facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

80 Million Medical Records Compromised: 4 Ways to Protect Yourself

b2ap3_thumbnail_anthem_hack_400.jpgThis month saw one of the largest recorded data breaches ever, when healthcare-provider Anthem experienced a hack causing data belonging to more than 80 million of its patients to be exposed. This includes sensitive information like Social Security numbers, dates of birth, email addresses, and more. How can you protect yourself from a hack like this?

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Hackers Business Management Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Network Security Business Saving Money Email Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Mobile Devices User Tips Smartphones Quick Tips Innovation Gadgets Business Continuity VoIP Disaster Recovery Microsoft Office Network Android Social Media Productivity Mobile Office Virtualization Data Backup Collaboration Server Smartphone Mobile Device Management Communication Miscellaneous Data Recovery communications Upgrade Tech Term Ransomware Windows 10 Windows IT Support Unified Threat Management Passwords Facebook Holiday Remote Monitoring Operating System Apps Phishing Cybersecurity Mobile Computing BYOD Remote Computing Managed IT services Vendor Management Automation Users WiFi BDR Data Management Mobile Device Marketing Analytics Apple The Internet of Things Firewall Outsourced IT History Alert Internet of Things Artificial Intelligence Browser Managed IT Services Save Money App Big data Encryption IT Consultant Going Green Office 365 Bring Your Own Device Office Maintenance Printer Gmail Antivirus Bandwidth Cloud Computing Health Spam Content Filtering Outlook Saving Time Windows 8 Training Windows 10 Budget Help Desk Two-factor Authentication Wireless Technology Virus Search Tech Support Managed IT Cybercrime Business Technology Hiring/Firing Cost Management Best Practice Information Technology Lithium-ion Battery Hard Drives IBM Computers VPN Travel Healthcare Update Access Control Recovery Employer-Employee Relationship Phone System Money Document Management Blockchain Hacking Proactive IT Running Cable Regulations Information Augmented Reality Intranet PowerPoint SaaS Twitter Education Humor File Sharing Customer Service Administration Law Enforcement Hard Drive Risk Management Government Compliance Mobility Applications Website Data storage Save Time Managed Service It Management iPhone Networking Legal Scam Excel Hacker Computer Repair Social Networking Machine Learning Telephone Systems Management Data Breach Customer Relationship Management Paperless Office Fax Server Sports Disaster Project Management User Computing Digital Websites End of Support Hosted Solution Social Robot Wireless Securty Google Maps DDoS Solid State Drive Social Engineering Business Intelligence Flexibility Digital Payment Avoiding Downtime Black Market Word Data Security Cryptocurrency Router Downtime Laptop Business Growth Patch Management Value Comparison Tablet Current Events Password Cortana Data Loss Company Culture Office Tips Mouse Telephony Cooperation Microchip Taxes Redundancy Processors Programming Distributed Denial of Service USB Vendor YouTube Statistics Lifestyle Presentation Unified Communications Settings Network Congestion Evernote Vulnerabilities Public Cloud Gaming Console Virtual Desktop Specifications Safety Text Messaging Start Menu Tech Terms Webcam Streaming Media Identity Theft Documents IT service Mobile Technology Software as a Service Heating/Cooling Entertainment Net Neutrality Politics Uninterrupted Power Supply Storage Virtual Reality Chrome Emails Vulnerability Bluetooth Automobile Chromebook Bitcoin Inbound Marketing Conferencing Data Protection Retail Computing Infrastructure Hack eWaste Google Docs Computer Accessories How To Download Private Cloud Pain Points Experience User Error Monitoring Monitors Trending Co-managed IT Cleaning Environment Legislation Error CIO Supercomputer Webinar HIPAA IT Plan Enterprise Resource Planning Managed IT Service Advertising Flash Assessment SharePoint Staffing Google Wallet Archive Tip of the week email scam Competition Addiction Bookmark Windows XP Skype Worker Google Calendar Electronic Payment Upselling Accountants A.I. Touchscreen News Video Surveillance Displays Reading Samsung VoIP Business Owner Multi-factor Authentication Google Play Society Wireless Headphones Telephone Micrsooft Employer Employee Relationship Knowledge Migration IP Address Saving ZTime Connected Devices Processor Point of Contact G Suite Consultation Human Resources Fleet Tracking Medical IT Drones Hacks Physical Security Virtual Assistant Application Network Management Browsers Licensing Technology Tips Equifax Banking Botnet Fake News Best Practives Debate User Tip Relocation Tablets Audit Harddrive Device security MSP Security Cameras GPS Nanotechnology Social Network Recycling Desktop Finance Navigation Permissions Language Analytic Sync Data Warehousing Startup Asset Tracking Professional Services Notifications CCTV Emergency Hard Drive Disposal Digital Signature External Harddrive Business Cards Service Level Agreement Data Analysis Product Reviews Access Microserver Business Metrics Read Computer Malfunction Microsoft Excel Teamwork Unified Threat Management Backup and Disaster Recovery switches Writing Reliable Computing Computer Care Username GDPR Music Google Drive Windows Server 2008 Get More Done 3D Screen Reader Ebay Customer Resource management Upgrades Thin CLient Gamification Tech In Internet of Things Turn Key PDF Smart Tech Distribution Voice over Internet Protocol Device Management Printer Server Smart Phones Piracy Upload Fileless Malware LiFi Spyware Mobile Payment Content Management Motion Sickness Trojan Best Available Fiber-Optic Keyboard Database Proxy Server Business Managemenet Scalability Electricity Printing HTML Modem Windows 7 Adminstration Pirating Information Telephone System Electronic Medical Records Deep Learning Messenger Tracking Organize Mobile Security Domains Leadership Term Work/Life Balance Multi-Factor Security Cost Recording online Currency Rental Service Meetings Software License Public Speaking Trends Directions Visible Light Communication Memory cache Television SSID Web Server Fraud Shortcut Tactics Dark Web IT consulting Cabling WannaCry Downloads Devices Administrator Time Management Freedom of Information Entrepreneur Health IT LinkedIn Books Workers Corporate Profile Troubleshooting UTM Content Processing Wi-Fi CrashOverride Capital Printers Productuvuty Managing Stress 3D Printing Regulation