facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Phishing Attacks and How to Avoid Them

Phishing Attacks and How to Avoid Them

Phishing attacks are the bane of modern businesses, and any organization’s employees need to be cognizant of the threat they pose. Unfortunately, no matter how much you protect against them, hackers are usually crafty enough to work their way around even the most well-defended security measures. However, not even the best security measures can keep your employees from making a split-second decision to click on a link or download an infected attachment.

0 Comments
Continue reading

Google Play Works to Reduce Ad-Fraud

Google Play Works to Reduce Ad-Fraud

What’s a smartphone without some apps to download to it? With millions of apps to choose from, developers might often have less-than-virtuous motives that put their users at risk for their own benefit. Recently, Google has removed 22 apps from the Google Play Store that were found to contain automated click-fraud scripts. We’ll delve into what these developers were up to with these fraudulent applications, as well as how they would affect the two-million users that downloaded them.

0 Comments
Continue reading

A Look at this Year’s Worst Cybercrimes

A Look at this Year’s Worst Cybercrimes

It’s fair to say that today's organizations are faced with more online threats than ever before. To properly manage the information systems that they depend on for productivity, redundancy, and operational management, they need to ensure that they are doing what they need to do to mitigate problems stemming from the continuous flow of threats.

0 Comments
Continue reading

Surveying the Damage of Meltdown and Spectre

Surveying the Damage of Meltdown and Spectre

At the time of this writing, it has only been about a half a year since the Meltdown and Spectre exploits became public knowledge. Fortunately, patches were swiftly rolled out to mitigate the problems that these exploits could cause, but that doesn’t mean that these exploits are dead and buried. Let’s look back at Meltdown and Spectre to help us establish where we stand today.

0 Comments
Continue reading

Email Malware is the New Schrӧdinger’s Cat

Email Malware is the New Schrӧdinger’s Cat

There is a famous thought experiment devised by physicist Erwin Schrӧdinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrӧdinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security.

0 Comments
Continue reading

20-Year-Old Exploit Finds New Life as ROBOT

20-Year-Old Exploit Finds New Life as ROBOT

There is no shortage of threats on the Internet, from situational issues to deliberate attacks meant to damage your company or steal your valuable data. While new threats pop up almost every day, some have been around for some time--so long, that many seem to not consider them as viable threats.

0 Comments
Continue reading

A DDoS Attack Hits Your Productivity and Profits

A DDoS Attack Hits Your Productivity and Profits

How quickly could your business recover if it were suddenly hit by a Distributed Denial of Service, or DDoS, attack? Are you protected against the effects they could have on your operations? If asked these questions, most businesses should want to say yes, but in reality, over half lack the means to defend against DDoS.

0 Comments
Continue reading

What It Means To Disinfect Your Computer

What It Means To Disinfect Your Computer

We have no problem going on the record as saying that there are more than enough strains of malware to go around. As such, it’s important that you know what to do if your workstation is struck by an infection.

0 Comments
Continue reading

Lowlife Ransomware Hackers Now Asking for More Than $1k Per Attack

Lowlife Ransomware Hackers Now Asking for More Than $1k Per Attack

Ransomware remains a very real threat, and is arguably only getting worse. Attacks are now able to come more frequently, and there are opportunities for even relative amateurs to level an attack against some unfortunate victim. However, this is not to say that there is nothing you can do to keep your business from becoming another cautionary tale.

0 Comments
Continue reading

Don’t Assume Your New Device is Free of Malware

Don’t Assume Your New Device is Free of Malware

Imagine that, despite the extreme care you took to avoid threats from infecting your devices, they turned out to be infected anyway. However, what if the device had been infected before you had even gotten your hands on it?

0 Comments
Continue reading

This Malware Only Needs 2 Minutes to Turn a Security Camera Into a Zombie

This Malware Only Needs 2 Minutes to Turn a Security Camera Into a Zombie

There are billions of devices that now connect to the Internet, even devices that may seem to not have any practical reason to do so. However, there is a new type of malware that uses these devices to perform attacks on the networks of all types of organizations: Mirai.

0 Comments
Continue reading

Don’t Overlook Internal Threats as You Safeguard Your Network From External Ones

Don’t Overlook Internal Threats as You Safeguard Your Network From External Ones

Doing business on the Internet is a dangerous gambit, and not one which should be taken lightly. Every small business uses some kind of sensitive information that is valuable to hackers. Most think that preventative measures are enough to ensure their security, but the fact remains that only through threat detection and elimination can you guarantee that all issues are promptly handled.


The threats to your organization’s infrastructure are numerous and plentiful, and while some will make themselves known immediately, others will hide in plain sight. These threats are designed to either leak information or provide new outlets for hacking attacks. Regardless, it’s important to identify attacks that have weaseled their way through your defenses before they have been around long enough to cause damage.

