facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Get Tricked: Phishing Attacks Pretending to be Voicemail Attachments

Don’t Get Tricked: Phishing Attacks Pretending to be Voicemail Attachments

Human beings are naturally inquisitive creatures, which makes it all the easier for us to be convinced of different things. Cereal mascots promise wild flavors that will send kids on a Mom-approved adventure, magazine covers promise countless sure-fire ways to be rid of that stubborn belly fat, and—more sinisterly—phishing attacks promise to be something that they are not. As hackers have found, this tactic has proven to be worth investing time in.

0 Comments
Continue reading

There’s a Reason Some Scams are Painfully Transparent

There’s a Reason Some Scams are Painfully Transparent

“Hello sir/ma’am, I am a member of royal [sic] family and I am in grave danger in my country. If you send me money to get out safely, I will share my great riches with you as reward.”

Scams like this one have become a punchline for many, which makes you wonder why they are still commonly used by cybercriminals. As it turns out, there’s a very compelling reason that they do so, one that’s been known for years.

0 Comments
Continue reading

Cyberattacks are Up at the World Health Organization

Cyberattacks are Up at the World Health Organization

The World Health Organization has been busy dealing with one of the biggest calamities in contemporary times, the COVID-19 pandemic that has had much of the world on pause for the past few months. Unfortunately, they’ve been dealing with an increase in cyberattacks. Today, we’ll take a look at some of the issues the WHO is having with cybercriminals. 

0 Comments
Continue reading

Windows 7 Still Causing Issues

Windows 7 Still Causing Issues

Millions of people are still using the Microsoft Windows 7 operating system despite it being completely unsupported. When Microsoft pulled the plug on support for the OS in January, most industry professionals expected there to be some exploits found pretty rapidly. It turns out that the very first exploit was actually Microsoft’s fault, and that Windows 7 support had a little life in it after all. 

0 Comments
Continue reading

Security Has to Be a Priority in 2020

Security Has to Be a Priority in 2020

Cybercriminals aren’t exactly holding back when it comes to attacking businesses, which means that businesses can’t rest on their haunches as the new year rolls in. Let’s take a few moments to look toward the near future, and the issues that cybersecurity professionals are warning us about.

0 Comments
Continue reading

Three Tricks to Spot Phishing Attempts

Three Tricks to Spot Phishing Attempts

Cybersecurity needs to be a priority to any business that wants to continue their operations in the long-term. One threat that is very common today is the phishing attack.

0 Comments
Continue reading

Diagnosing a Man-In-the-Middle Attack

Diagnosing a Man-In-the-Middle Attack

The man in the middle has a lot of power and influence over the end result, and this is true even in the technological world. In fact, there are attacks dedicated to this vector, twisting and turning something that your organization needs into what amounts to a threat. We’ll discuss what a Man-in-the-Middle (MitM) attack is, as well as what you can do to combat these threats.

0 Comments
Continue reading

Here Are Some Hacks You Should Be Cognizant Of

Here Are Some Hacks You Should Be Cognizant Of

In today’s modern business environment, your organization faces untold danger. There are several threats out there that your organization’s users could fall prey to. We’ve put together a list of some of the most dangerous ones out there, as well as how your business can respond to them.

0 Comments
Continue reading

How to Turn a Security Risk into a Security Solution

How to Turn a Security Risk into a Security Solution

Let’s face it; the office isn’t the most engaging place at all times. Repetitive tasks can make attention to detail difficult to maintain. While this might throw a wrench into operational plans, it’s not the end of the world. A major threat like ransomware, on the other hand, could be a business-ender. When a lack of engagement meets security issues, you create a whole other monster that could strike your business when you least expect it.

0 Comments
Continue reading

The Marriott Hack Exposes 500 Million People

The Marriott Hack Exposes 500 Million People

It’s nice to get away every now and then, but if you have stayed at any property under the Marriott umbrella, including St. Regis, Westin, Sheraton, or W hotel since 2014, there is a good chance that your personal information has been leaked, a spokesperson from parent company Marriott has said. They said the multinational hotel corporation will begin emailing users impacted by the leak in the coming days.

