A Timely Intervention: How Cowabunga Protected a local Resident from a Dangerous Scam

A Timely Intervention: How Cowabunga Protected a local Resident from a Dangerous Scam

In the early hours of one recent morning, Cowabunga’s vigilant security system detected unusual activity on a client’s computer. At 4:55am, a remote access application was launched. While such applications can have genuine purposes, the timing was odd. Our security system quickly terminated the suspicious activity and we noted it, planning to notify the client at a more reasonable hour.

But by 5:16am, a second, different remote access application was flagged. Two such applications in such a short time span raised red flags. We knew immediate intervention was required.

Despite our best efforts, initial phone calls and on-screen alerts to the client went unanswered. Undeterred, we took further steps to ensure the client’s safety by shutting down active browser connections and other suspicious applications.

Finally, the client responded. They revealed they were on the phone with what they believed was “HP support”. They’d been instructed to ignore our calls and on-screen messages.

It became clear: our client was on the brink of becoming a victim of a technical support scam. A fraudulent search result had led them to a fake support line.

Thanks to Cowabunga’s unwavering commitment to security, the scam was thwarted. No credit card, bank, or retirement funds were compromised.

At Cowabunga, we pride ourselves on being more than just a managed services provider. We’re your frontline defense against the increasingly sophisticated world of cyber threats. Our message to all our valued clients and prospective partners: Let us be your first and only call for technical support. With Cowabunga in your corner, rest easy knowing you’re protected from the myriad of threats lurking online.

Choose Cowabunga for steadfast protection, always. Secure your computers, servers, and networks with the best in Honolulu.

Picking the Right Firewall: Exploring the Power of Cisco Meraki Firewalls

In today’s interconnected world, where businesses and residents rely heavily on the internet, ensuring network security is of paramount importance. A robust firewall is the first line of defense against cyber threats and unauthorized access. Among the myriad of firewall options available, Cisco Meraki firewalls stand out as a reliable and advanced choice. In this article, we will explore the significance of a firewall and delve into the key features that make Cisco Meraki a top contender for safeguarding networks.

The Importance of a Firewall: A firewall acts as a protective barrier, monitoring incoming and outgoing network traffic and filtering it based on predefined security rules. Whether you are a small business or a resident, a firewall is crucial for several reasons:

  1. Network Security: Firewalls prevent unauthorized access to your network and protect your sensitive data from potential cyber attacks such as malware, ransomware, and phishing attempts.
  2. Traffic Management: A firewall ensures that your network resources are utilized efficiently by regulating and prioritizing traffic flow.
  3. Compliance: For businesses, certain industries require compliance with strict data protection regulations. A robust firewall helps in meeting these compliance standards.

Key Features of Cisco Meraki Firewalls: Cisco Meraki firewalls offer a wide range of features that cater to the needs of both small businesses and residents. Here are some of the standout features:

  1. Cloud-Managed Security: One of the unique aspects of Cisco Meraki firewalls is their cloud-based management. This allows easy and centralized control of multiple devices across different locations, making them ideal for managed services providers overseeing several clients.
  2. User-friendly Interface: The intuitive dashboard of Cisco Meraki firewalls simplifies the configuration and monitoring process. Even non-technical users can easily manage their network security effectively.
  3. Advanced Threat Protection: Meraki firewalls come equipped with intrusion prevention systems (IPS) and antivirus scanning to proactively identify and block malicious activities, providing an additional layer of protection.
  4. Content Filtering and Application Control: For businesses and parents alike, content filtering and application control features are valuable. These features allow users to restrict access to certain websites or applications, ensuring a safer online experience.
  5. VPN Connectivity: Cisco Meraki firewalls support Virtual Private Network (VPN) connectivity, enabling secure communication between remote offices or telecommuting employees.

Conclusion: In conclusion, selecting the right firewall is crucial for safeguarding your network and data from cyber threats. Cisco Meraki firewalls offer a compelling suite of features, making them an excellent choice for managed services providers and individuals seeking reliable network security. By embracing the power of Cisco Meraki firewalls, you can not only fortify your network but also build trust among your clients or family members by providing a secure online environment.

Remember, while we’ve highlighted the advantages of Cisco Meraki firewalls in this article, it’s essential to conduct a thorough evaluation to ensure the chosen firewall aligns with your specific needs. With the right firewall in place, you can stay ahead in the ever-evolving landscape of cybersecurity.

Wireless Access Points

Do you suffer from a weak wireless signal?  This is a very simple question to answer.  Either you do or you don’t, it’s a yes or a no.

The solution to the problem however is not quite so simple.  A poor wireless signal can be caused by a whole spectrum of issues.  In this short article, we hope to tackle some of the more common issues.

The most common issue with a weak signal is access point placement.  Before you go out buying new equipment, you should first determine if repositioning the access point will give you better coverage.  Place the access point in a central location in your home and see if that helps cover your entire house.  Access points broadcast their signal outwards in a circular pattern. Depending on the material used to build your home, the walls will distort and reflect the signal causing dead zones.

If placement of the access point doesn’t help because there are too many obstructions in the house, adding additional access points may be of importance.  In this configuration, you want to move your access points so they evenly cover the household.  You don’t want them bunched up in the middle of the building and you don’t want them on the very edges either.

Once you have the right placement and right quantity of wireless access points to cover your entire home, you want to make sure that your devices are talking on the right frequency.  Newer access points operate in the 5Ghz spectrum.  This spectrum typically requires a direct line of sight for a fast reliable connection.  If there are obstacles in the home, 5Ghz speeds will tend to drop off quickly and you may be better off using the 2.4Ghz wireless signal.

