facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What’s the Best Antivirus for Businesses?

What’s the Best Antivirus for Businesses?

Quick Marty! Hop into the DeLorean! Let’s time travel back to a simpler time, back in the late 90’s!

Back then, you could walk into any store that sold software and you’d see two types of antivirus protection - orange boxes that said Norton, and red boxes that said McAfee.

Today, like most things, life isn’t as simple. There are a lot of choices, and… well, you shouldn’t be going to a store to buy your antivirus these days. Let’s discuss!

0 Comments
Continue reading

3 Technologies Your Business Can Use Right Now

3 Technologies Your Business Can Use Right Now

A lot of people didn’t take the novel Coronavirus seriously when it was first discovered outside of China in late February. Now four months later, as the pandemic rages on, people continue to work from home, have their hours cut, or be completely out of a job. For the business owner, this period has been filled with difficult decisions, including halting all major IT projects. If your business is looking for a solution to help them add the technology they need at a price that works for this period, here are three useful options.

0 Comments
Continue reading

Why Overworking is a Serious Issue for Your Remote Workers

Why Overworking is a Serious Issue for Your Remote Workers

As so many businesses have had to close their doors recently, remote work has become a very popular option. Unfortunately, this sudden shift has not been without negative side-effects. One such byproduct of this shift has been a serious overworking problem. This is a big problem, and one that you need to address if it has presented itself in your operations.

0 Comments
Continue reading

Technology Can Help You Ward Off Recession

Technology Can Help You Ward Off Recession

With months and months of bad news, many businesses are trying to find the right recipe to keep from having to make the hard decisions. Problem is that these hard decisions are looking as if they are going to be inevitable. With costs rising and revenues shrinking, there needs to be a strategic urgency that will allow your business to sustain operations when other companies are laying off their workers and folding into obscurity. Today, we take a look at some of the technology investments that you can make to keep your business afloat during the economic downturn. 

0 Comments
Continue reading

VoIP Is a Strong Communications Option

VoIP Is a Strong Communications Option

Over the past few years, VoIP has become an extremely popular solution for small businesses. In fact, 30 percent of today’s businesses use some sort of VoIP platform. There are many reasons why businesses are making the switch to VoIP. Today, we’ll explain a few. 

0 Comments
Continue reading

Don’t Get Tricked: Phishing Attacks Pretending to be Voicemail Attachments

Don’t Get Tricked: Phishing Attacks Pretending to be Voicemail Attachments

Human beings are naturally inquisitive creatures, which makes it all the easier for us to be convinced of different things. Cereal mascots promise wild flavors that will send kids on a Mom-approved adventure, magazine covers promise countless sure-fire ways to be rid of that stubborn belly fat, and—more sinisterly—phishing attacks promise to be something that they are not. As hackers have found, this tactic has proven to be worth investing time in.

0 Comments
Continue reading

Avoiding Cybersecurity Placebos in Your Business

Avoiding Cybersecurity Placebos in Your Business

When it comes to your business, especially its technology, some of the buzzwords you hear floating around can be pretty convincing, almost intoxicating. Unfortunately, like most buzzwords, many of these are aggrandized beyond their worth to the average small-to-medium-sized business. Let’s take a look at how this can impact a business’ perception of its cybersecurity, as well as dig into the reality behind these terms.

0 Comments
Continue reading

Cybersecurity Training Must Be a Priority

Cybersecurity Training Must Be a Priority

The nature of many of today’s businesses is building one product over and over and over. When you have that level of repetitiveness, it helps people find their niche, yes, but it can also result in the attention given to the task to suffer. While a disengaged employee is nothing new, they can cause some operational problems. By and large, a couple of staff hiccups won’t have a huge impact on your business, unless that lack of engagement impacts your cybersecurity. That’s because there are some threats out there that could absolutely cripple your business’ ability to sustain operations. Today, we’ll talk about how to get your staff to care about malware, hackers, and the like. 

