ResidentialBusinessWholesaleAbout Us
 › 

Fiber network linking Asia, U.S. goes online this month

This article was originally published in the Honolulu Star-Advertiser on August 8, 2017

Most of us depend on broadband access every day, at work and at home. Laptops, personal computers, tablets, and smartphones powered by broadband connections enable us to communicate quickly with family, friends and business associates from around the world, to bank and shop from anywhere, or to simply watch TV.

Phishing Your Employees Has Benefits

This article was originally published in the Honolulu Star-Advertiser on July 11, 2017



According to published reports, many victims of recent attacks were enticed to open the malware by an email purporting to be legitimate but actually downloaded malware or ransomware on their computers. This type of phishing email remains one of the biggest threats to companies today.

Fake News as an IT Security Threat

This article was originally published in the Honolulu Star-Advertiser on June 13, 2017

References to fake news has certainly increased over the last two years. What is fake news?

Update Security Software When Notified to Avoid Becoming a Victim

This article was originally published in the Honolulu Star-Advertiser on May 19, 2017

Over the last three years, a number of news stories and guidance have been published about the dangers of ransomware and ways to protect your information. However, the world is still susceptible.

Parents should teach children responsible use of social media

This article was originally published in the Honolulu Star-Advertiser on April 18, 2017

A recent survey by Fluent identified YouTube, Instagram, Snapchat and Facebook as the most popular networks used by adults age 18 to 24. Naturally, many preteens and teenagers are clamoring for accounts on these social networking platforms, adding to the many challenges of parenting on top of school, extracurricular activities, family, holidays and all the associated drama.

Case Study - Hawaii Behavioral Health

HBH began with an in-house Microsoft Exchange server handling all email communications across the organization’s 175 mailboxes. When the server crashed it was evident HBH needed to consider a cloud-based managed service.

Observe employees’ actions to eliminate insider threats

This article was originally published in the Honolulu Star-Advertiser on February 21, 2017

Unauthorized leaks of information are usually enabled by individuals who had access to sensitive information and purposely used that information beyond their authorization or distributed it to unauthorized parties.