facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

Managing permissions for their network is something that many organizations may only consider when it’s too late to do anything about it. This can provide outsiders with access to sensitive information that shouldn’t be seen by anyone but your employees. To learn a few lessons about user permissions, let’s look at the misfortune of PA Online, a Pennsylvania-based Internet service provider.

0 Comments
Continue reading

Tip of the Week: 5 Questions to Ask When Interviewing for Remote Positions

Tip of the Week: 5 Questions to Ask When Interviewing for Remote Positions

Thanks to modern office technology, traditional office barriers that held businesses back are being brought down. With the right technology solutions, workers can work at any time from any location. This has led many employers to consider hiring remote workers due to the ability to bypass the restraints of geographical locations. Yet, just because you can hire anyone for a remote position doesn’t mean that you should.

0 Comments
Continue reading

A 5-Step Checklist to Avoid Employee Sabotage

b2ap3_thumbnail_checklists_for_employee_turnover_400.jpgDo you know what would happen if your business were to lose a key member of its operational personnel? In some cases, it can be heartbreaking to see a good worker leave, but sometimes the one leaving doesn’t depart under the greatest circumstances. Are you confident that any angry employees leaving your organization won’t be able to access your infrastructure?

0 Comments
Continue reading

3 Warning Signs That Can Reveal Your IT Staff’s True Colors

b2ap3_thumbnail_employee_true_colors_400.jpgYour IT staff deals with your technology on a daily basis, and that same technology is necessary for your company’s survival. In a sense, your IT staff holds the future of your business in their hands. This tremendous responsibility demands a certain level of trust from the business owner, but sometimes they might have other ulterior motives in mind. How can you tell if you’re being fooled by your IT staff?

0 Comments
Continue reading

How Much is it the Employer’s Responsibility to Ensure Employee Productivity?

b2ap3_thumbnail_employer_responsibility_400.jpgWhen you hire a new employee, you make it clear what the job’s expectations are. You expect them to be productive, and you provide them with an environment that’s conducive to getting the job done. This leads us to ask a fundamental question about workplace productivity: How much responsibility do you have in aiding your employees’ productivity?

0 Comments
Continue reading

Half of Your Employees Would Steal from You if Fired

b2ap3_thumbnail_former_employee_theft_400.jpgIn a survey by Cyber-Ark, close to half of employees interviewed admitted that if they were fired tomorrow, they would take with them their former company's proprietary data. This is a shocking revelation considering how much you trust your current staff, maybe even to the point of referring to them as "family." What can you do to protect your business from a former employee with ill intentions?

