The Hawaiian Telcom Blog


Type of Content
Clear Filters

Technology Articles


IoT cybersecurity: Secure your connected business

The “Internet of Things” has changed the way many of us live both at home and in our businesses. The ability…


Safeguard your secrets from spooky scammers

In the realm of cybersecurity, safeguarding your personal data is like warding off ghosts and goblins.…


Time to Move from Cybersecurity Defense to Detection

Imagine coming home one night and seeing your front door cracked open and the lock damaged. Inside, your…


Businesses must plan ahead for natural disasters

In Hawaii, June marks the start of our annual hurricane season. As individuals, we should take the time to…


AI Tools Can Create Risks to Data Security

Over the past few months, we have seen a massive surge in the popularity of “artificial intelligence” tools,…


Cybersecurity a Must for Business Travelers

With travel season upon us and many employees who work or check in to work while traveling, it is important…


Outstanding Women in Technology

Our Women in Technology video series features a group of outstanding wahine at Hawaiian Telcom. Having more…


7 VoIP Setup Tips for a More Productive Office

The global pandemic put a big emphasis on the need to run a business from anywhere. Enabling employees to…

Cybersecurity Technology

Strong Passwords and Password Managers

Do you have a unique lock and key for your front door or do you put a pad lock bought at your nearest Walmart…

Cybersecurity Technology

Updating Software

We have all seen our phones and computers doing automatic updates at one point or another, but have you ever…