facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Powerful Physical Security Options

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?

0 Comments
Continue reading

The Marriott Hack Exposes 500 Million People

The Marriott Hack Exposes 500 Million People

It’s nice to get away every now and then, but if you have stayed at any property under the Marriott umbrella, including St. Regis, Westin, Sheraton, or W hotel since 2014, there is a good chance that your personal information has been leaked, a spokesperson from parent company Marriott has said. They said the multinational hotel corporation will begin emailing users impacted by the leak in the coming days.

0 Comments
Continue reading

Google Play Works to Reduce Ad-Fraud

Google Play Works to Reduce Ad-Fraud

What’s a smartphone without some apps to download to it? With millions of apps to choose from, developers might often have less-than-virtuous motives that put their users at risk for their own benefit. Recently, Google has removed 22 apps from the Google Play Store that were found to contain automated click-fraud scripts. We’ll delve into what these developers were up to with these fraudulent applications, as well as how they would affect the two-million users that downloaded them.

0 Comments
Continue reading

Why Protecting Your Google Account Should Be a Priority

Why Protecting Your Google Account Should Be a Priority

Your Google account is one of your most important assets, regardless of whether you’re a business professional or a casual user. The tricky part of using Google, however, is to make sure that you’re using this asset safely. By securing your account and valuing your Google account credentials, you can make sure your account stays safe.

0 Comments
Continue reading

Want Proof that You Need to Monitor Your Solutions?

Want Proof that You Need to Monitor Your Solutions?

When discussing the practice of monitoring solutions to prevent threats, it isn’t uncommon for many businesses to put these concerns on the back burner. However, every so often, an example comes around to help inspire businesses to take their monitoring seriously. This time, the example was the arrest of 24 spammers in October for scamming American citizens by impersonating Microsoft support staff members.

0 Comments
Continue reading

Tip of the Week: Improvement Needed to Avoid Cybercrime

Tip of the Week: Improvement Needed to Avoid Cybercrime

Did you know that almost 90 percent of small business owners feel they are completely safe from attack? It’s unfortunate, but the truth of the matter is that half of these businesses will eventually be proven wrong--they too can suffer from a cyberattack. Are you going to risk becoming one of them? You should know now that there is no reason to.

0 Comments
Continue reading

Are Your Mobile Security Settings Up to Par?

Are Your Mobile Security Settings Up to Par?

While you may not consider it at first, your mobile device has a sizeable amount of personally identifiable data on it - far more than should be left on an unsecured phone at any time. Fortunately, Google has added a considerable layer of protections to Android to assist users with their security. All a user has to do is know how to use them to their fullest potential.

0 Comments
Continue reading

Fileless Malware Attacks Increasing

Fileless Malware Attacks Increasing

Ransomware has been far from low-profile since its inception several years ago. Everyone knows what the file-encrypting malware does, and they all know that paying the ransom can make the nightmare go away by decrypting the files located on their computer. As if the threat of losing data forever wasn’t enough, you’re staring down a ticking clock while this is going on. Nowadays, ransomware is becoming more difficult to manage through various tactics.

0 Comments
Continue reading

A Look at this Year’s Worst Cybercrimes

A Look at this Year’s Worst Cybercrimes

It’s fair to say that today's organizations are faced with more online threats than ever before. To properly manage the information systems that they depend on for productivity, redundancy, and operational management, they need to ensure that they are doing what they need to do to mitigate problems stemming from the continuous flow of threats.

0 Comments
Continue reading

Hackers Continuously Target Major Sporting Events

Hackers Continuously Target Major Sporting Events

Sports are a very popular thing around the world, which means that these athletic contests gather many fans to them. In turn, this means that these events are chock full of potential targets for a hacking attack. Today, we’ll examine the assortment of hacks that have taken place around sporting events.

0 Comments
Continue reading

Scam Claims to Have Compromising Video… of You

Scam Claims to Have Compromising Video… of You

Every business (and every individual, for that matter) needs to be wary of Internet scams and other online tricks. This is because those scammers are wily and have many means of finding a user in a compromising position… or so they claim in a recent scam.

0 Comments
Continue reading

Your Emails Won’t Be Secure Without these Safeguards

Your Emails Won’t Be Secure Without these Safeguards

Are your employees putting your organization’s security at risk due to poor email practices? This is a question that all business owners need to consider--especially if you deal in sensitive information. We recommend that all businesses utilize a two-pronged approach to email security, including both technology measures to secure communications on the technical side and training to secure on the human side.