0 Comments
Continue reading

Phishing Attacks and How to Thwart Them

Phishing Attacks and How to Thwart Them

For twenty years, hackers have tried to breach organization’s networks by finding or breaking holes in the network’s perimeter, or in exposed servers. This led to the cybersecurity industry creating software designed specifically to stop these threat actors in the act. This, in essence, created a situation where the perimeter of an organization’s network was extremely hard to breach. The problem was that as soon as something was able to get through the outer defenses, there was no end to the devastation a hacker could cause inside a network.

0 Comments
Continue reading

Want Proof that You Need to Monitor Your Solutions?

Want Proof that You Need to Monitor Your Solutions?

When discussing the practice of monitoring solutions to prevent threats, it isn’t uncommon for many businesses to put these concerns on the back burner. However, every so often, an example comes around to help inspire businesses to take their monitoring seriously. This time, the example was the arrest of 24 spammers in October for scamming American citizens by impersonating Microsoft support staff members.

0 Comments
Continue reading

Fileless Malware Attacks Increasing

Fileless Malware Attacks Increasing

Ransomware has been far from low-profile since its inception several years ago. Everyone knows what the file-encrypting malware does, and they all know that paying the ransom can make the nightmare go away by decrypting the files located on their computer. As if the threat of losing data forever wasn’t enough, you’re staring down a ticking clock while this is going on. Nowadays, ransomware is becoming more difficult to manage through various tactics.

0 Comments
Continue reading

A Look at this Year’s Worst Cybercrimes

A Look at this Year’s Worst Cybercrimes

It’s fair to say that today's organizations are faced with more online threats than ever before. To properly manage the information systems that they depend on for productivity, redundancy, and operational management, they need to ensure that they are doing what they need to do to mitigate problems stemming from the continuous flow of threats.

0 Comments
Continue reading

Hackers Continuously Target Major Sporting Events

Hackers Continuously Target Major Sporting Events

Sports are a very popular thing around the world, which means that these athletic contests gather many fans to them. In turn, this means that these events are chock full of potential targets for a hacking attack. Today, we’ll examine the assortment of hacks that have taken place around sporting events.

0 Comments
Continue reading

Hackers Target Municipalities and Why That’s a Problem for Your Business

Hackers Target Municipalities and Why That’s a Problem for Your Business

On March 22, 2018, a remote-triggered ransomware called “SamSam” demanded a one-time payment of $51,000 be made to restore the city of Atlanta, Georgia’s, data. Despite an operating budget somewhere in the neighborhood of $625 million, Atlanta’s municipal leaders refused to pay the fine. The “hostage situation” has cost the city over $2 million already with an expected $9.5 million more likely to be spent restoring and re-enforcing the municipality’s network and infrastructure. This doesn’t take into account downtime and the significant amount of data lost in the hack. Whether or not you think it’s a good idea to not pay the ransom, if a whole city - especially one as large as Atlanta - can effectively be crippled by a single hack, you better believe that your business has to get serious about its cybersecurity efforts.

0 Comments
Continue reading

Why CPA Firms are in Danger of Being Hacked

Why CPA Firms are in Danger of Being Hacked

The Internal Revenue Service has declared to tax professionals that they must take extra steps toward protecting the information of taxpayers. Certified Public Accountant (CPA) firms, whether they are large organizations or small businesses, hold much information that could be used by hackers and identity thieves, which makes them major targets during tax season.

0 Comments
Continue reading

Could Your Business Be a Victim of Targeted Ransomware?

Could Your Business Be a Victim of Targeted Ransomware?