0 Comments
Continue reading

Tip of the Week: Improve Your Management of Remote Workers

Tip of the Week: Improve Your Management of Remote Workers

For the past few months, a much larger percentage of people have been working from home. This remote workforce has proven to be much more effective than many would have thought, but some companies haven’t had the success getting the production out of their remote workers that others have. Today, we present three tips that will help you get the most out of your remote workforce.

0 Comments
Continue reading

Managing Your IT Inventory

Managing Your IT Inventory

Could you tell me when the last time your routers were updated? How about when your servers were last maintained? How old is the hardware in your office? Where would someone go to get a new keyboard? If you don’t know the answers to these questions it is possible that your IT is not properly inventoried. This month, we’ll discuss the importance of keeping a technology inventory.

0 Comments
Continue reading

How Automation Will Play into the Post-COVID-19 Workplace

How Automation Will Play into the Post-COVID-19 Workplace

As workplaces and offices everywhere have struggled to cope with the restrictions brought on by social distancing mandates, the adoption of automated solutions has surged ahead. Of course, this does open a few important questions to consider. For instance, what this could mean for employment post-pandemic, and how automation may be used in the future to mitigate the impacts we’re currently experiencing.

0 Comments
Continue reading

The Basics of PCI Compliance

202204446_PCI_DSS_400

Businesses today should be accepting card-based payments, regardless of their size. In addition to the convenience it offers to customers, it’s the most secure means you have of being paid. To protect consumers and their personal and financial information, many card providers have adopted a unified regulation that applies to businesses that accept these payments. Let’s review this regulation and how it impacts the average small-to-medium-sized business.

0 Comments
Continue reading

Tip of the Week: Using Google Drive’s Workspaces to Stay Organized

Tip of the Week: Using Google Drive’s Workspaces to Stay Organized

Many businesses looking to consolidate their tools are turning to cloud services and software suites that offer a centralized collection of solutions—such as the G Suite, as offered by Google. While G Suite offers the Google Drive as a means of organizing your work resources and documents, different files can sometimes be saved in different places. This week, our tip is going to cover how you can work around this fact with a feature called Workspaces.

0 Comments
Continue reading

Shifting IT Strategies as Your Business Grows

Shifting IT Strategies as Your Business Grows

There is a saying that you hear a lot in business: Plan for the worst, hope for the best. This is typically related to data redundancy, cybersecurity, or one of any other proactive steps a business should take to control the continuity of their business. What happens when you plan for the worst, but the best comes to fruition? What happens when your business consistently meets demand, prospers without issue, and grows quickly? Today, we will take a look at some issues the small business owner has to deal with when his/her business isn’t so small anymore. 

0 Comments
Continue reading

Storing Data Is a Miracle of Physics That We All Put Too Much Trust Into

Storing Data Is a Miracle of Physics That We All Put Too Much Trust Into

We all store data on our computers. Whether you have family photos and text documents on your home computer, or databases and on-premises applications running your entire business, data is typically stored in exactly the same way. If you knew how delicate your data actually was, you’d never let a single file exist in one place ever again. Let’s explore that.

0 Comments
Continue reading

Tip of the Week: Easing the Shift Between Remote and In-House Work

Tip of the Week: Easing the Shift Between Remote and In-House Work

While many businesses right now have found it best for their operations to shift to a remote strategy, it is important to consider how these operations will return in-house when it is again appropriate to do so. For this week’s tip, we’re reviewing a few best practices to help you contend with both processes.

0 Comments
Continue reading

There’s a Reason Some Scams are Painfully Transparent

There’s a Reason Some Scams are Painfully Transparent

“Hello sir/ma’am, I am a member of royal [sic] family and I am in grave danger in my country. If you send me money to get out safely, I will share my great riches with you as reward.”

Scams like this one have become a punchline for many, which makes you wonder why they are still commonly used by cybercriminals. As it turns out, there’s a very compelling reason that they do so, one that’s been known for years.

0 Comments
Continue reading

What Are Your Biggest Issues, IT Challenges and Priorities?

What Are Your Biggest Issues, IT Challenges and Priorities?

All a business’ technology is important to its operations, but based on its industry, certain priorities are bound to arise. A recent survey cast a light on some of these priorities, giving us a view of what small to medium-sized businesses are concerning themselves with. Let’s review some of the trends this survey revealed to see how well your priorities match up.

