ResidentialBusinessWholesaleAbout Us
 › 

Airtight encryption makes cybersecurity a challenge

This article was originally published in the Honolulu Star-Advertiser on June 14, 2016

If I were to choose a word that encapsulates the focus of the cybersecurity industry for the last two years, it would be “encryption.” However, the boon in increased encryption has created new challenges for enterprises.

Passwords are not gone yet, so vigilance is still essential

This article was originally published in the Honolulu Star-Advertiser on May 17, 2016

Bill Gates predicted the death of the password in 2004, and others have wished for its demise over the years. However, only now are we starting to see passwords being incrementally replaced in the technology we use.

Institutions must increase dedication to cybersecurity

This article was originally published in the Honolulu Star-Advertiser on April 19, 2016

A recent study analyzing cybersecurity education at top American universities found that none of the top 10 computer science programs requires cybersecurity as a course for graduation. This means that thousands of computer experts who will be building our future technology might have no formal cybersecurity training.

Insurance helps companies offset data breach expenses

This article was originally published in the Honolulu Star-Advertiser on February 23, 2016

As data breaches become more common, we tend to pay less attention when we hear about hackers stealing millions of records containing sensitive personal and financial information. It’s becoming just another news story.

Strong encryption protects customers, builds business

This article was originally published in the Honolulu Star-Advertiser on March 22, 2016

The strength of the encryption hinges on the complexity of the conversion process, authorization process and special key. Strong encryption takes years to crack without the special key, but weak encryption can be cracked in seconds.

Assessing the Effectiveness of Your Technology

You invest in technology to operate your business, but do you really know how effective it is? As Hawaii’s Technology Leader, Hawaiian Telcom encourages you to conduct a start of the year assessment to determine your current state of technology and prepare your business for growth.

Bring Your Own Device - Rewarding or Risky?

Many people in your organization have purchased exciting, new gadgets that recently hit the market. From smartphones to the latest tablets, these devices may soon appear in your workplace as part of a growing trend called Bring Your Own Device (BYOD), but will it suit your company?

Cyberthreat analysis - to share or not to share?

Last year there was a lot of hype around the term “cybersecurity intelligence” from information security service providers and consultants. Behind this buzz were substantive government actions that were intended to increase the sharing of intelligence on cyberthreats between the private industry and federal agencies.

Enhance account security using 2-factor verification

This article was originally published in the Honolulu Star-Advertiser on December 29, 2015

Are you looking to add extra security to some of your online accounts? If yes, you may want to consider multifactor authentication, or MFA, options. Also known as two-factor or two-step verification, access is granted when you provide more than one item to validate your identity.

TV stations may be lost to Hawaiian Telcom’s customers

This article was originally published in the Honolulu Star-Advertiser on December 29, 2015

Roughly 34,000 Hawaiian Telcom TV subscribers on Oahu could see black on the KGMB and KHNL stations come Friday. Hawaiian Telcom and Raycom Media, owner of Hawaii News Now channels KGMB (CBS) and KHNL (NBC), failed to reach a new agreement to continue the partnership at the start of the new year.