If you were a cybercriminal, what would be your preferred method of launching a ransomware attack? Would you rather create a catch-all threat that could capture as many potential victims as possible, or a calculated approach to land a big one? Despite the proven results of larger ransomware initiatives, most cybercriminals have made the shift to smaller, more targeted attacks against specific companies, and in some cases, individuals.

0 Comments
Continue reading

A DDoS Attack Hits Your Productivity and Profits

A DDoS Attack Hits Your Productivity and Profits

How quickly could your business recover if it were suddenly hit by a Distributed Denial of Service, or DDoS, attack? Are you protected against the effects they could have on your operations? If asked these questions, most businesses should want to say yes, but in reality, over half lack the means to defend against DDoS.

0 Comments
Continue reading

Would Your Users Fall For These Social Engineering Schemes?

Would Your Users Fall For These Social Engineering Schemes?

Social engineering is one of the trickiest parts of protecting your organization. It might sound like something out of a science fiction flick, but it’s one of the most dangerous attacks that a hacker can use against your business. Social engineering attempts to manipulate the target into giving away sensitive credentials or personal information for the purpose of stealing identities and other malicious intentions.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Software Cloud Data Business Management Hackers Hardware Microsoft Workplace Tips Network Security Productivity Backup Business Hosted Solutions Managed Service Provider Email Productivity Malware IT Services Saving Money Google Efficiency Innovation Small Business Computer User Tips Collaboration VoIP Quick Tips Data Backup IT Support IT Support Network Smartphones Mobile Devices communications Business Continuity Gadgets Disaster Recovery Data Recovery Android Microsoft Office Social Media Cybersecurity Smartphone Upgrade Communication Mobile Office Server Phishing Virtualization Miscellaneous Mobile Device Management Ransomware Mobile Device Operating System Holiday Users Windows Vendor Management Passwords Outsourced IT Tech Term Windows 10 BDR Managed IT Services Apps Facebook Internet of Things Unified Threat Management Remote Monitoring BYOD Automation Remote Computing Apple Managed IT services Mobile Computing Data Management Analytics WiFi Windows 10 History Browser Training Artificial Intelligence The Internet of Things Cloud Computing Marketing Business Technology Save Money Firewall Alert App Encryption Big data Health Spam Help Desk Bandwidth Office Covid-19 Managed Service Information Technology IT Consultant Office 365 Budget Two-factor Authentication VPN Government Maintenance Windows 7 Printer Cybercrime Managed IT Blockchain Content Filtering Going Green Bring Your Own Device Hard Drives Access Control Gmail Antivirus Saving Time Wi-Fi Search Computers Remote Work Recovery Employer-Employee Relationship Virus Retail Tech Support Best Practice Lithium-ion Battery Cost Management Networking Hiring/Firing Information Outlook Windows 8 Wireless Technology Healthcare Humor Data Security Travel It Management Education Data Loss iPhone Update Conferencing Hacking IBM Phone System Project Management Augmented Reality Money Document Management Customer Service Computing Voice over Internet Protocol Storage Website Twitter Intranet Law Enforcement Avoiding Downtime Applications Compliance Solid State Drive Patch Management Data storage Risk Management Value Flexibility Password File Sharing Hard Drive Data Breach Hacker Vendor Laptop Save Time Downtime Legal Mobility Current Events Customer Relationship Management Regulations PowerPoint Computer Repair Running Cable Proactive IT Administration SaaS Wireless End of Support DDoS Hosted Solution Robot Telephony Securty Machine Learning Telephone Systems Word Employee/Employer Relationship Cortana Black Market Scam Cooperation Cryptocurrency Net Neutrality Business Intelligence Excel Chrome Digital Payment Monitoring Business Growth Google Maps Digital Router Social Engineering Websites Comparison Tablet User Management Virtual Desktop Company Culture