facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Understanding Data Breaches Is The First Step To Stopping Them

Understanding Data Breaches Is The First Step To Stopping Them

Since the very beginning of the year, over 10 million personal records have been lost or stolen on a daily basis. As a result, chances are high that you or someone you know has been victimized by a data breach. However, since many individuals and businesses are never notified, they may have incorrectly come to the conclusion that they are not at risk. This, unfortunately, is not the case.

0 Comments
Continue reading

It’s Now Legal for ISPs to Sell Your Online Browsing History

It’s Now Legal for ISPs to Sell Your Online Browsing History

Due to recent legislative activity, the rules and regulations that the Federal Communications Commission put in place to protect the personal data of Internet users have been struck down. This change now allows ISPs, or Internet Service Providers, to sell the browsing information of their customers to advertisers without consent--a move many consider to be a threat to net neutrality. This is what you need to know.

0 Comments
Continue reading

How Sharing Your Netflix Password Could Potentially Land You in the Slammer

How Sharing Your Netflix Password Could Potentially Land You in the Slammer

As a side effect of a recent federal ruling, loaning out your Netflix password to your pal so they can catch up on Orange is the New Black is now considered a federal offense.

0 Comments
Continue reading

27 Million Spam Messages Earns Man the Title of “Spam King,” and 2.5 Years in Prison

27 Million Spam Messages Earns Man the Title of “Spam King,” and 2.5 Years in Prison

The man who, between 2008 and 2009, stole the log-in credentials of Facebook users to spread his credential-stealing web links, has been sentenced to some hard time.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Data Hackers Hardware Microsoft Network Security Workplace Tips Backup Managed Service Provider Hosted Solutions Business Productivity Email Productivity Malware IT Services Saving Money Efficiency Google Computer User Tips Small Business Innovation Collaboration IT Support Data Backup Smartphones VoIP IT Support Quick Tips Network Mobile Devices Business Continuity communications Microsoft Office Gadgets Data Recovery Android Social Media Disaster Recovery Upgrade Cybersecurity Mobile Office Server Communication Virtualization Smartphone Mobile Device Management Phishing Miscellaneous Vendor Management Ransomware Holiday Tech Term Passwords Windows 10 Outsourced IT Operating System Windows Managed IT Services Apps Internet of Things Facebook Unified Threat Management Users Remote Monitoring Mobile Device BDR Automation Analytics BYOD Remote Computing Data Management Apple Mobile Computing Managed IT services Windows 10 WiFi The Internet of Things Cloud Computing History Marketing Artificial Intelligence Browser Firewall Save Money Training Help Desk Alert App Big data Encryption IT Consultant Office Bandwidth Business Technology Office 365 Information Technology Two-factor Authentication Health Spam Gmail Hard Drives Bring Your Own Device Government Antivirus Cybercrime Access Control Windows 7 Maintenance Managed IT Content Filtering Printer Going Green Budget Hiring/Firing Recovery Wireless Technology Employer-Employee Relationship Managed Service Computers Search Retail Saving Time Windows 8 VPN Outlook Cost Management Best Practice Tech Support Lithium-ion Battery Virus Information Healthcare Networking Money Augmented Reality Document Management Phone System Project Management Computing Travel Education Hacking It Management Update iPhone Humor Blockchain Data Loss IBM Customer Service Covid-19 Wireless Legal PowerPoint Mobility Storage Website Current Events Regulations Proactive IT Applications Computer Repair Running Cable Administration SaaS Conferencing Value Intranet Password Twitter Law Enforcement Avoiding Downtime Data Security Hacker Compliance Solid State Drive Data storage Risk Management Patch Management Flexibility Save Time File Sharing Downtime Data Breach Hard Drive Customer Relationship Management Google Maps Digital DDoS Comparison Tablet Company Culture Websites Social Engineering Paperless Office Cooperation Sports Social Networking Disaster Vendor Software as a Service Meetings Word Hosted Solution Private