Home
 › 
Residential
 › 
Support
 › 
Security Blog

Password managers simplify task of remembering logins

This article was originally published in the Honolulu Star-Advertiser on November 3, 2015

With password breaches in recent years, it's become an imperative not to reuse passwords. People use simple passwords because it's too hard to remember strong ones. This is where a password manager can help.

HCC offers 2-year program in burgeoning cybersecurity

This article was originally published in the Honolulu Star-Advertiser on August 11, 2015

Are you considering a career in cybersecurity? There were more than 75,000 information security analyst positions available in 2012, and it is projected that the number will climb to over 100,000 jobs by 2022, according to the U.S. Department of Labor’s Occupational Outlook Handbook. Reports from Cisco and Symantec indicate a shortage of talent with over 1 million unfilled openings globally. Fortunately, formal education programs are available on Oahu.

With desktop virtualization, security benefits are built in

This article was originally published in the Honolulu Star-Advertiser on May 19, 2015

Virtual desktop infstracture, or VDI, allows you to access your desktop from any Internet-connected device, including PCs, Macs, tablets and smartphones. With VDI, your view will always be the same, regardless of device, wich is very attractive to businesses with mobile workforces. Here are some security-related advantages to this environment.

Online gaming tips for parents

Technology today is so pervasive. Our children have access to much more technology than many of us did when we were growing up. As parents, it’s important to keep a watchful eye on what your children are doing online, to know the games they play and websites they visit and to establish ground rules early.


Computer users often pay price when ransomware hits

This article was originally published in the Honolulu Star-Advertiser on March 24, 2015

Ransomware is a class of malicious software that infects and restricts access to your computer until a payment is made. The method of infection is similar to that of phishing attacks and spreads through compromised websites and email containing malicious attachments or links. The key difference is ransomware is more overt and confronts you shortly after you've been compromised. Prevention is the key to defending yourself.

Security needs to be first for network-based devices

This article was originally published in the Honolulu Star-Advertiser on February 24, 2015

The Internet of Things (IoT) is a technology movement to enable connectivity to devices, from household items to industrial equipment. Learn what you must consider when evaluating and purchasing these devices.

Be alert to phishing scams to protect sensitive data

This article was originally published in the Honolulu Star-Advertiser on January 27, 2015

If you have an email address, you've probably been the target of a phishing scam. Find out how phishing attacks work and how to detect them.

Prepare for data breaches with 5 tips to secure system

This article was originally published in the Honolulu Star-Advertiser on December 30, 2014

With countless data breaches occurring even at sizable companies like Sony, Home Depot and Target, it's evident that we need to better prepare and respond to data breaches. Here are five steps that can help.