0 Comments
Continue reading

Surveying the Damage of Meltdown and Spectre

Surveying the Damage of Meltdown and Spectre

At the time of this writing, it has only been about a half a year since the Meltdown and Spectre exploits became public knowledge. Fortunately, patches were swiftly rolled out to mitigate the problems that these exploits could cause, but that doesn’t mean that these exploits are dead and buried. Let’s look back at Meltdown and Spectre to help us establish where we stand today.

0 Comments
Continue reading

Will Your Online Privacy Be Better Using Blockchain?

Will Your Online Privacy Be Better Using Blockchain?

Blockchain has been an especially hot topic as of late, especially with the recent meteoric rise in the value of most cryptocurrencies. With all the focus directed to Bitcoin, it is easy to forget that the blockchain has other uses - uses that are geared toward increased cybersecurity, transparency, and privacy.

0 Comments
Continue reading

A Close Examination of Cyberterrorism

A Close Examination of Cyberterrorism

Unfortunately, we’ve all been exposed to terrorism in one way or another. To avoid any confusion, when we reference terrorism, we’re talking about situations that arise where individuals or groups commit overtly evil acts to deliberately intimidate people. Cyberterrorism is doing the same thing through coordinated attacks on computing networks. Today, we take a look at cyberterrorism and how it is different from other cybercrime.

0 Comments
Continue reading

How to Identify If an Email is a Security Risk

How to Identify If an Email is a Security Risk

There’s one major reason why email is the preferred method of spreading threats like ransomware and other types of malicious software. The sheer number of messages that can be sent through email on its own increases the odds that a user will click on the wrong link or download the wrong attachment. How can you know the legitimacy of any message you receive in your email inbox?

0 Comments
Continue reading

More Victims of the Equifax Breach Discovered

More Victims of the Equifax Breach Discovered

The 2017 Equifax leak was a disastrous scenario, but recent revelations have discovered that even more victims were affected than was previously thought. Nobody ever wants to hear this kind of news, but there is an upside to this that shouldn’t be ignored - learning from the mistake. We’ll start with a refresher on what happened exactly, and what these new developments mean for your organization.

0 Comments
Continue reading

Take These Steps to Make IT Security Top of Mind

Take These Steps to Make IT Security Top of Mind

Here’s the thing about IT security: it requires a little more than a decent firewall and a reasonably-strong password. We talk a lot about how to ensure that your business’ network stays a top priority, and the best way to do that is to implement what we call a Unified Threat Management (UTM) solution. An enterprise security system like a UTM can provide a considerable improvement for the way you protect your organization, but even something as simple as a little bit of user error could bypass these protocols.

0 Comments
Continue reading

Why CPA Firms are in Danger of Being Hacked

Why CPA Firms are in Danger of Being Hacked

The Internal Revenue Service has declared to tax professionals that they must take extra steps toward protecting the information of taxpayers. Certified Public Accountant (CPA) firms, whether they are large organizations or small businesses, hold much information that could be used by hackers and identity thieves, which makes them major targets during tax season.

