facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Year in Review: 2016’s Biggest Breaches

Year in Review: 2016’s Biggest Breaches

2016 was quite the year for cybersecurity and the assorted issues, threats, and concerns associated with it. As 2017 rolls along, we may be able to anticipate what this year might bring by reflecting on the events of the last.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Data Microsoft Backup Workplace Tips Hardware Managed Service Provider Productivity Network Security Business Email Hosted Solutions Malware Saving Money IT Services Efficiency IT Support Google User Tips Small Business Computer Innovation Productivity Smartphones Mobile Devices Quick Tips Business Continuity Gadgets VoIP Social Media Microsoft Office Data Backup Network Collaboration Android Disaster Recovery Data Recovery Mobile Office Server Upgrade communications Virtualization IT Support Communication Smartphone Mobile Device Management Phishing Miscellaneous Tech Term Cybersecurity Ransomware Windows Windows 10 Facebook Operating System Unified Threat Management Passwords Apps Holiday Vendor Management Remote Monitoring Analytics Users BYOD Automation Remote Computing Managed IT services Mobile Computing BDR Internet of Things WiFi Mobile Device Data Management Marketing The Internet of Things Outsourced IT Apple Firewall History Managed IT Services Artificial Intelligence Browser App Alert Save Money Spam Two-factor Authentication Cloud Computing IT Consultant Encryption Big data Windows 10 Bring Your Own Device Help Desk Antivirus Office 365 Maintenance Printer Gmail Bandwidth Business Technology Office Content Filtering Health Going Green Cost Management Outlook Windows 8 Wireless Technology Hiring/Firing Hard Drives Search Training Budget Computers Virus Saving Time Tech Support VPN Managed IT Government Best Practice Information Technology Lithium-ion Battery Employer-Employee Relationship Cybercrime Networking Hacking Information Money Document Management Healthcare Access Control Customer Service It Management Travel Blockchain Education Managed Service Recovery Phone System Update IBM Password Augmented Reality Legal Save Time PowerPoint Downtime Regulations Administration Humor Proactive IT SaaS Running Cable File Sharing Avoiding Downtime Hard Drive Law Enforcement Applications Intranet iPhone Twitter Compliance Mobility Website Data Loss Data storage Risk Management Private Cloud Cortana Business Growth Value Business Intelligence Project Management Digital Digital Payment Router Management Telephony Hacker Websites Machine Learning Fax Server Paperless Office Vulnerabilities Telephone Systems Comparison Tablet Company Culture Sports Disaster User Computing Computer Repair Hosted Solution End of Support Social Networking Social Robot Wireless Data Security Securty Windows 7 DDoS Google Maps Patch Management Solid State Drive Social Engineering Scam Black Market Excel Flexibility Cryptocurrency Word Retail Current Events Data Breach Laptop Customer Relationship Management Experience Chrome Download Evernote Virtual Assistant Cleaning Monitors Gaming Console Office Tips Processors Lifestyle Text Messaging Start Menu Tech Terms Computer Accessories Microchip Taxes Webcam Distributed Denial of Service USB Mobile Technology YouTube Unified Communications Settings Trending Presentation Cooperation Software as a Service Public Cloud Vendor Uninterrupted Power Supply Mouse Safety Vulnerability Virtual Desktop Specifications Bitcoin Programming Identity Theft Inbound Marketing Statistics Documents Data Protection IT service Network Congestion Entertainment Teamwork Heating/Cooling Distribution Virtual Reality Downloads Politics Storage Pain Points Conferencing Automobile Emails Bluetooth Streaming Media Chromebook Redundancy Computing Infrastructure Hack Voice over Internet Protocol Monitoring How To eWaste User Error Google Docs Net Neutrality Co-managed IT Cabling Electronic Medical Records Transportation Knowledge Device Management IT Plan Enterprise Resource Planning Web Server Shortcut Saving ZTime Webinar Term Consultation IT consulting Legislation Error Recording Content Management email scam Addiction Wi-Fi Administrator Entrepreneur Directions Technology Tips Business Managemenet Accountants A.I. Books Workers Troubleshooting Flash Environment Debate Dark Web Free Resource Audit CIO Multi-factor Authentication Supercomputer HIPAA Harddrive SSID Fake News Advertising Telephone Worker Electronic Payment GPS Health IT Employee/Employer Relationship Staffing Google Wallet online Currency Migration Connected Devices Competition Processing Data Warehousing Windows XP Wireless Headphones Logistics Emergency Hard Drive Disposal Society Network Management External Harddrive Managed IT Service Access Displays Equifax Fleet Tracking Reading Samsung Business Owner G Suite Best Practives Bookmark Computer Care Micrsooft LinkedIn Device security MSP Employer Employee Relationship IP Address Microsoft Excel Nanotechnology Social Network Licensing 3D Human Resources Ebay Employer/Employee Relationships Drones Desktop Finance Hacks Physical Security Application Thin CLient Google Play Google Drive Windows Server 2008 Microserver Microsoft 365 Archive Business Cards Service Level Agreement Banking Botnet Smart Phones Processor Spyware Mobile Payment Skype Startup Asset Tracking Relocation Tablets Permissions Language Unified Threat Management Backup and Disaster Recovery Sync Browsers Electricity Printing Username Medical IT Screen Reader Customer Resource management Adminstration Get More Done Pirating Information User Tip Proactive Maintenance Gamification Notifications CCTV Digital Signature Leadership Security Cameras Point of Contact Turn Key Solutions Music Piracy Upload Business Metrics Computer Malfunction Printer Server Navigation cache Television switches Writing Smart Tech Reliable Computing Fiber-Optic Database In Internet of Things Trojan Data Analysis WannaCry Upgrades HTML Professional Services Analytic Telephone System PDF SQL Server Corporate Profile Recycling Mobile Security Organize GDPR Time Management Freedom of Information LiFi Integration Software License Trends Motion Sickness Best Available Keyboard Tech Assessment SharePoint Product Reviews Multi-Factor Security Cost Scalability Tip of the week Work/Life Balance Read Fraud Tactics Fileless Malware Google Calendar Deep Learning Devices Messenger Tracking Upselling Domains Video Surveillance Proxy Server Azure VoIP UTM Content Rental Service Meetings Public Speaking Modem Touchscreen News Visible Light Communication Memory 3D Printing Capital Productuvuty Printers Managing Stress CrashOverride Regulation