Cloud End of Support Robot Wi-Fi Cortana Fax Server Securty Telephony Machine Learning Monitoring Telephone Systems Black Market Management Net Neutrality User Voice over Internet Protocol Excel Business Intelligence Cryptocurrency Scam Laptop Vulnerabilities Digital Payment Remote Work Virtual Desktop Router Business Growth Social Computer Accessories Monitors Evernote Documents Cleaning Office Tips Virtual Reality Entertainment Gaming Console Virtual Assistant Politics Teamwork Heating/Cooling Managed Services Automobile Trending Employee/Employer Relationship Emails Start Menu Tech Terms Co-managed IT Mouse Webcam YouTube Chromebook User Error Managed IT Service Text Messaging Distribution Mobile Technology Computing Infrastructure Hack Unified Communications Settings Programming How To Statistics Uninterrupted Power Supply Download Smart Devices eWaste Processor Network Congestion Lifestyle Vulnerability Inbound Marketing IT service Bitcoin Data Protection Microchip Taxes Streaming Media Professional Services Distributed Denial of Service Processors Downloads Pain Points Bluetooth USB Public Cloud Licensing Presentation Integration Multi-factor Authentication Telephone Chrome Google Docs Identity Theft Specifications Safety Memory Redundancy Managed Services Provider Experience Knowledge Reliable Computing Digital Signature Organize Nanotechnology Social Network online Currency Recording Optimization Saving ZTime Consultation Business Metrics Computer Malfunction Memes Desktop Finance Directions Display Startup Asset Tracking SSID How To CIO Technology Tips In Internet of Things Business Cards Service Level Agreement Dark Web Free Resource Advertising Flash Managing IT Services Username Processing Staffing Google Wallet Debate Audit Unified Threat Management Backup and Disaster Recovery Health IT LinkedIn Harddrive Windows XP Fake News Surveillance Scalability Remote Workers Screen Reader Customer Resource management Logistics Virtual Machines Displays Data Warehousing Motion Sickness IT PDF Gamification Wasting Time GPS Society Keyboard Webinar Smart Tech Archive External Harddrive Cyber security Micrsooft Access Piracy Upload Bookmark Skype Emergency Hard Drive Disposal Messenger Tracking Best Available Virtual Private Network HTML Google Play Telephone Service Drones Computer Care Domains Fiber-Optic Database Employer/Employee Relationships Microsoft Excel Rental Service Development Ebay Cabling Public Speaking Telephone System Microsoft 365 Thin CLient Google Drive Windows Server 2008 Web Server Mobile Security Point of Contact Managing Costs 3D Workers Procurement Shortcut Multi-Factor Security Cost Medical IT Smart Phones Trend Micro Spyware Mobile Payment Administrator Software License Trends Browsers Permissions Language Books Devices Security Cameras Threats Electricity Printing Troubleshooting Fraud Tactics User Tip Proactive Maintenance Supercomputer Video Conferencing Entrepreneur Analytic Virtual Machine Adminstration Music Pirating Information Worker HIPAA Recycling Solutions switches Leadership Writing Communitications Environment Best Practives UTM Content Navigation Reading Samsung Supply Chain Management Competition Legislation Error eCommerce Upgrades cache Television Electronic Payment IT Plan Enterprise Resource Planning Data Analysis Product Reviews Employees Accountants A.I. GDPR Read Managing Risk WannaCry G Suite Business Owner Microserver email scam Addiction SQL Server LiFi Employer Employee Relationship Internet Service Provider Tech Hypervisor Corporate Profile IP Address Time Management Freedom of Information Hacks Physical Security IT Assessment Relocation Tablets Remote Working Application Wireless Headphones Device Management Holidays Deep Learning Assessment SharePoint Banking Botnet Get More Done Human Resources Migration Connected Devices Fileless Malware Hybrid Cloud Work/Life Balance Equifax Fleet Tracking Content Management Modem Strategy Google Calendar Sync Turn Key Network Management Proxy Server Business Managemenet Azure Upselling Visible Light Communication Tip of the week Printer Server MSP Term Video Surveillance VoIP Electronic Medical Records Transportation IT consulting Touchscreen News Notifications CCTV Electronic Health Records Trojan Device security Capital Personal Information Productuvuty Managing Stress Financial Regulation Printers CrashOverride 3D Printing

toner1