Breaches are Inevitable
To truly understand how threat detection is just as important as threat prevention, you need to come to grips with the worst-case scenario. It’s not an uncertainty that you’ll be hacked at some point--in fact, it’s very likely, and as such, you need to make sure that you’re prepared for any and all situations, including a data breach. Even large organizations and enterprises that pride themselves on security can experience data breaches. Consider the high-profile hacks of Sony and the United States Office of Personnel, as well as the health care provider Excellus BlueCross BlueShield. If these organizations had anticipated data breaches, perhaps they may have been able to prevent them--or at least mitigate the damage.

This is why you absolutely need to expect the worst in order to keep it from happening. While preventative solutions can help, it’s also imperative that you implement ways to detect intrusions, as well as ways to eliminate threats. Only then can you be ready to tackle any and all threats that want to hurt your business.

What You Can Do
CIO recommends what they call a preventative “triad” of sorts. This includes protection, detection, and reaction. You’ll need both security solutions like a firewall, and monitoring tools that allow you to check (and eject) threats from your network.

Computerware can get your business started with solutions designed to mitigate threats and prevent infections in the first place. A Unified Threat Management (UTM) solution provides a firewall, antivirus, spam blocker, and content filter, which is a great way to keep threats from accessing your network. Furthermore, we also offer a Remote Monitoring and maintenance (RMM) tool that can help our technicians keep an eye on your network for any discrepancies or inefficiencies.

To learn more, reach out to us at (703) 821-8200.

0 Comments
Continue reading

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

A previously known malware called Ghost Push now has a component that has caused countless problems for over a million Android users. This component, called Gooligan, is the source of the trouble, and it adds to this chaos by infecting over 13,000 new devices every day.

0 Comments
Continue reading

5 Steps Every Business Can Take to Avoid Ransomware

5 Steps Every Business Can Take to Avoid Ransomware

Ransomware is a dangerous online entity that continues to cause problems for businesses of all sizes. Thanks to its ability to encrypt workstations and even entire networks, ransomware has made its way to the top of the threat food chain, and it’s your responsibility to protect your business from it. Since infections are (more or less) impossible to remove, your best option is to prevent infections from happening in the first place.


Here are five of the best practices you need to keep in mind to protect your business from ransomware.

Have a Data Backup and Disaster Recovery Solution
If your business is struck with ransomware, the only reliable way to resolve the problem is to restore a data backup. The reasoning is simple; while you could pay for the decryption key, you would only be further funding their ransomware campaigns, and there’s no guarantee that the decryption key will work in the first place. You’re better off not taking the risk and just restoring a backup… assuming you have one.

Set a Routine for Scheduled Backups
You’ll want your backup and disaster recovery solution to be able to restore your data as close as possible to the point of incident. Computerware has a BDR solution available that can create backups of your data as often as every fifteen minutes. This is crucial if you want to ensure that your data recovery process is sound.

Educate Your Employees About Phishing Scams
Keeping your team in-the-know of how to avoid phishing scams and identify threats is a good step to take for any and all security risks. Teach them not to download unsolicited attachments or click on suspicious links. It also helps to remind them to look for signs of phony email domains, spelling errors, and other irregularities.

Regularly Update Your Software Solutions
The latest patches and security updates can go a long way toward keeping your organization from experiencing hacking attacks. As such, ransomware works the same way. Keep comprehensive security solutions on-hand that can keep phishing attacks from hitting your email inbox in the first place.

Keep Corporate Data Separate From Personal Data
If you have corporate data that’s stored on your in-house workstations, you’ll want to keep it separate from data that’s stored on employee mobile devices. If you use laptops or smartphones to work remotely, this can be challenging. You should stress that employees keep these two types of information as separate as possible. One way to do this is by storing corporate data in a cloud environment, so that employees don’t have to store it on their mobile devices at all.

The best way to guarantee your business’s assets aren’t being put at risk is to keep ransomware from happening in the first place. Take the time to reinforce your infrastructure and educate your team, and you might be surprised by the results. To learn more about how to do this, reach out to us at (703) 821-8200.

0 Comments
Continue reading

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

There are countless threats out there that can mean danger for your business, but one of the most innovative to date utilizes a malicious Twitter account to administer commands to a botnet made up of infected Android devices. In fact, this is widely considered the first threat to actively use a social network in this manner, making it a wake-up call for security professionals and social media users alike.

0 Comments
Continue reading

Did You Know Early Ransomware Spread via Floppy Disk?

Did You Know Early Ransomware Spread via Floppy Disk?

Ransomware might be a relatively new player in the battle for the Internet, but its short history shouldn’t belittle the damage that it can do to both businesses and users of personal computers. Perhaps you’ve had the misfortune to encounter it for yourself, and your files were locked down because of it. