U.S. online ad revenue reached $4.28 billion, surpassing broadcast television ads for the first time in history. That’s a 17% increase over the prior year. Unfortunately, as advertisers scramble to claim their slice of this growing pie, they sometimes leave the door open to cybercriminals who exploit weaknesses in the ad ecosystem to spread viruses and other malicious software through malicious advertisements or “malvertisements.”

By Hawaiian Telcom on Wednesday, December 9, 2015 1:11:05 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on May 20, 2014 
In recent columns I've advocated for the general use of password managers as a mechanism to improve your password hygiene. Password managers generate strong passwords on a per-site basis and store them, eliminating the need for you to remember dozens of passwords for the different websites that you regularly visit. It also should eliminate the more common and very unsafe practice of reusing the same password on different websites. Naturally the question has come up: How safe are password managers? Aren't they the digital equivalent of putting all our eggs in one basket?

By Hawaiian Telcom on Wednesday, December 9, 2015 1:10:04 AM Technology Blog

This article was originally published in the Honolulu Star-Advertiser on April 22, 2014

With the recent Heartbleed vulnerability blowing up in the news, it's a good time to remind everyone that good passwords, and good password hygiene, are critical for the long-term protection of you and your online accounts. Site operators have a huge role to play in keeping their systems secure from hackers, but if you use weak passwords or don't change them often, you can weaken the site's security.

Here are some key tips for making sure you are doing your part in keeping your accounts secure...

By Hawaiian Telcom on Wednesday, December 9, 2015 1:04:38 AM Technology Blog

With Spring Break around the corner many of us will be traveling with our devices, so now is the perfect time to take a few steps toward mobile security, before it’s too late.

By Hawaiian Telcom on Wednesday, December 9, 2015 1:03:46 AM Technology Blog

The bad guys routinely use a combination of methods to take advantage of the holiday shopping season. We need to remain wary and question everything that looks appealing, especially among the deals that look too good to be true. Schemes such as fake email campaigns, embedded links, intentionally misguided results from search engines, and messaging false ads from within social networks should be on your radar.

By Hawaiian Telcom on Wednesday, December 9, 2015 12:24:08 AM Technology Blog

When internet fraudsters impersonate a business to trick you into giving out your personal information, it’s called phishing. Don't reply to email, text, or pop-up messages that ask for your personal or financial information. Don’t click on links within them either – even if the message seems to be from an organization you trust. It isn’t. Legitimate businesses don’t ask you to send sensitive information through insecure channels.

By Hawaiian Telcom on Wednesday, December 9, 2015 12:23:14 AM Technology Blog

Crooks use clever schemes to defraud millions of people around the globe every year. They often combine sophisticated technology with age-old tricks to get people to send money or give out personal information. Many scammers insist that you wire money, or pressure you to make an important decision on the spot. Don’t fall for such tactics. Use these tips to help you avoid common scams.

By Hawaiian Telcom on Wednesday, December 9, 2015 12:16:29 AM Technology Blog

Identity theft occurs when someone uses your name, your Social Security number, or some other personal, financial, or medical information without your permission to commit fraud or other crimes. Online threats like phishing, malware, or hacking can lead to identity theft.

If your personal information is lost, stolen, or otherwise compromised, you can minimize the potential damage from identity theft.