0 Comments
Continue reading

Data Loss Can (and Will!) Affect Your Entire Business

Data Loss Can (and Will!) Affect Your Entire Business

Data loss, on any scale, is an organizational nightmare. Not only do you have to restore data, any lost productivity that comes as a result of the data loss incident makes it difficult on the budget. That’s only scratching of the surface of how serious data loss can be.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Hackers Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Saving Money Email Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Mobile Devices User Tips Smartphones Quick Tips Innovation Gadgets Business Continuity VoIP Disaster Recovery Microsoft Office Network Android Social Media Mobile Office Virtualization Productivity Data Backup Collaboration Server Smartphone Mobile Device Management Communication Miscellaneous Data Recovery Ransomware Upgrade Windows 10 communications Tech Term Windows IT Support Unified Threat Management Facebook Holiday Remote Monitoring Operating System Passwords Apps Mobile Computing Cybersecurity Managed IT services Phishing BYOD Remote Computing Vendor Management Users WiFi BDR Automation Marketing Mobile Device Analytics Data Management The Internet of Things Firewall Outsourced IT History Apple Browser Save Money Internet of Things Alert Artificial Intelligence App Managed IT Services Big data Encryption IT Consultant Going Green Office Maintenance Bandwidth Bring Your Own Device Printer Antivirus Office 365 Health Spam Cloud Computing Content Filtering Gmail Business Technology Saving Time Windows 8 Outlook Cybercrime Help Desk Training Wireless Technology Windows 10 Cost Management Tech Support Managed IT Virus Search Budget Hiring/Firing Two-factor Authentication Hard Drives Lithium-ion Battery Best Practice Information Technology Blockchain IBM Computers Recovery VPN Employer-Employee Relationship Travel Hacking Update Access Control Money Phone System Healthcare Document Management Applications Government Website Managed Service SaaS Twitter Augmented Reality Intranet PowerPoint Education Law Enforcement Humor Risk Management Compliance Administration Data storage File Sharing Information Hard Drive Save Time Mobility Networking Legal Customer Service Proactive IT Running Cable Regulations It Management Excel Social Networking Paperless Office Patch Management Sports Disaster Customer Relationship Management Data Loss Computing Fax Server Scam End of Support Word Hosted Solution Robot Machine Learning Securty Password Cortana Data Breach Value Telephone Systems Project Management Digital Solid State Drive Hacker Websites Business Intelligence Flexibility Management Black Market Digital Payment Cryptocurrency Laptop Google Maps Avoiding Downtime Router Downtime User Business Growth iPhone Comparison Tablet Social Current Events Social Engineering Wireless Company Culture DDoS Data Security Computer Repair YouTube How To Storage Statistics Private Cloud Programming Unified Communications Settings Download Network Congestion Cooperation Lifestyle Telephony Conferencing Retail Vendor Redundancy eWaste Gaming Console Microchip Taxes Streaming Media IT service Distributed Denial of Service Webcam Text Messaging Monitoring Evernote Public Cloud Net Neutrality Processors Bluetooth Start Menu Tech Terms USB Identity Theft Chrome Mobile Technology Presentation Inbound Marketing Vulnerabilities Software as a Service Google Docs Specifications Safety Politics Uninterrupted Power Supply Virtual Desktop Virtual Reality Computer Accessories Experience Emails Monitors Automobile Cleaning Trending Bitcoin Office Tips Documents Co-managed IT Pain Points Chromebook User Error Entertainment Data Protection Heating/Cooling Computing Infrastructure Hack Mouse Rental Service Meetings Gamification Skype Displays Processing Screen Reader cache Customer Resource management Television Archive Society Health IT Piracy Upload Micrsooft PDF Managed IT Service Cabling Upselling Smart Tech WannaCry Distribution Downloads Web Server Database Time Management Freedom of Information Drones Bookmark Books Workers HTML Corporate Profile Point of Contact Best Available Keyboard Wi-Fi Administrator Video Surveillance Fiber-Optic Supercomputer Saving ZTime Mobile Security Google Play Assessment Telephone System SharePoint Domains Software License Trends Tip of the week Processor Worker Multi-Factor Security Cost Google Calendar Permissions Language Public Speaking Best Practives Fraud Tactics Touchscreen Recycling News Browsers Reading Samsung Harddrive Devices VoIP Analytic Shortcut Medical IT Debate User Tip Employer Employee Relationship UTM Content Knowledge Product Reviews switches Writing Entrepreneur Security Cameras G Suite Microserver GPS Consultation Music Troubleshooting External Harddrive IT Plan Enterprise Resource Planning Virtual Assistant Upgrades Environment Navigation Licensing Legislation Error Technology Tips Read HIPAA Hacks Physical Security email scam Addiction Fake News Electronic Payment Data Analysis Relocation Tablets Accountants A.I. Audit LiFi Competition Professional Services Banking Get More Done Botnet Business Owner Printer Server Thin CLient Multi-factor Authentication GDPR Sync Turn Key 3D Ebay Device Management Data Warehousing Smart Phones Migration Connected Devices Emergency Hard Drive Disposal Business Managemenet Deep Learning Tech Wireless Headphones Access Telephone Content Management Work/Life Balance IP Address Notifications Trojan CCTV Network Management Microsoft Excel Human Resources Fileless Malware Reliable Computing Organize Equifax Fleet Tracking Computer Care Visible Light Communication Memory Application Voice over Internet Protocol Business Metrics Computer Malfunction Proxy Server Leadership Device security MSP IT consulting Modem In Internet of Things Adminstration Pirating Information Google Drive Windows Server 2008 online Currency Desktop Finance Vulnerability Term Nanotechnology Spyware Social Network Mobile Payment Electronic Medical Records Business Cards Service Level Agreement LinkedIn CIO Directions Scalability Startup Electricity Asset Tracking Printing Advertising Flash Digital Signature Recording Motion Sickness Windows 7 Staffing Google Wallet Dark Web Messenger Webinar Tracking Username Windows XP Teamwork SSID Unified Threat Management Backup and Disaster Recovery Managing Stress CrashOverride Regulation Capital Printers Productuvuty 3D Printing

toner1