facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybersecurity Awareness in Retail

Cybersecurity Awareness in Retail

Cybercrime is at a record high and today’s businesses are the ones that take the brunt of the issues. For the retail business, cybersecurity has a couple of different faces. For Cybersecurity Awareness Month, we thought we’d talk a little bit about the retail space and how businesses are securing their customers’ information. 

0 Comments
Continue reading

A Testimonial From the North Pole

A Testimonial From the North Pole

We’ve always been a proponent of preparing for the worst and hoping for the best where a business’ solutions are concerned. That’s why we were happy to receive an email from our friends at the North Pole telling us about a situation they ran into just a few days ago...

0 Comments
Continue reading

These Gifts Can Come with Security Issues

These Gifts Can Come with Security Issues

The holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

0 Comments
Continue reading

As Technology Has Evolved. So Have Our Holiday Traditions

As Technology Has Evolved. So Have Our Holiday Traditions

Merry Christmas! We know that for the small business owner, even on Christmas day, business doesn’t completely stop. Sure you can spend time with loved ones and take a couple days off from the grind, but tomorrow is another day. According to one study, people are gifting technology more than ever, so much so that new traditions that include technology, are replacing the once-held notion that technology was a distraction.

0 Comments
Continue reading

The Most Wonderful Time of the Year...for Thieves

The Most Wonderful Time of the Year...for Thieves

In terms of data loss and theft, the holiday season is one of the riskiest times to travel. When it comes to protecting your personal information, thieves and cybercriminals are counting on either your irreverence to the issue as a whole, or to be so distracted that you make careless mistakes. In 2016, the number of fraud attempts went up by 31% during the holiday season. In addition, credit cards, mobile devices, and open Wi-Fi are common targets during the holiday.

0 Comments
Continue reading

This Halloween, Hackers are Pretending to Be You

This Halloween, Hackers are Pretending to Be You

Halloween is a great time for people of all ages to let loose and embrace their spookier, darker side--even though they aren’t. For hackers, however, every day is like Halloween, but with ill intentions. Hackers will pretend to be someone they’re not in order to scam you out of sensitive data or personal information. By identifying their tricks, you can keep hackers from getting their treats.

0 Comments
Continue reading

Tales from the Haunted Server Room

b2ap3_thumbnail_shock_n_awe_it_400.jpgIt was a dark and stormy night, as it sometimes is on Halloween. It’s a time when kids and adults alike enjoy dressing up as scary monsters and partaking in some good old-fashioned trick-or-treating. You’re pulling a late night at the office, and you hear a sound emanating from your server room; an unsavory clicking sound that echoes through the recesses of your office. What do you do?

0 Comments
Continue reading

Arguably the Most Important Computer in Star Wars

b2ap3_thumbnail_death_star_may_the_fourth_400.jpgToday is known the world over as Star Wars Day (May the 4th be with you). We want to take this opportunity to look at the technology of one of our favorite movie franchises. Given how much exciting technology there is in the fictional Star Wars universe, picking just one technology can be difficult. Since we work with computers, let’s look at one of the most important computers in the film, the X-wing targeting computer.

0 Comments
Continue reading

World Backup Day is Upon Us: How Do You Backup Your Data?

b2ap3_thumbnail_world_backup_day_2_400.jpgA quick scan of the past year’s headlines will show that a data-loss scenario resulting from a hack can unexpectedly hit any business, big or small. Your company needs to have a data backup solution in place, and it’s imperative that backups are taken regularly. Has it been awhile since you last backed up your data?

0 Comments
Continue reading

Rockin’ Around with Managed IT

b2ap3_thumbnail_rockin_around_with_managed_it_400.jpgAn IT parody song to the tune of “Rockin’ Around the Christmas Tree.”

0 Comments
Continue reading

4 Holiday Gifts for the Business Professional in Your Life

b2ap3_thumbnail_holidy_technology_gifts_400.jpgIt’s the holiday season, and everyone is scrambling to throw together the perfect gift for the technology lover. With so many spectacular consumer electronics available, it can be overwhelming just thinking about all of the possibilities. Before you get in over your head thinking up the best gifts, try checking out this list of cool and practical tech.