Moving beyond just the speed, making sure your access point is capable of handling more devices is important.  In todays modern world, its not uncommon for a typical family household to have 3-4 ipads, 2-4 smart phones, 3-4 wireless televisions and 2-3 laptops computers.  When you do the math, we are talking about 20+ devices for a family of 5.  When looking for a good access point, you want to make sure it has MU-MIMO technology.  MU-MIMO stands for Mult-User, Multiple Input, Multiple Output.   This technology opens up the lines of communications with the router and allows all devices to talk simultaneously without crowding each other out.

We configure and deploy Meraki Wireless Access Points in areas like schools where WIfi is mission critical to the learning of the students.  When you have 30 students in a classroom, and 20 classrooms across the campus, Meraki Wireless Access points offer advanced capabilities to smooth out issues and offer detailed reporting when issues arise.

For residential and commercial businesses, we deploy Unifi wireless access points.  These offer a cheaper alternative to Meraki because they do not require an active subscription to function.  These offer equally high performance to their Meraki counterparts, but require a little more hands-on knowledge to setup, configure and troubleshoot.


If you need help with a wireless problem, if it’s a new install or a wireless installation that isnt working like you expect it, we can be of assistance.

Step 1 of 5
What is a blue screen of death

What is a blue screen of death

The dreaded Blue Screen of Death, AKA BSOD

Have you seen this screen?  We have seen it thousands of times!  Customers bring their computers to us with this issue.  The biggest issue with this screen is that the fix is not always the same.  

The screen always displays some clues about the underlying issue.  Sometimes its a hardware error, sometimes its a sofware issue.  If the error happens when you are not at the computer, it can be diagnosed by searching your event logs for specific eventID’s.

One blue screen of death may be harmless and safely ignored as windows does have a hiccup from time to time when software tries to access memory it doesnt have permission to access.  Typically this happens with driver software since its interacting with hardware.  

Its when you see this blue screen often that you should be concerned the most.  Thats where getting to the root of the problem is important so it can be addressed.  A software called Blue Screen View from Nirsoft will find files called memory dumps so you can isolate which software caused the blue screen.  From there its practical to update the sofware or driver and see if the issues are resolved.

In more extreme cases, hardware may have to be replaced, but these issues are typically less common.

If you are still having problems you cant resolve, we have technician trained to sniff out the cause of these blue screens.  You can contact us for help.


Submit Request for Help with Blue Screens

Step 1 of 5
Data Recovery

Data Recovery

hard drive

Technology is a part of our daily lives.  The amount of time the average person spends interacting with their digital devices continues to climb with each passing year.  The amount of data being processed and stored accumulates and the size of our storage devices continues to grow.

At one point of another, for many various reason, access to the data is lost.

Corrupted Data

Corrupted data referes to errors that occur duing writing, reading, transmission or processing which introduce unintended changes to the original data.  Data corruption in an image file can manifest as artifacts on the image that shouldnt be there. In an audio file, it could be garbled or skipped audio.  In a word document, it could be jumbled characters. For any of those file types, it could be so bad that they are no longer recognized as images, audio or text and they no longer open in your favorite application.

Hardware Failure

Common ways for data corruption to be introduced is due to faulty hardware.  Failing random access memory, or RAM for short cause introduce corruption as the data is commited to the hard drive from RAM.  There are various technologies that help mitigate memory corruption.  ECC Memory is a server technology not normally available for consumer grade computers and is generally much more expensive than normal memory.

A hard drive can also begin to have problems with individual sectors/blocks that can introduce corruption.  When a sector/block goes bad, one peice of the stored data becomes inaccessible.  Windows has the ability to recover from some of these errors with utilities such as Check Disk.  When a hard drive has a large amount of failed sectors, the operating system itself can become corrupt and unable to boot.

Data Recovery

Its important when dealing with data that special care is taken to ensure that the data corruption is not made worse.  There are ways to preserve the original state of the data incase more than one attempt is needed to recover the data.  Cloning is the term used when a service technician makes an exact copy of the old drive.

Once the drive has been cloned, utilities like checkdisk can fix corrupted data.  Sometimes the built in utilities are not enough and 3rd party utilities can be used to peice the data back together again.  Often these utilities have a free version you can test to see if they can recover the data with additional fees to recover all the data.

If the problem is severe and the physical device is bad, the device can be sent to an advanced data recovery facility where it is disassembled and physically repaired.  These types of services usually cost in the thousands of dollars for the basic tier.

Cowabunga! Data Recovery Services

We offer basic data recovery services.  We do a free assesment of the drive and offer a quote for recovery.  If we cannot recover any of the data, there is never any charge.  We can then refer you to a mainland partner that provides clean room disassembly services. 

Microsoft will be disabling SMB1 by default for Windows 11 Home Insiders

Microsoft has been recommending systems administrators to disable SMB v1 on their network for years now. SMB v1 is vulnerable to a number of exploits which include Man in the middle attacks, insecure guest authentication and security downgrade attacks. Even exchange is vulnerable to issues surrounding SMB v1.

A few of the major viruses circulating in the wild also take advantage of the flaws in SMB v1. These include, but are not limited to EternalBlue, EternalRomance, TrickBot, Emotet, WannaCry, Retefe, NotPetya and Olympic Destroyer.

Disabling SMB v1 is easy, but not without issues. Many old applications require v1 to function as they are not compatible with the newer SMB v2 or SMB v3. Migrating off of legacy applications and devices will make for an easier transition when Microsoft finally puts SMB v1 to rest permanently.