facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

Managing permissions for their network is something that many organizations may only consider when it’s too late to do anything about it. This can provide outsiders with access to sensitive information that shouldn’t be seen by anyone but your employees. To learn a few lessons about user permissions, let’s look at the misfortune of PA Online, a Pennsylvania-based Internet service provider.

0 Comments
Continue reading

Tip of the Week: 5 Questions to Ask When Interviewing for Remote Positions

Tip of the Week: 5 Questions to Ask When Interviewing for Remote Positions

Thanks to modern office technology, traditional office barriers that held businesses back are being brought down. With the right technology solutions, workers can work at any time from any location. This has led many employers to consider hiring remote workers due to the ability to bypass the restraints of geographical locations. Yet, just because you can hire anyone for a remote position doesn’t mean that you should.

0 Comments
Continue reading

A 5-Step Checklist to Avoid Employee Sabotage

b2ap3_thumbnail_checklists_for_employee_turnover_400.jpgDo you know what would happen if your business were to lose a key member of its operational personnel? In some cases, it can be heartbreaking to see a good worker leave, but sometimes the one leaving doesn’t depart under the greatest circumstances. Are you confident that any angry employees leaving your organization won’t be able to access your infrastructure?

0 Comments
Continue reading

3 Warning Signs That Can Reveal Your IT Staff’s True Colors

b2ap3_thumbnail_employee_true_colors_400.jpgYour IT staff deals with your technology on a daily basis, and that same technology is necessary for your company’s survival. In a sense, your IT staff holds the future of your business in their hands. This tremendous responsibility demands a certain level of trust from the business owner, but sometimes they might have other ulterior motives in mind. How can you tell if you’re being fooled by your IT staff?

0 Comments
Continue reading

How Much is it the Employer’s Responsibility to Ensure Employee Productivity?

b2ap3_thumbnail_employer_responsibility_400.jpgWhen you hire a new employee, you make it clear what the job’s expectations are. You expect them to be productive, and you provide them with an environment that’s conducive to getting the job done. This leads us to ask a fundamental question about workplace productivity: How much responsibility do you have in aiding your employees’ productivity?

0 Comments
Continue reading

Half of Your Employees Would Steal from You if Fired

b2ap3_thumbnail_former_employee_theft_400.jpgIn a survey by Cyber-Ark, close to half of employees interviewed admitted that if they were fired tomorrow, they would take with them their former company's proprietary data. This is a shocking revelation considering how much you trust your current staff, maybe even to the point of referring to them as "family." What can you do to protect your business from a former employee with ill intentions?