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Software Internet Cloud Data Hackers Business Management Hardware Workplace Tips Microsoft Network Security Productivity Backup Business Email Managed Service Provider Hosted Solutions Productivity Malware Saving Money IT Services Efficiency Google Innovation Small Business Computer User Tips Collaboration IT Support VoIP Smartphones Quick Tips Data Backup Network IT Support Mobile Devices communications Business Continuity Data Recovery Gadgets Disaster Recovery Microsoft Office Android Cybersecurity Social Media Smartphone Phishing Upgrade Communication Mobile Office Server Virtualization Miscellaneous Windows Mobile Device Mobile Device Management Passwords Users Ransomware Holiday Operating System Managed IT Services Vendor Management BDR Apps Outsourced IT Internet of Things Tech Term Windows 10 Facebook Unified Threat Management Remote Monitoring Automation BYOD Data Management Analytics Remote Computing WiFi Managed IT services Apple Mobile Computing Windows 10 The Internet of Things Marketing Training Help Desk History Artificial Intelligence Browser Cloud Computing Save Money Firewall Covid-19 Business Technology Managed Service Spam Alert Health App Encryption Big data Information Technology Office 365 Budget Two-factor Authentication Bandwidth Office IT Consultant Going Green Information Hard Drives Bring Your Own Device Access Control Maintenance Antivirus Printer VPN Gmail Windows 7 Government Blockchain Managed IT Cybercrime Content Filtering Best Practice Lithium-ion Battery Wi-Fi Cost Management Networking Outlook Windows 8 Document Management Hiring/Firing Healthcare Remote Work Wireless Technology Computers Saving Time Search Virus Tech Support Recovery Employer-Employee Relationship Retail Hacking Project Management IBM Money Augmented Reality Computing Humor Customer Service Data Security It Management Travel Education Storage Data Loss Conferencing Update Phone System iPhone Value Password Legal Save Time Hacker Downtime Customer Relationship Management Regulations PowerPoint Vendor Proactive IT SaaS Computer Repair Running Cable End of Support File Sharing Administration Wireless Law Enforcement Applications Hard Drive Intranet Twitter Compliance Mobility Website Patch Management Solid State Drive Data storage Avoiding Downtime Flexibility Risk Management Voice over Internet Protocol Current Events Data Breach Laptop Business Growth Chrome Business Intelligence Private Cloud Cortana Excel Digital Digital Payment Telephony Websites Router Management Machine Learning Employee/Employer Relationship Paperless Office Vulnerabilities Telephone Systems Fax Server Comparison Tablet Sports Cooperation Software as a Service Company Culture Disaster User Hosted Solution Virtual Desktop Social Networking Social Robot Securty Google Maps DDoS Social Engineering Remote Scam Black Market Word Cryptocurrency Net Neutrality Meetings Monitoring Experience Video Conferencing User Error Download Managed Services Provider Evernote Co-managed IT Cleaning Display Monitors Virtual Assistant Office Tips Multi-factor Authentication How To Processors Start Menu Tech Terms Computer Accessories Microchip Taxes Managed Services Telephone Lifestyle Distributed Denial of Service USB Managed IT Service Mobile Technology YouTube Trending Presentation Gaming Console Unified Communications Settings Uninterrupted Power Supply Mouse Public Cloud Licensing Processor Webcam Specifications Safety Vulnerability Text Messaging Programming Identity Theft Statistics Bitcoin Documents Data Protection Notifications IT service Network Congestion Teamwork Heating/Cooling Distribution Entertainment Solutions Virtual Reality Employees Downloads Politics Professional Services Inbound Marketing Emails Bluetooth Streaming Media Automobile Chromebook Cost Integration Computing Infrastructure Hack Redundancy Smart Devices How To eWaste Google Docs Pain Points Memory Knowledge Device Management IT Plan Enterprise Resource Planning Web Server Term Shortcut Consultation IT consulting Organization Legislation Error Cabling Electronic Medical Records Transportation email scam Content Management Addiction Administrator Directions Entrepreneur Technology Tips PCI DSS Accountants Business Managemenet A.I. Webinar Books Workers Troubleshooting Recording Optimization Communitications Dark Web Environment Free Resource Audit CIO Supply Chain Management Supercomputer HIPAA SSID Upselling Fake News Advertising Flash Video Surveillance Staffing Internet Service Provider Google Wallet Migration online Currency Connected Devices Processing Competition Data Warehousing Windows XP AI Wireless Headphones Worker Health IT Electronic Payment IT Assessment Society Network Management Wasting Time Access Saving ZTime Regulations Compliance Displays Equifax Fleet Tracking Reading Samsung Business Owner Logistics Virtual Machines Emergency Hard Drive Disposal G Suite Bookmark Computer Care Remote Working Micrsooft Device security LinkedIn MSP Employer Employee Relationship IP Address Cyber security Microsoft Excel Employer/Employee Relationships Human Resources Debate Drones Desktop Finance Best Practives Hacks Physical Security Google Play Application Telephone Service Harddrive Google Drive Windows Server 2008 Supply Chains Nanotechnology Social Network Electronic Health Records Business Cards Archive Service Level Agreement Banking Botnet Managing Costs Spyware Mobile Payment Financial Data Startup Skype Asset Tracking Relocation Tablets Microsoft 365 GPS Backup and Disaster Recovery Microserver Sync Browsers External Harddrive Electricity Printing Username Medical IT Trend Micro Memes Permissions Language Unified Threat Management User Tip Proactive Maintenance Managing IT Services Gamification CCTV Digital Signature Security Cameras Threats 2FA Point of Contact Screen Reader Customer Resource management Ebay Surveillance Music Piracy Upload Get More Done Business Metrics Computer Malfunction Navigation Virtual Machine cache Thin CLient Television switches Telework Writing Smart Tech Reliable Computing 3D Fiber-Optic Database Turn Key In Internet of Things Data Analysis Smart Phones WannaCry Remote Workers Upgrades HTML Printer Server eCommerce IT Printers PDF SQL Server Corporate Profile Virtual Private Network Recycling Mobile Security Trojan GDPR Managing Risk Time Management Freedom of Information LiFi Analytic Telephone System Adminstration Pirating Information Development Software License Trends Motion Sickness Best Available Tech Keyboard Hypervisor Assessment Leadership SharePoint FinTech Multi-Factor Security Product Reviews Organize Scalability Fraud Tactics Read Fileless Malware Hybrid Cloud Google Calendar Data Storage Deep Learning Devices Messenger Tracking Domains Holidays Tip of the week Work/Life Balance Proxy Server Azure VoIP Procurement UTM Content Rental Service Modem Public Speaking Strategy Touchscreen News Visible Light Communication Reviews 3D Printing Capital Personal Information Productuvuty Financial Managing Stress CrashOverride Regulation

toner1