0 Comments
Continue reading

Tip of the Week: Maintain and Backup Your IT

Tip of the Week: Maintain and Backup Your IT

Imagine for a minute that you work in a small factory or machine shop. Some wind comes through and drops a 200-year-old maple tree through the roof onto the machines that you use to create your product. The devastation is total. If you have a second factory built to scale from the first, you could just ship your workers over to that one and keep productivity high. Chances are, however, there is no second factory. Your business is done until you can get the situation fixed. It could take days, weeks, or even months to get your business back on track; and if the stats are any indication, it probably won’t. 

0 Comments
Continue reading

You Need to Plan for the Worst and Hope for the Best

You Need to Plan for the Worst and Hope for the Best

Hope can be a big part of a person’s notion to start their own business. Needless to say that entrepreneurial hope doesn’t always consider that there will be a global pandemic that grinds the operational effectiveness that you’ve spent years building to a halt. Hope does, however, play a big part in the creation of a business continuity plan. Today, we’ll briefly discuss why you should never lose hope and how being prepared stems from the same notion as starting a business.

Recent comment in this post
Makemy Dsc
Make My Digital Signature I really want to admire the quality of this post. ... Read More
Tuesday, 02 June 2020 07:30
1 Comment
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Hackers Data Business Management Hardware Microsoft Workplace Tips Network Security Backup Managed Service Provider Hosted Solutions Business Productivity Productivity Email Malware IT Services Saving Money Efficiency Google Computer Small Business User Tips Innovation Collaboration VoIP IT Support Data Backup IT Support Smartphones Quick Tips Mobile Devices Network communications Business Continuity Microsoft Office Gadgets Cybersecurity Social Media Data Recovery Disaster Recovery Android Upgrade Communication Mobile Office Server Smartphone Virtualization Phishing Miscellaneous Mobile Device Management Ransomware Vendor Management Holiday Windows Outsourced IT Tech Term Managed IT Services Windows 10 Passwords Operating System Users Internet of Things Mobile Device Apps Facebook Unified Threat Management Remote Monitoring Automation BDR Analytics Managed IT services Data Management BYOD Remote Computing Apple Mobile Computing WiFi Windows 10 Training The Internet of Things Cloud Computing History Marketing Artificial Intelligence Browser Save Money Firewall Spam Help Desk Business Technology Encryption Alert App Big data Two-factor Authentication Information Technology Health Bandwidth IT Consultant Office Office 365 Content Filtering Printer Gmail Going Green Access Control Government Hard Drives Windows 7 Cybercrime Managed IT Bring Your Own Device Antivirus Maintenance Budget Information Tech Support Lithium-ion Battery Virus Best Practice Healthcare Hiring/Firing Recovery Employer-Employee Relationship Retail Wireless Technology Saving Time Computers Managed Service VPN Cost Management Search Outlook Windows 8 Customer Service Computing IBM Money Document Management Augmented Reality Phone System It Management Remote Work Blockchain Data Loss Travel Hacking Education Networking Update Project Management Humor iPhone SaaS Save Time Downtime Wireless File Sharing Customer Relationship Management Law Enforcement Hard Drive Storage Website Mobility Compliance Computer Repair Running Cable Voice over Internet Protocol Data Security PowerPoint Solid State Drive Proactive IT Current Events Data storage Applications Covid-19 Patch Management Flexibility Value Administration Password Twitter Conferencing Intranet Hacker Data Breach Legal Avoiding Downtime Risk Management Regulations Vendor Virtual Desktop Sports Business Intelligence Management Social Disaster Digital Payment Software as a Service Router End of Support Vulnerabilities Excel Hosted Solution Robot DDoS Securty Comparison Tablet Google Maps Company Culture Social Engineering Word Social Networking Black Market Cortana Cryptocurrency Meetings Laptop Scam Business Growth Private Cloud Fax Server