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Hackers Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Saving Money Email Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Mobile Devices Quick Tips User Tips Smartphones Innovation Gadgets Business Continuity VoIP Microsoft Office Disaster Recovery Network Social Media Android Data Backup Mobile Office Virtualization Collaboration Productivity Server Mobile Device Management Communication Smartphone Data Recovery Miscellaneous Upgrade Ransomware Windows 10 Tech Term communications Unified Threat Management Windows IT Support Operating System Facebook Holiday Remote Monitoring Passwords Apps BYOD Remote Computing Managed IT services Vendor Management Cybersecurity Phishing Mobile Computing Automation BDR Users WiFi Marketing The Internet of Things Apple Mobile Device Analytics Data Management Firewall Outsourced IT History Managed IT Services App Browser Save Money Alert Artificial Intelligence Internet of Things Encryption IT Consultant Big data Gmail Cloud Computing Spam Content Filtering Maintenance Printer Going Green Health Office Bring Your Own Device Office 365 Antivirus Bandwidth Two-factor Authentication Outlook Managed IT Windows 8 Hiring/Firing Hard Drives Best Practice Information Technology Lithium-ion Battery Cybercrime Virus Tech Support Saving Time Business Technology Cost Management Training Help Desk Wireless Technology Search Budget Windows 10 Money Document Management Access Control Recovery Employer-Employee Relationship Computers IBM VPN Healthcare Hacking Blockchain Travel Update Phone System Save Time Customer Service Compliance Data storage Government iPhone Website Running Cable Information Proactive IT Humor Legal It Management Networking Augmented Reality Regulations Intranet Twitter Education PowerPoint SaaS Applications File Sharing Hard Drive Risk Management Administration Managed Service Mobility Law Enforcement Social Engineering Websites Digital Payment Social Router Downtime Solid State Drive Avoiding Downtime Wireless DDoS Fax Server Flexibility Black Market Comparison Tablet Company Culture Cryptocurrency Computer Repair Laptop Management Word Excel Retail Business Growth Social Networking Data Security Machine Learning Value Password Customer Relationship Management Cortana Telephone Systems Patch Management Data Loss Hacker Paperless Office Sports Scam Computing Disaster End of Support Data Breach Hosted Solution Current Events User Google Maps Robot Digital Securty Project Management Business Intelligence Emails Automobile Chromebook Inbound Marketing Documents Start Menu Tech Terms Heating/Cooling Bluetooth Mobile Technology Computer Accessories Entertainment Monitoring Lifestyle Computing Infrastructure Hack Storage Software as a Service How To Uninterrupted Power Supply Download Private Cloud Trending Pain Points Mouse Google Docs Vulnerability Telephony Experience Bitcoin Data Protection Microchip Taxes Programming Cleaning Statistics eWaste Vulnerabilities Monitors Network Congestion Cooperation Office Tips Distributed Denial of Service Vendor Public Cloud Gaming Console YouTube Streaming Media Unified Communications Settings Processors USB Text Messaging Webcam Redundancy Identity Theft Presentation User Error Evernote Co-managed IT Net Neutrality Virtual Desktop IT service Politics Chrome Specifications Safety Conferencing Virtual Reality switches Software License Writing Trends Audit Content Management Smart Phones Music Multi-Factor Security Cost Fake News Business Managemenet Tech Motion Sickness Voice over Internet Protocol Digital Signature Devices Data Warehousing Scalability Fileless Malware Fraud Upgrades Tactics Modem Teamwork Adminstration Pirating Information LiFi UTM Content Access Messenger Tracking online Currency Proxy Server Leadership Emergency Hard Drive Disposal IT Plan Enterprise Resource Planning Computer Care Rental Service Meetings Electronic Medical Records Legislation Error Microsoft Excel Term Best Practives Web Server Recording Accountants Work/Life Balance A.I. Google Drive Windows Server 2008 Cabling LinkedIn Directions PDF email scam Deep Learning Addiction SSID Best Available Keyboard Visible Light Communication Multi-factor Authentication Memory Spyware Mobile Payment Books Workers Dark Web Wi-Fi Administrator IT consulting Migration Connected Devices Electricity Printing Supercomputer Archive Health IT Domains Wireless Headphones Telephone Microserver Skype Processing Public Speaking Equifax Fleet Tracking Windows 7 Worker Managed IT Service Upselling Network Management Point of Contact Shortcut Video Surveillance Advertising Device security Flash MSP cache Television Reading Samsung Bookmark CIO Get More Done Google Play Entrepreneur Windows XP Desktop Finance WannaCry Downloads Printer Server Employer Employee Relationship Troubleshooting Saving ZTime Staffing Google Wallet Nanotechnology Social Network Turn Key G Suite Displays Service Level Agreement Corporate Profile Trojan Hacks Physical Security HIPAA Society Startup Asset Tracking Time Management Freedom of Information Licensing Processor Environment Business Cards Banking Botnet Analytic Medical IT Competition Debate Username Assessment SharePoint Organize Relocation Tablets Recycling Browsers Harddrive Electronic Payment Unified Threat Management Micrsooft Backup and Disaster Recovery Security Cameras GPS Gamification Google Calendar User Tip Business Owner Drones Screen Reader Customer Resource management Tip of the week Sync Product Reviews Piracy Upload VoIP Notifications CCTV Read External Harddrive IP Address Smart Tech Distribution Touchscreen News Navigation Business Metrics Computer Malfunction Professional Services Application Permissions HTML Language Consultation Reliable Computing Data Analysis Human Resources Fiber-Optic Database Knowledge GDPR 3D Ebay Mobile Security Technology Tips Webinar Device Management Thin CLient Telephone System Virtual Assistant In Internet of Things Capital Regulation Productuvuty 3D Printing CrashOverride Managing Stress Printers

toner1