0 Comments
Continue reading

Competition Drives Black Friday Sales and Can Enhance Your Business Too!

b2ap3_thumbnail_friendly_competition_400.jpgFor American retailers, Black Friday is the biggest and most competitive day on the shopping calendar. Consumers reap the rewards of all of this competition by taking advantage of deep discounts on their favorite items. Competition like this is a win-win for both parties! Can your business benefit like this from an infusion of friendly competition?

0 Comments
Continue reading

Are Ghosts Haunting the Halls of Your Servers?

b2ap3_thumbnail_haunted_pc_400_20141031-133424_1.jpgThough not everyone believes them, we all know about the horror stories of the spirits of the dead that linger in this world, haunting locations where no one dares to tread. Every culture, though their beliefs vary, contains them to some degree. Their purpose is unknown, and they are thought to be caused by unfulfilled desires or regrets. But regardless of whether or not you believe in them, you better believe that your business can very well be haunted by ghost servers.

0 Comments
Continue reading

Managed IT Services: The Perfect Gift for Business Dad!

b2ap3_thumbnail_happy_fathers_day_400.jpgDo you know what to get Dad this Father's Day to show him that you appreciate all that he's done for you? If he's a business owner, we have the perfect gift for him!

That's right - Computerware's managed IT services! We don't mean buy them outright for him, but by suggesting our services to him, you can give him the greatest gift of all: peace of mind and a whole lot more cash in his pocket. Here are four good reasons to outsource Dad's IT services.

