facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

COVID-19 is Having a Big Effect on Cybersecurity

COVID-19 is Having a Big Effect on Cybersecurity

The COVID-19 pandemic has put a lot of stress on people.  Nowhere is this more true than in the small business arena. Small businesses, many of which were forced to suspend or severely alter their operations, are also dealing with cyberattacks. Let’s take a look at the effects COVID-19 has on small businesses regarding cybersecurity. 

0 Comments
Continue reading

Cyberattacks are Up at the World Health Organization

Cyberattacks are Up at the World Health Organization

The World Health Organization has been busy dealing with one of the biggest calamities in contemporary times, the COVID-19 pandemic that has had much of the world on pause for the past few months. Unfortunately, they’ve been dealing with an increase in cyberattacks. Today, we’ll take a look at some of the issues the WHO is having with cybercriminals. 

0 Comments
Continue reading

Your Cybersecurity Policy Will Come to Define Your Business

Your Cybersecurity Policy Will Come to Define Your Business

At this point, it’s hard to believe that anyone needs to be told that cybersecurity is important, but some organizations are still doing the bare minimum to protect their network and data. That can’t go on forever. Today, we thought we would discuss how to put together a cybersecurity policy that covers all the bases, and will give you the peace of mind that you are actively combating today’s most present threats to your network, infrastructure, and data. 

0 Comments
Continue reading

Don’t Let Employee Access Doom Your Company

Don’t Let Employee Access Doom Your Company

When it comes to protecting your business, cybersecurity is a huge consideration that must be kept in mind. However, it isn’t the only consideration. Some of the biggest threats to your business can actually come from your own team. Let’s go over the three kinds of insider threats that you need to be on your guard against, and how to avoid them.

0 Comments
Continue reading

Windows 7 Still Causing Issues

Windows 7 Still Causing Issues

Millions of people are still using the Microsoft Windows 7 operating system despite it being completely unsupported. When Microsoft pulled the plug on support for the OS in January, most industry professionals expected there to be some exploits found pretty rapidly. It turns out that the very first exploit was actually Microsoft’s fault, and that Windows 7 support had a little life in it after all. 

0 Comments
Continue reading

Securing Where IT and OT Meet

Securing Where IT and OT Meet

Over the past two decades, business technology was largely separated between information technology (IT)--that is, the business’ computers, networking equipment, and peripherals--and operational technology (OT): all other technology. As IT advanced, so has OT, which today presents many of the same risks that IT always has. Today, we will take a look at how to secure your business by focusing on where your IT meets your OT.

0 Comments
Continue reading

Don’t Be Dumb About Smart Technology

Don’t Be Dumb About Smart Technology

A few years ago, there was a decision made to make a concerted effort by manufacturers to create their products, but to also create those same products with “smart” technology inside. Basically, because of the rampant innovation of Internet-connected systems, devices, appliances, and knick-knacks of all types we have to ask the question: Are we being dumb for using all these smart devices? 

0 Comments
Continue reading

Properly Assigning Access Control Measures Doesn’t Have to Be Difficult

Properly Assigning Access Control Measures Doesn’t Have to Be Difficult

Unless you run a business in which each and every employee is responsible for identical tasks, you are going to encounter the need for variable permissions among your staff so that your data can be better protected. One effective means of enforcing these permissions is through an access management policy. Let’s review a few components you should include in such a policy.

0 Comments
Continue reading

Tip of the Week: 3 Key Factors to Securing Your Data

Tip of the Week: 3 Key Factors to Securing Your Data

With data being such a valuable asset today (especially personally identifiable data), you can’t afford to let any of the information your company has access to fall into the wrong hands. The same goes for all of your data, especially that which concerns your employees or your clients. Let’s go over a few tips that should help you keep this data safe, step by step.

0 Comments
Continue reading

Best Practices to Control Your Access Control

Best Practices to Control Your Access Control

Over time, your business will accumulate a lot of data, including some that certain employees or departments will have no need to see (or perhaps shouldn’t see). An effective way of keeping eyes from wandering is through an access management policy. Let’s go over a few elements you ought to prioritize in your approach to controlling internal access.

0 Comments
Continue reading

Start Off 2020 by Auditing Your Online Accounts and Passwords

Start Off 2020 by Auditing Your Online Accounts and Passwords

Let’s take a look at a real-world scenario that I ran into a few weeks ago with a family friend. For the sake of this story, let’s call him Bob. Bob lost access to a pretty important online account.

0 Comments
Continue reading

These Are the Last Days of Windows 7

These Are the Last Days of Windows 7

Microsoft is just days away from retiring not just one, but two of its most popular operating systems. The software giant has made a point to run a major campaign warning people who are still using Windows 7 that they are going to lose support after the January 14, 2020 deadline; but, as of this writing, there are still over a quarter of desktop users running the software. With the deadline looming, we thought we’d look at what this means for users and go through some of the options they have.

