facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will U.S. Leaders Consider Data Privacy?

Will U.S. Leaders Consider Data Privacy?

Over 90 percent of people in the United States feel like their data is out of their control, and judging from the impression that the European Union’s General Data Protection Regulation left on the world, it’s surely not going to be the last piece of privacy legislation that is issued. Still, will it be enough to urge certain governments and organizations to practice what they preach? The results could have long-lasting effects on businesses, as well.

0 Comments
Continue reading

Phishing Attacks Are Besting Two-Factor Authentication--Now What?

Phishing Attacks Are Besting Two-Factor Authentication--Now What?

What has proven to be one of the more effective ways of preventing phishing attacks may be under fire from more advanced threats designed specifically to penetrate the defenses of two-factor authentication. This means that users need to be more cognizant of avoiding these attacks, but how can you help them make educated decisions about this? Let’s start by discussing the phishing attacks that can beat 2FA.

0 Comments
Continue reading

Taking a Trip Through Data Privacy, Part II

Taking a Trip Through Data Privacy, Part II

Earlier this week, you may have seen the first part of this article, where we discussed how robocallers collect your information. Today, we continue our discussion on data privacy and what you can do to keep your organization and personal data safe.

0 Comments
Continue reading

Taking a Trip Through Data Privacy, Part I

Taking a Trip Through Data Privacy, Part I

Protecting your business’ data is no simple task. To make it as secure as possible, you’ll have to understand how personal data flows through online channels. We’re digging pretty deep with this one, so get ready for an informative and, if nothing else, interesting read. This topic is especially important in an age where Facebook and Google exist, but there are countless other threats to data privacy out there that we all experience on a regular basis--business or not.

0 Comments
Continue reading

5 Reasons IT is Stressed About Security

5 Reasons IT is Stressed About Security

If you have an internal IT administrator, they might be pretty stressed about your business’ security. Why? Simple - there’s a good chance that they feel trapped in a few common situations. Let’s review some stresses that influence IT employees, negatively affecting your security.

0 Comments
Continue reading

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

0 Comments
Continue reading

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

0 Comments
Continue reading

Powerful Physical Security Options

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?

0 Comments
Continue reading

The Marriott Hack Exposes 500 Million People

The Marriott Hack Exposes 500 Million People

It’s nice to get away every now and then, but if you have stayed at any property under the Marriott umbrella, including St. Regis, Westin, Sheraton, or W hotel since 2014, there is a good chance that your personal information has been leaked, a spokesperson from parent company Marriott has said. They said the multinational hotel corporation will begin emailing users impacted by the leak in the coming days.

0 Comments
Continue reading

Google Play Works to Reduce Ad-Fraud

Google Play Works to Reduce Ad-Fraud

What’s a smartphone without some apps to download to it? With millions of apps to choose from, developers might often have less-than-virtuous motives that put their users at risk for their own benefit. Recently, Google has removed 22 apps from the Google Play Store that were found to contain automated click-fraud scripts. We’ll delve into what these developers were up to with these fraudulent applications, as well as how they would affect the two-million users that downloaded them.

0 Comments
Continue reading

Why Protecting Your Google Account Should Be a Priority

Why Protecting Your Google Account Should Be a Priority

Your Google account is one of your most important assets, regardless of whether you’re a business professional or a casual user. The tricky part of using Google, however, is to make sure that you’re using this asset safely. By securing your account and valuing your Google account credentials, you can make sure your account stays safe.

0 Comments
Continue reading

Want Proof that You Need to Monitor Your Solutions?

Want Proof that You Need to Monitor Your Solutions?

When discussing the practice of monitoring solutions to prevent threats, it isn’t uncommon for many businesses to put these concerns on the back burner. However, every so often, an example comes around to help inspire businesses to take their monitoring seriously. This time, the example was the arrest of 24 spammers in October for scamming American citizens by impersonating Microsoft support staff members.

0 Comments
Continue reading

Tip of the Week: Improvement Needed to Avoid Cybercrime

Tip of the Week: Improvement Needed to Avoid Cybercrime

Did you know that almost 90 percent of small business owners feel they are completely safe from attack? It’s unfortunate, but the truth of the matter is that half of these businesses will eventually be proven wrong--they too can suffer from a cyberattack. Are you going to risk becoming one of them? You should know now that there is no reason to.