Wi-Fi Telephony Monitoring Cooperation Digital Machine Learning User Websites Telephone Systems Net Neutrality Paperless Office Multi-factor Authentication Pain Points Specifications Safety Start Menu Tech Terms Unified Communications Chrome Settings Mobile Technology Telephone Public Cloud Licensing Solutions Documents Teamwork Heating/Cooling Identity Theft Professional Services Entertainment Uninterrupted Power Supply Computer Accessories Vulnerability IT service Trending Bitcoin Integration Politics Gaming Console Virtual Reality Data Protection Mouse Emails Automobile Bluetooth Webcam Downloads Statistics Distribution User Error Managed Services Provider Text Messaging Programming Chromebook Co-managed IT eWaste Network Congestion Computing Infrastructure Hack Google Docs How To How To Memory Experience Cost Managed Services Redundancy Download Employee/Employer Relationship Lifestyle Managed IT Service Streaming Media Monitors Processors Cleaning USB Evernote Office Tips Inbound Marketing Presentation Virtual Assistant Smart Devices Microchip Taxes Processor YouTube Distributed Denial of Service Employer Employee Relationship Microserver Browsers Data Warehousing Micrsooft G Suite Medical IT Trend Micro Video Conferencing Device Management User Tip Proactive Maintenance Access PCI DSS Drones Business Managemenet Wireless Headphones Security Cameras Threats Emergency Hard Drive Disposal Communitications Content Management Migration Connected Devices Hacks Physical Security Equifax Fleet Tracking Relocation Tablets Get More Done Navigation Digital Signature Virtual Machine Microsoft Excel Network Management Banking Botnet Computer Care Supply Chain Management Device security MSP Turn Key Data Analysis Employees Google Drive Upselling Windows Server 2008 Sync Printer Server eCommerce Internet Service Provider Permissions online Currency Language CCTV SQL Server Spyware Mobile Payment Regulations Compliance Nanotechnology Social Network Trojan GDPR Managing Risk IT Assessment Video Surveillance Desktop Finance Notifications Remote Working Music LinkedIn Startup Asset Tracking Reliable Computing Tech Hypervisor switches Writing Business Cards Service Level Agreement Business Metrics Computer Malfunction Organize PDF Electricity Printing Saving ZTime Username Fileless Malware Best Available Hybrid Cloud Keyboard Upgrades Unified Threat Management Backup and Disaster Recovery In Internet of Things Holidays Proxy Server Azure cache Harddrive Television Financial Data Skype Screen Reader Customer Resource management Modem Strategy Domains Electronic Health Records Debate LiFi Archive Gamification Smart Tech Scalability Term Public Speaking GPS Memes Piracy Upload Motion Sickness Electronic Medical Records Transportation WannaCry HTML Messenger Tracking Directions Display Shortcut Time Management Freedom of Information Point of Contact Deep Learning Fiber-Optic Database Webinar Recording Optimization Corporate Profile External Harddrive Managing IT Services Work/Life Balance Rental Service Dark Web Free Resource Entrepreneur Assessment SharePoint Telework Telephone System SSID Troubleshooting Surveillance Visible Light Communication Mobile Security Google Calendar Thin CLient Remote Workers Multi-Factor Security Cabling Processing HIPAA 3D Tip of the week IT Ebay IT consulting Software License Trends Web Server Health IT Environment Devices Books Workers Wasting Time Competition Touchscreen News Analytic Fraud Tactics Administrator Logistics Electronic Payment Virtual Machines VoIP Smart Phones Virtual Private Network Recycling UTM Content Supercomputer Bookmark Consultation CIO Product Reviews Business Owner Cyber security Knowledge Development Advertising Flash Employer/Employee Relationships Technology Tips Leadership Data Storage Staffing Google Wallet Legislation Error Worker Best Practives Google Play Telephone Service IP Address Adminstration Pirating Information Windows XP Read IT Plan Enterprise Resource Planning Accountants A.I. Reading Samsung Managing Costs Application Fake News Displays email scam Addiction Microsoft 365 Human Resources Audit Procurement Society Financial Productuvuty Printers Managing Stress CrashOverride 3D Printing Regulation Personal Information FinTech Capital

toner1