0 Comments
Continue reading

Security Has to Be a Priority in 2020

Security Has to Be a Priority in 2020

Cybercriminals aren’t exactly holding back when it comes to attacking businesses, which means that businesses can’t rest on their haunches as the new year rolls in. Let’s take a few moments to look toward the near future, and the issues that cybersecurity professionals are warning us about.

0 Comments
Continue reading

A Recent Data Theft Shows Us What to Watch Out For

A Recent Data Theft Shows Us What to Watch Out For

Trend Micro, the developer of the popular antivirus program, has attracted some unwanted attention after a former employee managed to steal customer data and sell it to scammers. These scammers then use this data to call Trend Micro customers. If you use Trend Micro’s antivirus solutions, you’re going to want to pay close attention to any calls you get.

0 Comments
Continue reading

Start Using Two-Factor Authentication Everywhere, Today

Start Using Two-Factor Authentication Everywhere, Today

It can be easy to slack off when it comes to good password practices. Many users still use the same password across multiple sites and often don’t use secure passwords. Password managers make this a lot easier, but it’s really two-factor authentication (2FA) that can make all the difference. Strong, unique passwords are still important (not all accounts offer two-factor authentication) but let’s talk about why you should always enable two-factor or multifactor on all of your accounts when possible.

0 Comments
Continue reading

4 Key Steps to Better Cybersecurity

4 Key Steps to Better Cybersecurity

In many ways, explaining why sufficient cybersecurity is important for your business has become redundant - especially when it is much more important to understand how this cybersecurity needs to protect you. The threats to data and privacy are known, but no less potent. In order to counter them, you need to make sure you have what you need to protect your business - starting with a few key considerations.

0 Comments
Continue reading

How to Optimize Security, Regarding Your Servers

How to Optimize Security, Regarding Your Servers

Your business relies on its servers in order to function - which makes it incredibly important that these servers are sufficiently protected. There are a few practices that you can put into place that will help you to secure your server room. Let’s work our way from the inside out as we review them.

0 Comments
Continue reading

Cybersecurity is a Shortcoming for the DHS

Cybersecurity is a Shortcoming for the DHS

Every IT administrator today needs to be concerned about cybersecurity, as does every private business when it comes to its network. However, the same can’t really be said for the computing resources of the government and other public entities… simply due to the lack of talent available.

0 Comments
Continue reading

Tip of the Week: Mobile Data Management

Tip of the Week: Mobile Data Management

There are hundreds of things that a business owner has to do, so managing the security of the data coming in and going out from mobile devices might not make the hierarchy of considerations that need to be immediately addressed. Today, we will take a look at why paying attention to the mobile end of your business is so important, how Mobile Information Management (MIM) helps with that, and how MIM fits in with the rest of your mobile strategy. 