0 Comments
Continue reading

Are Your Mobile Security Settings Up to Par?

Are Your Mobile Security Settings Up to Par?

While you may not consider it at first, your mobile device has a sizeable amount of personally identifiable data on it - far more than should be left on an unsecured phone at any time. Fortunately, Google has added a considerable layer of protections to Android to assist users with their security. All a user has to do is know how to use them to their fullest potential.

0 Comments
Continue reading

Fileless Malware Attacks Increasing

Fileless Malware Attacks Increasing

Ransomware has been far from low-profile since its inception several years ago. Everyone knows what the file-encrypting malware does, and they all know that paying the ransom can make the nightmare go away by decrypting the files located on their computer. As if the threat of losing data forever wasn’t enough, you’re staring down a ticking clock while this is going on. Nowadays, ransomware is becoming more difficult to manage through various tactics.

0 Comments
Continue reading

A Look at this Year’s Worst Cybercrimes

A Look at this Year’s Worst Cybercrimes

It’s fair to say that today's organizations are faced with more online threats than ever before. To properly manage the information systems that they depend on for productivity, redundancy, and operational management, they need to ensure that they are doing what they need to do to mitigate problems stemming from the continuous flow of threats.

0 Comments
Continue reading

Hackers Continuously Target Major Sporting Events

Hackers Continuously Target Major Sporting Events

Sports are a very popular thing around the world, which means that these athletic contests gather many fans to them. In turn, this means that these events are chock full of potential targets for a hacking attack. Today, we’ll examine the assortment of hacks that have taken place around sporting events.

0 Comments
Continue reading

Scam Claims to Have Compromising Video… of You

Scam Claims to Have Compromising Video… of You

Every business (and every individual, for that matter) needs to be wary of Internet scams and other online tricks. This is because those scammers are wily and have many means of finding a user in a compromising position… or so they claim in a recent scam.

0 Comments
Continue reading

Your Emails Won’t Be Secure Without these Safeguards

Your Emails Won’t Be Secure Without these Safeguards

Are your employees putting your organization’s security at risk due to poor email practices? This is a question that all business owners need to consider--especially if you deal in sensitive information. We recommend that all businesses utilize a two-pronged approach to email security, including both technology measures to secure communications on the technical side and training to secure on the human side.

