facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

Managing permissions for their network is something that many organizations may only consider when it’s too late to do anything about it. This can provide outsiders with access to sensitive information that shouldn’t be seen by anyone but your employees. To learn a few lessons about user permissions, let’s look at the misfortune of PA Online, a Pennsylvania-based Internet service provider.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Software Cloud Data Hackers Business Management Hardware Microsoft Workplace Tips Network Security Productivity Backup Business Hosted Solutions Managed Service Provider Email Productivity Malware IT Services Google Efficiency Saving Money Innovation Small Business User Tips Computer Collaboration IT Support Quick Tips VoIP Data Backup Network IT Support Smartphones Data Recovery Business Continuity Mobile Devices communications Microsoft Office Gadgets Disaster Recovery Android Cybersecurity Social Media Smartphone Upgrade Mobile Office Phishing Communication Server Virtualization Miscellaneous Mobile Device Management Passwords Mobile Device Ransomware Vendor Management Holiday Windows Users Operating System Windows 10 Apps Tech Term BDR Managed IT Services Outsourced IT Internet of Things Unified Threat Management Remote Monitoring Facebook Automation BYOD Remote Computing Managed IT services Apple Data Management Mobile Computing Analytics WiFi Windows 10 Artificial Intelligence Training Marketing The Internet of Things History Cloud Computing Browser Save Money Firewall Business Technology Covid-19 Help Desk App Encryption Alert Big data Spam Health IT Consultant Information Technology Office Office 365 Budget Managed Service Two-factor Authentication Bandwidth Managed IT Cybercrime Access Control Information VPN Content Filtering Windows 7 Going Green Blockchain Bring Your Own Device Maintenance Printer Gmail Antivirus Hard Drives Government Employer-Employee Relationship Saving Time Retail Wi-Fi Computers Best Practice Lithium-ion Battery Healthcare Cost Management Outlook Windows 8 Networking Remote Work Wireless Technology Virus Tech Support Search Document Management Hiring/Firing Recovery Phone System iPhone Travel Data Security Hacking It Management Education IBM Update Data Loss Augmented Reality Humor Customer Service Conferencing Computing Money Project Management Storage Solid State Drive Compliance Avoiding Downtime Data storage Current Events Flexibility Vendor Value Twitter Password Intranet Laptop Hacker Legal Patch Management Risk Management Customer Relationship Management File Sharing Applications Regulations PowerPoint Hard Drive Data Breach Save Time Mobility Downtime Voice over Internet Protocol SaaS Wireless Administration Website Law Enforcement Computer Repair Running Cable Proactive IT Employee/Employer Relationship Private Cloud Social Networking Software as a Service Management Word Black Market Cooperation Telephony Vulnerabilities Cryptocurrency Machine Learning Cortana Telephone Systems Business Growth Excel Fax Server Net Neutrality Scam User Paperless Office Business Intelligence Chrome Virtual Desktop Google Maps Digital Payment Sports Disaster Router Social Hosted Solution Digital End of Support Social Engineering Comparison Tablet DDoS Robot Websites Securty Company Culture Monitoring Meetings Inbound Marketing Managed Services Download Bluetooth Uninterrupted Power Supply Video Conferencing Statistics Managed IT Service Multi-factor Authentication Programming Network Congestion Telephone eWaste Vulnerability User Error Co-managed IT Pain Points Bitcoin Microchip Taxes Memory Data Protection Processor Google Docs Distributed Denial of Service Experience Streaming Media Cleaning Downloads Public Cloud Licensing Processors Monitors USB Lifestyle Office Tips Solutions Employees Presentation Identity Theft Professional Services Distribution YouTube Redundancy Gaming Console Notifications Unified Communications Settings Specifications Safety Integration Text Messaging Politics Webcam Evernote Virtual Reality Automobile Cost Documents Virtual Assistant Emails Computer Accessories Teamwork Heating/Cooling Managed Services Provider Entertainment Chromebook Tech Terms Trending Computing Infrastructure Hack IT service Start Menu Mobile Technology How To How To Smart Devices Mouse email scam Addiction Best Available Keyboard Computer Care Procurement Cabling Skype Processing Accountants A.I. Organize Upgrades Microsoft Excel Web Server Archive Health IT Adminstration Pirating Information Books Workers Wasting Time Domains Google Drive Windows Server 2008 Leadership Organization Administrator Logistics Virtual Machines LiFi Bookmark Migration Connected Devices Public Speaking Spyware Mobile Payment PCI DSS Point of Contact Cyber security Wireless Headphones Communitications Supercomputer Employer/Employee Relationships Network Management Shortcut Work/Life Balance Electricity Printing Supply Chain Management Worker Google Play Telephone Service Equifax Fleet Tracking Deep Learning Entrepreneur Visible Light Communication Internet Service Provider Reading Samsung Managing Costs Device security MSP Troubleshooting Webinar AI Microsoft 365 Recycling Browsers Desktop Finance HIPAA cache Television Regulations Compliance G Suite Analytic Medical IT Trend Micro Nanotechnology Social Network Environment IT consulting IT Assessment Employer Employee Relationship User Tip Proactive Maintenance Business Cards Service Level Agreement Competition WannaCry Remote Working Product Reviews Security Cameras Threats Startup Asset Tracking Electronic Payment Upselling Hacks Physical Security Advertising Flash Corporate Profile Video Surveillance Relocation Tablets Navigation Virtual Machine Username Business Owner CIO Time Management Freedom of Information Banking Supply Chains Botnet Read Unified Threat Management Backup and Disaster Recovery Data Analysis Gamification Staffing IP Address Google Wallet Assessment SharePoint Saving ZTime Financial Data Sync eCommerce Screen Reader Customer Resource management Windows XP Electronic Health Records Printers SQL Server Piracy Upload Best Practives Application Society Google Calendar GDPR Managing Risk Smart Tech Human Resources Displays Tip of the week Memes CCTV Device Management Database VoIP Debate Managing IT Services Reliable Computing Business Managemenet Tech Hypervisor HTML Micrsooft Touchscreen Harddrive News Business Metrics 2FA Computer Malfunction Content Management Fiber-Optic Surveillance Fileless Malware Hybrid Cloud Mobile Security Drones Consultation Telework In Internet of Things Holidays Telephone System Microserver Knowledge GPS Proxy Server Azure Software License Trends Digital Signature External Harddrive Technology Tips Remote Workers Modem Strategy Multi-Factor Security IT online Currency Fraud Tactics Get More Done Permissions Language Audit Virtual Private Network Scalability Term Devices Fake News Remote Motion Sickness Electronic Medical Records Transportation 3D Ebay Development Messenger Tracking LinkedIn Directions Display UTM Content Printer Server Data Warehousing Thin CLient FinTech Recording Optimization Turn Key Dark Web Free Resource IT Plan Enterprise Resource Planning Trojan Music Access Smart Phones Data Storage SSID Legislation Error PDF switches Writing Emergency Hard Drive Disposal Rental Service Productuvuty Personal Information Financial 3D Printing CrashOverride Managing Stress Capital Regulation