facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

80 Million Medical Records Compromised: 4 Ways to Protect Yourself

b2ap3_thumbnail_anthem_hack_400.jpgThis month saw one of the largest recorded data breaches ever, when healthcare-provider Anthem experienced a hack causing data belonging to more than 80 million of its patients to be exposed. This includes sensitive information like Social Security numbers, dates of birth, email addresses, and more. How can you protect yourself from a hack like this?

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Software Internet Cloud Data Hackers Business Management Workplace Tips Hardware Network Security Microsoft Productivity Backup Business Hosted Solutions Email Managed Service Provider Productivity IT Services Saving Money Efficiency Malware Innovation Google Small Business User Tips Collaboration Computer IT Support VoIP Data Backup Quick Tips Smartphones IT Support Network Data Recovery Mobile Devices communications Android Microsoft Office Business Continuity Disaster Recovery Gadgets Cybersecurity Smartphone Communication Phishing Social Media Upgrade Mobile Office Server Mobile Device Virtualization Miscellaneous Ransomware Managed IT Services Mobile Device Management Passwords Windows Users Holiday Operating System Vendor Management BDR Internet of Things Tech Term Windows 10 Apps Outsourced IT Remote Monitoring Unified Threat Management Facebook Automation BYOD WiFi Remote Computing Mobile Computing Covid-19 Apple Managed IT services Data Management Analytics Windows 10 History Artificial Intelligence Browser Save Money Cloud Computing Spam Managed Service The Internet of Things Marketing Training Help Desk Firewall Business Technology Alert Bandwidth Health Big data App Encryption Office IT Consultant Information Technology Office 365 Budget Two-factor Authentication Government Managed IT Cybercrime Content Filtering Access Control Going Green Wi-Fi Networking Hard Drives Windows 7 Blockchain Bring Your Own Device Maintenance VPN Printer Information Gmail Antivirus Search Healthcare Recovery Remote Work Employer-Employee Relationship Retail Cost Management Best Practice Lithium-ion Battery Outlook Document Management Hiring/Firing Windows 8 Saving Time Computers Wireless Technology Virus Tech Support Education Storage Update Project Management Avoiding Downtime Risk Management Phone System iPhone Vendor Hacking Conferencing Money IBM Data Security It Management Augmented Reality Patch Management Data Loss Humor Customer Service Computing Travel Data Breach File Sharing Hard Drive Law Enforcement Website Solid State Drive Compliance Mobility Data storage Current Events Flexibility Applications Value Password Save Time Laptop Meetings Router Downtime Hacker Legal Remote Customer Relationship Management Proactive IT Computer Repair Running Cable Regulations PowerPoint Voice over Internet Protocol SaaS Administration Twitter End of Support Intranet Wireless Vulnerabilities Robot DDoS Securty Digital Google Maps Employee/Employer Relationship Websites Net Neutrality Word Social Engineering Cooperation Black Market Business Intelligence Chrome Cryptocurrency Digital Payment Software as a Service Cortana Business Growth Excel Private Cloud Comparison Tablet Fax Server Telephony Company Culture Machine Learning Monitoring Employees Paperless Office Telephone Systems Social Networking User Virtual Desktop Sports Scam Social Disaster Management Hosted Solution Identity Theft Teamwork Heating/Cooling Entertainment Managed Services Provider Notifications Streaming Media Evernote Display IT service How To Virtual Assistant Managed Services Virtual Reality Inbound Marketing Politics Automobile Start Menu Tech Terms Emails Managed IT Service Bluetooth eWaste Chromebook Mobile Technology Pain Points Distribution Computing Infrastructure Hack User Error Co-managed IT How To Uninterrupted Power Supply Google Docs Processor Memory Vulnerability Experience Download Computer Accessories Cleaning Cost Monitors Bitcoin Processors Trending Data Protection USB Lifestyle Solutions Office Tips Mouse Professional Services eCommerce Microchip Taxes Presentation Smart Devices Gaming Console Distributed Denial of Service Downloads YouTube Statistics Integration Time Management Specifications Programming Safety Unified Communications Settings Video Conferencing Public Cloud Licensing Holidays Text Messaging Network Congestion Webcam Multi-factor Authentication Telephone Redundancy Documents Permissions Equifax Language Internet Service Provider Fleet Tracking Sync VoIP Get More Done Electronic Medical Records Transportation Network Management AI Touchscreen News Term Recycling Knowledge Turn Key Recording Optimization 3D Regulations Compliance Ebay CCTV Consultation Analytic Printer Server Directions Device security IT Assessment Thin CLient MSP SSID Music Nanotechnology Remote Working Social Network Business Metrics Computer Malfunction Product Reviews Technology Tips Trojan Dark Web Free Resource switches Smart Phones Desktop Writing Finance Gig Economy Reliable Computing PDF Processing Startup Asset Tracking In Internet of Things Best Available Audit Keyboard Health IT Business Cards Upgrades Service Level Agreement Supply Chains Read Fake News Organize Logistics Unified Threat Management Virtual Machines Adminstration Backup and Disaster Recovery Financial Data Pirating Information Data Warehousing Domains Wasting Time LiFi Electronic Health Records Leadership Username Hard Drive Disposal Cyber security Screen Reader Customer Resource management Motion Sickness Access Public Speaking Bookmark Memes Gamification Smartwatch Scalability Device Management Emergency Google Play Telephone Service Smart Tech Work/Life Balance Managing IT Services Business Managemenet Computer Care Shortcut Employer/Employee Relationships Piracy Deep Learning Upload 2FA Messenger Tracking Content Management Microsoft Excel Entrepreneur Microsoft 365 Fiber-Optic Database Telework Rental Service Google Drive Troubleshooting Windows Server 2008 Webinar Managing Costs Visible Light Communication HTML Surveillance Cabling online Currency Environment Medical IT Trend Micro Remote Workers Telephone System Web Server Spyware HIPAA Mobile Payment Browsers IT consulting Mobile Security IT Security Cameras Threats Upselling Multi-Factor Security Virtual Private Network Administrator Electricity Printing Competition User Tip Proactive Maintenance Software License Trends Books Workers Electronic Payment LinkedIn CIO Fraud Tactics FinTech Video Surveillance Supercomputer Business Owner Navigation Virtual Machine Advertising Devices Flash Development Worker Staffing Google Wallet Data Storage cache Television IP Address Data Analysis Windows XP UTM Saving ZTime Content GDPR Managing Risk Society Legislation Procurement Error WannaCry Skype Best Practives Application Printers SQL Server IT Plan Displays Enterprise Resource Planning Reviews Reading Samsung Archive Human Resources A.I. G Suite Corporate Profile email scam Micrsooft Addiction Organization Debate Employer Employee Relationship Freedom of Information Tech Hypervisor Harddrive Accountants Microserver Drones GPS PCI DSS Hacks Physical Security Point of Contact Assessment SharePoint Fileless Malware Hybrid Cloud Communitications Modem Strategy Wireless Headphones Supply Chain Management Banking Botnet Digital Signature Google Calendar Proxy Server Azure External Harddrive Migration Connected Devices Shopping Relocation Tablets Tip of the week Capital Personal Information Productuvuty Financial 3D Printing Managing Stress Regulation CrashOverride