Blog

Equifax Breach and What to Do

Equifax Breach and What to Do

If you haven’t heard it from the news yet, the major credit reporting agency, Equifax, has been one of the most recent victims of a cybersecurity breach. As many as 143 million Americans (almost half the country) has had a portion of their personal information compromised as a result of this breach. This information could include names, birth dates, social security numbers and in some cases credit card numbers or driver’s license numbers. As your trusted cybersecurity consultant, HI Tech Hui highly recommends you take the following actions and forward on these instructions to everyone you know.

Cybersecurity Ransomware

Cybersecurity Ransomware

“Hi Tech Hui, in collaboration with the Microsoft Store at Ala Moana Shopping Center, has launched a series of security awareness briefings. These free informative sessions review current security threats, provide foundations for protecting your computer & networks systems, and provide a slew of data and tips essential to data security. This video was recorded at our July 26th session.

Cylance vs. WannaCry-WanaCrypt0r 2.0

Cylance vs. WannaCry-WanaCrypt0r 2.0

How did your anti-virus solution hold-up against the WannaCry ransomware campaign of May 2017? If it didn't, consider Cylance. It's lead-edge, non-signature based anti-virus and anti-malware technology would have stopped WannaCry in its tracks even if you were running a version of Cylance that came out two years ago (2015). Can your current anti-virus solution say that? Learn More https://www.

Cylance Prevents This Ransomware, Including Offline Systems

Cylance Prevents This Ransomware, Including Offline Systems

WannaCry” has been reportedly used in more than 45,000 attacks across approximately 100 countries, details are available in the Cylance blog post.

CYLANCE PREVENTS THIS RANSOMWARE, INCLUDING OFFLINE SYSTEMS 

WHAT YOU SHOULD KNOW

CylancePROTECT predicts and prevents the WannaCry ransomware for WINDOWS, MAC AND LINUX endpoints both online and offline AND EMBEDDED WINDOWS.
The WannaCry ransomware encrypts files on endpoints and appends the affected files with the file extension “.WCRY”.
The attack leverages an SMBv2 remote code execution exploit, codenamed ETERNALBLUE, against Microsoft Windows that was made available in the Shadowbrokers dump in mid-April of this year.

Office 365 receives security upgrades

Office 365 receives security upgrades

With the increasing sophistication of cyberattacks, businesses need even stronger security tools to defend their sensitive documents. Fortunately, Office 365 subscribers now have more advanced security tools to stay ahead of the ever-evolving threat landscape.

This fake Google app is really a phishing scam

This fake Google app is really a phishing scam

If employee training and education isn’t an integral part of your cybersecurity strategy, a recent scam might force you to reconsider. Instead of relying on complicated programming code to steal and destroy data, hackers are increasingly relying on human errors to get the job done.

How to make your business pop online

How to make your business pop online

In today’s competitive business environment, SMBs are constantly finding new ways to outdo one another. Recently, social media and content marketing strategies have become increasingly popular. But because many of your competitors are utilizing the same platforms as you are, it’s essential for you to find new methods to make your business stand out.

The true cost of an ugly website

The true cost of an ugly website

We are taught never to judge a book by its cover. But in this superficial age, looks are everything, especially for websites. Your website is a customer’s first impression of your business, and if your site has poor graphics, illegible content, and other website no-no’s, that could end all chances of establishing a relationship and driving revenue.

Cloud security: everything you need to know

Cloud security: everything you need to know

Cloud technology is becoming more pervasive every day. Some reports claim that almost 90% of businesses will utilize some form of the technology in 2017. But somehow myths about its lack of security remain. From cloud-based software to data storage, we believe cloud security is swiftly becoming better than that of local area networks.