0 Comments
Continue reading

The Holiday Spirit in the Christmas Cloud

b2ap3_thumbnail_chtree400.jpgIn Charles Dickens' tale, A Christmas Carol, Ebenezer Scrooge learned an important lesson that most of us already know. In order to get the best out of people, you need to give the best of yourself. For those of you who don't remember the 19th-century novella, Scrooge is a business owner who only cares about money and because of this, draws the disdain of his family and his extremely patient subordinate, Bob Cratchit. On Christmas eve, he's visited by three Christmas spirits, and as he gets a look at the reality of how his actions affect those around him, he wakes up on Christmas morning with a new perspective.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Business Computing Cloud Software Business Management Hackers Data Hardware Microsoft Workplace Tips Backup Managed Service Provider Network Security Productivity Business Hosted Solutions Email Malware Saving Money IT Services Efficiency Computer IT Support Google Productivity User Tips Innovation Small Business Smartphones Quick Tips Mobile Devices Data Backup Microsoft Office Business Continuity VoIP Social Media Collaboration Gadgets Disaster Recovery Android Data Recovery Network Upgrade IT Support Mobile Office Server communications Communication Virtualization Mobile Device Management Smartphone Miscellaneous Ransomware Cybersecurity Phishing Tech Term Windows 10 Windows Operating System Holiday Vendor Management Unified Threat Management Apps Facebook Automation Outsourced IT Passwords Remote Monitoring BYOD Remote Computing Mobile Computing BDR Managed IT services Analytics Users WiFi Internet of Things Managed IT Services Mobile Device Artificial Intelligence Apple Marketing The Internet of Things Data Management History Browser Save Money Firewall Alert App Big data Two-factor Authentication IT Consultant Spam Cloud Computing Office 365 Encryption Help Desk Antivirus Gmail Health Office Cybercrime Content Filtering Bandwidth Business Technology Information Technology Going Green Maintenance Printer Windows 10 Bring Your Own Device Tech Support Virus Wireless Technology Computers Information Saving Time Search VPN Training Government Employer-Employee Relationship Lithium-ion Battery Best Practice Windows 8 Cost Management Outlook Managed IT Hiring/Firing Hard Drives Budget Networking Customer Service Travel Healthcare Education Recovery Access Control Phone System Update Retail It Management Hacking Managed Service Blockchain IBM Money Document Management Legal Administration Regulations Twitter Intranet Website Avoiding Downtime SaaS Current Events Risk Management File Sharing iPhone Law Enforcement Applications Hard Drive Password Value Compliance Save Time Mobility Hacker Data Loss Data storage Downtime Augmented Reality Humor PowerPoint Running Cable Proactive IT Social Networking Digital Project Management Management Telephony Social Websites Wireless Machine Learning Paperless Office Vulnerabilities Telephone Systems DDoS Storage Sports Disaster Computing Hosted Solution End of Support Robot Word Data Security Securty Windows 7 Business Intelligence Cortana Google Maps Digital Payment Excel Patch Management Solid State Drive Router Social Engineering Fax Server Customer Relationship Management Scam Black Market Flexibility Comparison Tablet Cryptocurrency Data Breach Laptop Company Culture Monitoring Business Growth Computer Repair Private Cloud User Cleaning Wi-Fi Specifications Safety Text Messaging Monitors Virtual Desktop Webcam Virtual Assistant Office Tips Programming Statistics Start Menu Tech Terms Network Congestion Microchip Taxes Documents Distributed Denial of Service Entertainment Managed IT Service Mobile Technology YouTube Teamwork Heating/Cooling Cooperation Software as a Service Unified Communications Settings Vendor Uninterrupted Power Supply Streaming Media Inbound Marketing Public Cloud Licensing Vulnerability Processor Identity Theft Co-managed IT User Error Bitcoin Pain Points Data Protection eWaste IT service Net Neutrality Chrome Distribution Virtual Reality Downloads Politics Automobile Emails Lifestyle Bluetooth Conferencing Chromebook Processors Computer Accessories Computing Infrastructure Hack USB Voice over Internet Protocol Redundancy How To Presentation Gaming Console Google Docs Memory Trending Experience Download Evernote Mouse Skype email scam Addiction Administrator Directions Display GPS Technology Tips Archive Accountants A.I. Books Workers Recording Dark Web Free Resource Audit CIO Multi-factor Authentication Supercomputer SSID Get More Done External Harddrive Fake News Advertising Flash Digital Signature Health IT Employee/Employer Relationship Printer Server Staffing Google Wallet Point of Contact Migration Connected Devices Processing Turn Key Data Warehousing Windows XP Wireless Headphones Telephone Worker Hard Drive Disposal Society Network Management Wasting Time 3D Access Ebay Displays Equifax Fleet Tracking Reading Samsung Logistics Trojan Thin CLient Emergency G Suite Bookmark Organize Computer Care Micrsooft Device security MSP Employer Employee Relationship Smart Phones Microsoft Excel Employer/Employee Relationships Drones Analytic Desktop Finance Hacks Physical Security PDF Google Play Google Drive Windows Server 2008 Recycling Nanotechnology Social Network Product Reviews Business Cards Service Level Agreement Banking Botnet Managing Costs Adminstration Spyware Pirating Information Mobile Payment Startup Asset Tracking Relocation Tablets Best Available Keyboard Microsoft 365 Leadership Unified Threat Management Backup and Disaster Recovery Sync Domains Browsers Electricity Printing Read Username Medical IT Permissions Language Public Speaking User Tip Proactive Maintenance Webinar Gamification Notifications CCTV Security Cameras Screen Reader Customer Resource management Music Piracy Upload Business Metrics Computer Malfunction Navigation Virtual Machine cache Television switches Writing Device Management Smart Tech Reliable Computing Shortcut Solutions Business Managemenet Fiber-Optic Database In Internet of Things Troubleshooting Data Analysis Employees WannaCry Upgrades Content Management HTML Entrepreneur Professional Services HIPAA SQL Server Upselling Corporate Profile Mobile Security Environment GDPR Time Management Freedom of Information LiFi Telephone System Integration Software License Trends Motion Sickness Electronic Payment Tech Hypervisor Assessment Video Surveillance SharePoint online Currency Multi-Factor Security Cost Scalability Competition Work/Life Balance Fraud Tactics Business Owner Fileless Malware Hybrid Cloud Google Calendar Deep Learning Devices Messenger Tracking Best Practives Saving ZTime Tip of the week IP Address Proxy Server Azure VoIP UTM Content Rental Service Meetings Modem Touchscreen News Visible Light Communication LinkedIn Application Electronic Medical Records Transportation Harddrive Knowledge IT Plan Enterprise Resource Planning Web Server Human Resources Term Managed Services Provider Microserver Consultation Debate IT consulting Legislation Error Cabling Capital Managed Services Personal Information Productuvuty Financial Printers Managing Stress CrashOverride Regulation 3D Printing

toner1