0 Comments
Continue reading

Surveying the Damage of Meltdown and Spectre

Surveying the Damage of Meltdown and Spectre

At the time of this writing, it has only been about a half a year since the Meltdown and Spectre exploits became public knowledge. Fortunately, patches were swiftly rolled out to mitigate the problems that these exploits could cause, but that doesn’t mean that these exploits are dead and buried. Let’s look back at Meltdown and Spectre to help us establish where we stand today.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Data Microsoft Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Email Saving Money Malware Hosted Solutions IT Services Efficiency Google IT Support Small Business User Tips Computer Mobile Devices Smartphones Innovation Quick Tips Business Continuity Gadgets VoIP Microsoft Office Disaster Recovery Network Social Media Productivity Android Data Backup Collaboration Communication Mobile Office Virtualization Smartphone Server Upgrade Mobile Device Management Data Recovery communications Miscellaneous Ransomware Windows 10 Tech Term Cybersecurity IT Support Unified Threat Management Windows Phishing Vendor Management Holiday Passwords Operating System Remote Monitoring Facebook Managed IT services Analytics Apps BYOD Remote Computing Mobile Computing Automation BDR Users WiFi Apple The Internet of Things Mobile Device Data Management Outsourced IT Internet of Things Marketing Artificial Intelligence Firewall History App Managed IT Services Browser Save Money Alert Cloud Computing Encryption IT Consultant Big data Gmail Maintenance Content Filtering Spam Printer Going Green Health Bring Your Own Device Office Office 365 Antivirus Windows 10 Bandwidth Two-factor Authentication Managed IT Tech Support Best Practice Information Technology Virus Lithium-ion Battery Cybercrime Hiring/Firing Hard Drives Business Technology Cost Management Saving Time Help Desk Wireless Technology Training Search Windows 8 Outlook Budget Access Control Recovery Money Employer-Employee Relationship Document Management IBM It Management Blockchain Phone System Hacking Computers VPN Travel Healthcare Education Update Managed Service Compliance Humor Mobility iPhone Save Time Government Data storage Website Proactive IT Running Cable Information Networking Augmented Reality Legal PowerPoint Regulations Intranet Twitter Administration SaaS Applications File Sharing Risk Management Law Enforcement Customer Service Hard Drive Business Intelligence Google Maps Wireless Digital Payment Solid State Drive DDoS Social Engineering Router Downtime Flexibility Black Market Comparison Tablet Cryptocurrency Excel Laptop Word Data Security Retail Company Culture Computer Repair Business Growth Customer Relationship Management Value Social Networking Management Password Patch Management Cortana Data Loss Telephony Current Events Hacker Machine Learning Vulnerabilities Scam Telephone Systems Paperless Office Sports Data Breach Computing Disaster User Digital End of Support Hosted Solution Project Management Robot Fax Server Websites Securty Social Avoiding Downtime Chrome Mobile Technology Documents Heating/Cooling Politics Conferencing Entertainment Software as a Service Virtual Reality Uninterrupted Power Supply Pain Points Emails Storage Bluetooth Automobile Computer Accessories Chromebook Vulnerability Monitoring Bitcoin Computing Infrastructure Hack Data Protection Google Docs Trending Windows 7 How To Mouse Download Private Cloud Voice over Internet Protocol Experience eWaste Monitors Cleaning Office Tips Gaming Console Statistics Programming Microchip Taxes Network Congestion Distributed Denial of Service Co-managed IT YouTube Text Messaging User Error Redundancy Processors Webcam USB Unified Communications Settings Presentation Evernote Streaming Media Public Cloud Cooperation Virtual Assistant Vendor Virtual Desktop Lifestyle Specifications Safety Identity Theft Start Menu Tech Terms Net Neutrality Distribution IT service Inbound Marketing Device Management Business Metrics Computer Malfunction HTML Browsers Digital Signature switches Access Writing Adminstration Pirating Information Reliable Computing Best Practives Fiber-Optic Database Medical IT Music Emergency Hard Drive Disposal Leadership Mobile Security User Tip Teamwork Upgrades Computer Care Business Managemenet Security Cameras Telephone System Microsoft Excel Content Management In Internet of Things Microserver Multi-Factor Security Navigation Cost LiFi Google Drive Windows Server 2008 Software License Trends Solutions online Currency Motion Sickness Devices Data Analysis Spyware Mobile Payment Scalability Fraud Tactics Professional Services PDF UTM Content Best Available Electricity Keyboard Deep Learning Printing Messenger Get More Done Tracking GDPR Work/Life Balance Upselling Rental Service LinkedIn Meetings Turn Key Legislation Tech Error Visible Light Communication Domains Memory Printer Server IT Plan Enterprise Resource Planning Integration Web Server Accountants Fileless Malware A.I. IT consulting cache Public Speaking Television Video Surveillance Trojan Cabling email scam Addiction Organize Multi-factor Authentication Proxy Server WannaCry Shortcut Downloads Books Skype Workers Modem Saving ZTime Wi-Fi Archive Administrator Connected Devices CIO Corporate Profile Entrepreneur Supercomputer Wireless Headphones Term Telephone Troubleshooting Advertising Time Management Flash Freedom of Information Migration Electronic Medical Records Equifax Directions Fleet Tracking HIPAA Windows XP Assessment SharePoint Debate Point of Contact Worker Network Management Recording Staffing Environment Google Wallet Harddrive Device security Dark Web MSP Competition Displays Google Calendar GPS Reading Samsung SSID Electronic Payment Society Tip of the week Desktop Health IT Finance VoIP Micrsooft Employer Employee Relationship Nanotechnology Processing Social Network Business Owner Touchscreen External Harddrive News G Suite Webinar Knowledge Recycling Hacks Physical Security Startup Managed IT Service Asset Tracking Consultation IP Address Analytic Licensing Business Cards Service Level Agreement Logistics Drones Banking Botnet Bookmark Username Application Technology Tips 3D Ebay Relocation Product Reviews Tablets Unified Threat Management Backup and Disaster Recovery Human Resources Thin CLient Gamification Audit Screen Reader Google Play Customer Resource management Permissions Smart Phones Language Fake News Sync Read Notifications CCTV Smart Tech Processor Data Warehousing Piracy Upload Microsoft 365 Managing Stress Productuvuty Regulation Printers 3D Printing Transportation CrashOverride Capital

toner1