Paperless Office Vulnerabilities Meetings Software as a Service Social Sports Fax Server Social Networking Disaster Private Cloud Statistics Teamwork Heating/Cooling Programming Entertainment Vulnerability Network Congestion Bitcoin Data Protection Managed Services Provider IT service Microchip Taxes Distributed Denial of Service Inbound Marketing Distribution Downloads How To Streaming Media Public Cloud Licensing Managed Services Bluetooth eWaste Pain Points Managed IT Service Cost Identity Theft Redundancy Memory Notifications Google Docs Processor Smart Devices Evernote Processors Experience USB Monitors Virtual Reality Cleaning Politics Virtual Assistant Automobile User Error Presentation Emails Video Conferencing Co-managed IT Computer Accessories Office Tips Start Menu Tech Terms Gaming Console Chromebook Solutions Multi-factor Authentication Trending YouTube Telephone Computing Infrastructure Hack Mobile Technology Professional Services Specifications Safety Employees How To Text Messaging Unified Communications Settings Webcam Mouse Lifestyle Uninterrupted Power Supply Download Integration Documents Hybrid Cloud Nanotechnology Social Network Administrator Spyware Mobile Payment Holidays Desktop Finance Books Workers Remote Working Fileless Malware Startup Asset Tracking Supply Chains Best Practives Electricity Printing 3D Modem Ebay Strategy Point of Contact Business Cards Permissions Service Level Agreement Language Supercomputer Proxy Server Thin CLient Azure Worker Financial Data Term Unified Threat Management Backup and Disaster Recovery Electronic Health Records Smart Phones Electronic Medical Records Transportation PDF Username Directions Display Best Available Keyboard switches Screen Reader Writing Customer Resource management Memes cache Television Recording Optimization Music Gamification Reading Samsung Microserver Smart Tech Upgrades G Suite WannaCry Adminstration SSID Pirating Information Analytic Domains Piracy Upload Employer Employee Relationship Managing IT Services Dark Web Leadership Free Resource Recycling Telework Get More Done Corporate Profile Processing Product Reviews Public Speaking Fiber-Optic LiFi Database Hacks Physical Security Surveillance Time Management Freedom of Information Health IT HTML Wasting Time Shortcut Telephone System Banking Botnet IT Printer Server Assessment SharePoint Logistics Virtual Machines Read Mobile Security Relocation Tablets Remote Workers Turn Key Entrepreneur Multi-Factor Security Deep Learning Sync Trojan Google Calendar Cyber security Troubleshooting Software License Trends Work/Life Balance Virtual Private Network Tip of the week Bookmark FinTech VoIP Google Play Telephone Service HIPAA Fraud Visible Light Communication Tactics CCTV Development Organize Touchscreen News Employer/Employee Relationships Device Management Environment Devices Knowledge Upselling Managing Costs Business Managemenet Competition IT consulting Business Metrics Computer Malfunction Consultation Microsoft 365 Content Management Electronic Payment UTM Content Reliable Computing Data Storage Legislation Error In Internet of Things Technology Tips Medical IT Video Surveillance Trend Micro Business Owner IT Plan Enterprise Resource Planning Procurement Browsers Organization Audit Security Cameras Threats IP Address email scam Advertising Addiction Flash Fake News User Tip Saving ZTime Proactive Maintenance online Currency CIO Accountants A.I. PCI DSS Navigation Virtual Machine Application Windows XP Motion Sickness Communitications Webinar Data Warehousing Human Resources Staffing Google Wallet Scalability LinkedIn Wireless Headphones Displays Access Debate eCommerce Migration Society Connected Devices Messenger Tracking Supply Chain Management Emergency Hard Drive Disposal Harddrive Data Analysis Equifax Micrsooft Fleet Tracking AI Computer Care GPS GDPR Managing Risk Network Management Rental Service Internet Service Provider Microsoft Excel Printers SQL Server Regulations Compliance Tech Hypervisor Skype Digital Signature Web Server IT Assessment Google Drive Windows Server 2008 External Harddrive Archive Device security Drones MSP Cabling Managing Stress CrashOverride Personal Information Regulation 3D Printing Financial Capital Productuvuty

toner1