0 Comments
Continue reading

How Google is Trying to Make Passwords Easier and Better

How Google is Trying to Make Passwords Easier and Better

Common opinion more or less states that passwords aren’t so much “necessary,” as they are a “necessary evil.” The best practices that are recommended to maintain the efficacy of passwords today can certainly feel excessive - which tempts many users into ignoring these practices, to the detriment of their security. Fortunately, many large companies - like Google - are trying to make passwords easier to manage.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Data Hackers Hardware Microsoft Network Security Workplace Tips Backup Managed Service Provider Hosted Solutions Business Productivity Email Productivity Malware IT Services Saving Money Efficiency Google Computer User Tips Small Business Innovation Collaboration IT Support IT Support Data Backup Smartphones VoIP Quick Tips Mobile Devices Network Business Continuity communications Microsoft Office Gadgets Social Media Data Recovery Android Cybersecurity Disaster Recovery Upgrade Communication Mobile Office Server Smartphone Virtualization Mobile Device Management Miscellaneous Phishing Holiday Vendor Management Ransomware Windows Passwords Windows 10 Tech Term Operating System Outsourced IT Unified Threat Management Internet of Things Remote Monitoring Mobile Device Managed IT Services Apps Facebook Users Automation BDR Apple Mobile Computing Managed IT services Analytics Data Management BYOD Remote Computing WiFi Windows 10 Artificial Intelligence Cloud Computing The Internet of Things Marketing History Browser Save Money Firewall Training Alert Big data Encryption Help Desk App Office Two-factor Authentication Bandwidth Health Information Technology Business Technology IT Consultant Spam Office 365 Content Filtering Gmail Windows 7 Managed IT Going Green Government Cybercrime Bring Your Own Device Antivirus Hard Drives Maintenance Printer Budget Access Control Lithium-ion Battery Best Practice Information Recovery Employer-Employee Relationship Healthcare Retail Windows 8 Wireless Technology Outlook Hiring/Firing Cost Management Search Managed Service Computers Saving Time Tech Support VPN Virus Travel iPhone Customer Service Education It Management Update Phone System Blockchain IBM Data Loss Augmented Reality Money Networking Hacking Document Management Project Management Humor Computing Twitter Intranet Law Enforcement File Sharing Wireless Data Security Solid State Drive Compliance Hard Drive Risk Management Storage Website Data storage Patch Management Current Events Customer Relationship Management Mobility Flexibility PowerPoint Save Time Covid-19 Data Breach Downtime Legal Password Value Applications Administration Hacker Regulations Computer Repair Running Cable Proactive IT Conferencing Avoiding Downtime SaaS Robot Monitoring Virtual Desktop Securty Social Excel DDoS Management Cooperation Google Maps Vulnerabilities Black Market Remote Work Net Neutrality Vendor Cryptocurrency Business Intelligence Social Engineering Scam Digital Payment Laptop Word Business Growth Router Meetings Cortana Comparison Tablet Digital Fax Server Private Cloud Wi-Fi Company Culture Websites Paperless Office Telephony Social Networking Sports Voice over Internet Protocol Machine Learning Telephone Systems Disaster Software as a Service User Hosted Solution End of Support Specifications Safety Vulnerability Public Cloud Licensing Pain Points Bitcoin IT service Identity Theft Streaming Media Managed Services Documents Data Protection Employee/Employer Relationship Managed IT Service Multi-factor Authentication Entertainment Teamwork Heating/Cooling Downloads Telephone Bluetooth Virtual Reality Politics Processor Co-managed IT Emails Chrome User Error Automobile Chromebook Google Docs Redundancy Gaming Console Memory Computing Infrastructure Hack Experience eWaste Cleaning Webcam Evernote Monitors Computer Accessories Text Messaging How To Download Office Tips Lifestyle Professional Services Virtual Assistant Distribution Trending Processors YouTube Mouse Start Menu Integration Tech Terms Settings Mobile Technology Microchip Taxes Smart Devices USB Unified Communications Inbound Marketing Presentation Distributed Denial of Service Programming Statistics Network Congestion Managed Services Provider Uninterrupted Power Supply Permissions Language Directions Spyware Display Mobile Payment UTM Content Hacks Physical Security Communitications Get More Done Recording Optimization Dark Web Printer Server Electricity Free Resource Printing IT Plan Enterprise Resource Planning Banking Botnet SSID Turn Key How To Legislation Error Relocation Tablets Supply Chain Management email scam Addiction Digital Signature Sync Music Analytic Processing Accountants A.I. switches Internet Service Provider Writing Recycling Health IT Trojan Product Reviews Organize cache Wasting Time Television Notifications CCTV IT Assessment Upgrades Logistics Virtual Machines Bookmark WannaCry Migration Connected Devices Business Metrics Computer Malfunction Read Cyber security Upselling Wireless Headphones Reliable Computing LiFi Remote Working Video Surveillance Network Management In Internet of Things Google Play Time Management Telephone Service Freedom of Information Equifax Fleet Tracking PDF Corporate Profile Employer/Employee Relationships Work/Life Balance Assessment Managing Costs SharePoint Saving ZTime Device security MSP Electronic Health Records Deep Learning Device Management Microsoft 365 Best Available Keyboard Business Managemenet Browsers Webinar Google Calendar Desktop Finance Motion Sickness Domains Memes Content Management Medical IT Trend Micro Tip of the week Nanotechnology Social Network Scalability Visible Light Communication Debate Business Cards Service Level Agreement Public Speaking Security Cameras Touchscreen Threats Harddrive News Startup Asset Tracking Messenger Tracking IT consulting Managing IT Services User Tip VoIP Proactive Maintenance Navigation Consultation Virtual Machine Username Rental Service Surveillance online Currency Solutions Knowledge GPS Unified Threat Management Backup and Disaster Recovery Shortcut Data Analysis Employees External Harddrive Technology Tips Gamification Troubleshooting Web Server CIO IT eCommerce Screen Reader Customer Resource management Entrepreneur Cabling Advertising Remote Workers Flash SQL Server Audit Piracy Upload HIPAA Administrator Staffing Google Wallet GDPR Managing Risk Fake News Smart Tech Books Environment Workers Windows XP Virtual Private Network LinkedIn Competition Society Tech Hypervisor Data Warehousing Thin CLient HTML Electronic Payment Supercomputer Development Displays Best Practives 3D Ebay Fiber-Optic Database Skype Fileless Malware Access Hybrid Cloud Smart Phones Mobile Security Business Owner Micrsooft Archive Emergency Holidays Hard Drive Disposal Telephone System Worker Proxy Server Azure Computer Care Software License Trends IP Address Drones Modem Microserver Strategy Microsoft Excel Multi-Factor Security Cost Reading Samsung Procurement G Suite Application Point of Contact Term Google Drive Windows Server 2008 Leadership Devices Employer Employee Relationship Human Resources Video Conferencing Electronic Medical Records Transportation Adminstration Pirating Information Fraud Tactics Personal Information CrashOverride Financial 3D Printing Capital Printers Managing Stress Productuvuty Regulation

toner1