facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Year in Review: 2016’s Biggest Breaches

Year in Review: 2016’s Biggest Breaches

2016 was quite the year for cybersecurity and the assorted issues, threats, and concerns associated with it. As 2017 rolls along, we may be able to anticipate what this year might bring by reflecting on the events of the last.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Hackers Software Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Saving Money Email Malware Hosted Solutions IT Services IT Support Efficiency Google Small Business Computer User Tips Smartphones Quick Tips Mobile Devices Innovation Gadgets Business Continuity VoIP Disaster Recovery Microsoft Office Android Social Media Network Data Backup Collaboration Productivity Mobile Office Virtualization Server Smartphone Mobile Device Management Communication Data Recovery Miscellaneous Ransomware Windows 10 Tech Term communications Upgrade IT Support Unified Threat Management Windows Remote Monitoring Operating System Passwords Facebook Holiday Cybersecurity Mobile Computing BYOD Remote Computing Vendor Management Managed IT services Apps Phishing Users Automation BDR WiFi The Internet of Things Mobile Device Data Management Marketing Analytics History Outsourced IT Apple Firewall Managed IT Services Browser Internet of Things App Save Money Alert Artificial Intelligence Big data IT Consultant Encryption Bring Your Own Device Maintenance Printer Antivirus Gmail Spam Health Bandwidth Cloud Computing Content Filtering Going Green Office 365 Office Budget Help Desk Wireless Technology Windows 10 Virus Two-factor Authentication Tech Support Search Cybercrime Hiring/Firing Hard Drives Managed IT Information Technology Lithium-ion Battery Best Practice Cost Management Business Technology Saving Time Outlook Windows 8 Training Update Money Recovery Phone System Document Management Access Control Employer-Employee Relationship Healthcare Computers Hacking Blockchain IBM VPN Travel Managed Service Humor Risk Management Regulations File Sharing Administration Customer Service Hard Drive SaaS Save Time Mobility Government Website Law Enforcement Information Running Cable Proactive IT Compliance It Management Data storage Twitter Intranet Education Applications Augmented Reality Networking PowerPoint Legal User Data Breach Social Project Management Paperless Office Digital Wireless Business Intelligence Websites Sports Digital Payment Computing Google Maps Disaster DDoS End of Support Router Downtime Hosted Solution Avoiding Downtime Social Engineering Robot Comparison Tablet Management Securty Current Events iPhone Word Company Culture Computer Repair Solid State Drive Password Cortana Social Networking Value Data Security Flexibility Excel Black Market Patch Management Cryptocurrency Hacker Fax Server Machine Learning Customer Relationship Management Data Loss Laptop Scam Telephone Systems Business Growth Public Cloud Office Tips Evernote Webcam Conferencing Virtual Desktop Text Messaging Specifications Safety YouTube Identity Theft Net Neutrality Documents Unified Communications Settings Chrome Monitoring Heating/Cooling Start Menu Tech Terms Entertainment Mobile Technology Politics Virtual Reality Storage Inbound Marketing Software as a Service Automobile Computer Accessories Emails IT service Uninterrupted Power Supply Chromebook Computing Infrastructure Hack Retail Trending eWaste User Error Bitcoin How To Pain Points Vulnerabilities Mouse Co-managed IT Private Cloud Bluetooth Data Protection Download Programming Statistics Telephony Network Congestion Cooperation Processors Lifestyle Vendor Microchip Google Docs Taxes USB Experience Distributed Denial of Service Monitors Streaming Media Redundancy Cleaning Gaming Console Presentation HTML Debate Human Resources Product Reviews Touchscreen News Security Cameras Advertising Flash Licensing Harddrive Fiber-Optic Database Application VoIP User Tip CIO Hacks Physical Security Microserver Consultation Navigation Windows XP Relocation Tablets Telephone System Read Knowledge Staffing Banking Google Wallet Botnet GPS Mobile Security Technology Tips Data Analysis Displays External Harddrive Multi-Factor Security Cost Virtual Assistant Professional Services Society Sync Software License Trends Devices Get More Done Fake News GDPR Fraud Digital Signature Tactics Device Management Audit Notifications Micrsooft CCTV Business Managemenet Turn Key Data Warehousing Tech Reliable Computing Thin CLient Teamwork Content Management Printer Server Business Metrics Drones Computer Malfunction 3D UTM Ebay Content Access Fileless Malware Smart Phones Legislation Error Trojan Emergency Hard Drive Disposal Voice over Internet Protocol In Internet of Things IT Plan Enterprise Resource Planning Accountants PDF A.I. Microsoft Excel Modem Permissions Language email scam Addiction online Currency Organize Computer Care Proxy Server Google Drive Windows Server 2008 Term Scalability Leadership Best Available Keyboard Electronic Medical Records Motion Sickness Adminstration Multi-factor Authentication Pirating Information Spyware Mobile Payment Directions switches Messenger Writing Tracking Wireless Headphones Telephone Vulnerability Recording Music Migration Connected Devices Domains LinkedIn Meetings Equifax Fleet Tracking SSID Network Management Public Speaking Electricity Printing Dark Web Rental Service Upgrades Device security MSP Skype Windows 7 Processing LiFi Cabling Shortcut Archive Webinar Health IT Web Server cache Television Managed IT Service Books Workers Nanotechnology Entrepreneur Social Network Wi-Fi Administrator Desktop Troubleshooting Finance Deep Learning Supercomputer Startup Environment Asset Tracking Point of Contact Work/Life Balance Upselling Business Cards HIPAA Service Level Agreement WannaCry Downloads Bookmark Video Surveillance Electronic Payment Username Time Management Freedom of Information Google Play Visible Light Communication Memory Worker Unified Threat Management Backup and Disaster Recovery Competition Corporate Profile Assessment SharePoint Processor IT consulting Reading Samsung Saving ZTime Screen Reader Customer Resource management Business Owner Gamification Browsers Employer Employee Relationship Smart Tech Distribution Analytic Best Practives Tip of the week Medical IT G Suite Piracy Upload IP Address Recycling Google Calendar Managing Stress Regulation Capital Printers Productuvuty 3D Printing CrashOverride