facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

$100 Million Hacking Incident Shows that No Company is Immune

$100 Million Hacking Incident Shows that No Company is Immune

It’s a tough lesson to learn, but almost any company is susceptible to cyber-attacks that take advantage of any security setup’s weakest link: the people involved. This lesson was most recently learned the hard way by two unnamed tech companies that fell victim to a phishing campaign that was allegedly run by Evaldas Rimasauskas, a Lithuanian man accused of stealing $100 million from them.

0 Comments
Continue reading

Year in Review: 2016’s Biggest Breaches

Year in Review: 2016’s Biggest Breaches

2016 was quite the year for cybersecurity and the assorted issues, threats, and concerns associated with it. As 2017 rolls along, we may be able to anticipate what this year might bring by reflecting on the events of the last.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Hackers Software Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Saving Money Email Malware Hosted Solutions IT Services IT Support Efficiency Google Small Business Computer Smartphones Quick Tips User Tips Mobile Devices Innovation Gadgets Business Continuity Disaster Recovery VoIP Microsoft Office Social Media Android Network Productivity Collaboration Data Backup Mobile Office Virtualization Server Mobile Device Management Communication Smartphone Miscellaneous Data Recovery Upgrade Ransomware Windows 10 Tech Term communications Unified Threat Management Windows IT Support Operating System Holiday Remote Monitoring Passwords Facebook BYOD Remote Computing Vendor Management Mobile Computing Apps Managed IT services Phishing Cybersecurity Automation Users WiFi BDR Apple Data Management Mobile Device Marketing The Internet of Things Analytics History Outsourced IT Firewall Managed IT Services Browser Save Money Alert Internet of Things Artificial Intelligence App IT Consultant Big data Encryption Bring Your Own Device Maintenance Gmail Printer Antivirus Cloud Computing Health Office Bandwidth Content Filtering Going Green Office 365 Spam Help Desk Business Technology Two-factor Authentication Hard Drives Wireless Technology Tech Support Saving Time Search Virus Cybercrime Windows 10 Cost Management Best Practice Information Technology Managed IT Lithium-ion Battery Training Windows 8 Outlook Budget Hiring/Firing Blockchain Computers VPN Recovery Travel Employer-Employee Relationship Healthcare Update Phone System Hacking IBM Access Control Money Document Management Networking Customer Service Legal Proactive IT Humor Running Cable Mobility Administration Regulations Government Website Information Intranet SaaS Twitter Education Law Enforcement iPhone Risk Management Compliance Data storage Applications Save Time Managed Service Augmented Reality File Sharing Hard Drive PowerPoint It Management Social Google Maps Company Culture Patch Management Computer Repair Wireless Data Loss Social Networking Social Engineering DDoS Scam Paperless Office Sports Management Disaster Computing Data Breach Avoiding Downtime Word End of Support Hosted Solution Robot Project Management Digital Securty Websites Value Password Cortana Machine Learning Current Events Telephone Systems Hacker Solid State Drive Business Intelligence Excel Flexibility Digital Payment Black Market Cryptocurrency Router Downtime Customer Relationship Management Laptop User Fax Server Data Security Comparison Tablet Business Growth Monitors Trending Cleaning Office Tips Mouse Monitoring Text Messaging Virtual Reality Webcam Politics Documents Automobile Heating/Cooling Entertainment Emails YouTube Statistics Chromebook Storage Programming Redundancy Computing Infrastructure Hack Unified Communications Settings Network Congestion How To Private Cloud Vulnerabilities Inbound Marketing Download Retail Evernote eWaste Cooperation Streaming Media Vendor IT service Telephony Pain Points Start Menu Tech Terms Microchip Taxes Co-managed IT Net Neutrality Distributed Denial of Service Mobile Technology User Error Software as a Service Chrome Bluetooth Processors USB Public Cloud Uninterrupted Power Supply Vulnerability Presentation Google Docs Bitcoin Computer Accessories Conferencing Identity Theft Lifestyle Gaming Console Virtual Desktop Data Protection Specifications Safety Experience Harddrive Reliable Computing Voice over Internet Protocol LinkedIn Fraud Tactics Debate Business Metrics Computer Malfunction Fileless Malware cache Television Best Practives Devices Modem CIO GPS Digital Signature In Internet of Things Proxy Server Advertising WannaCry Flash Downloads UTM Content Google Wallet Time Management Freedom of Information Archive Legislation Error Teamwork Electronic Medical Records Windows XP Corporate Profile Microserver Skype IT Plan External Harddrive Enterprise Resource Planning Term Staffing Accountants A.I. Scalability Recording Displays email scam Addiction Motion Sickness Directions Society Assessment SharePoint PDF Tracking SSID Micrsooft Tip of the week 3D Ebay Dark Web Google Calendar Get More Done Point of Contact Multi-factor Authentication Thin CLient Messenger Drones Touchscreen News Printer Server Wireless Headphones Telephone Best Available Keyboard Health IT VoIP Turn Key Migration Smart Phones Connected Devices Rental Service Meetings Processing Equifax Fleet Tracking Cabling Knowledge Network Management Web Server Domains Managed IT Service Consultation Trojan Books Workers Virtual Assistant Organize Recycling Adminstration Pirating Information Wi-Fi Administrator Public Speaking Bookmark Permissions Language Technology Tips Analytic Device security MSP Leadership Fake News Nanotechnology Social Network Shortcut Audit Product Reviews Desktop Finance Supercomputer Google Play Read Startup Asset Tracking Entrepreneur Worker switches Writing Business Cards Service Level Agreement Troubleshooting Processor Music Data Warehousing Reading Environment Samsung Medical IT Upgrades Emergency Hard Drive Disposal Unified Threat Management Backup and Disaster Recovery HIPAA Browsers Access Username Microsoft Excel Webinar Device Management Screen Reader Customer Resource management G Suite Competition User Tip LiFi Computer Care Gamification Electronic Payment Employer Employee Relationship Security Cameras Content Management Smart Tech Upselling Distribution Licensing Business Managemenet Piracy Upload Hacks Business Owner Physical Security Navigation Google Drive Windows Server 2008 Relocation Tablets Professional Services Deep Learning Fiber-Optic Database Video Surveillance Banking Botnet IP Address Data Analysis Spyware Work/Life Balance Mobile Payment HTML GDPR online Currency Telephone System Sync Application Visible Light Communication Electricity Memory Printing Mobile Security Saving ZTime Human Resources Windows 7 Multi-Factor Security Cost IT consulting Software License Trends Notifications CCTV Tech Regulation CrashOverride Capital Productuvuty Printers Managing Stress 3D Printing

toner1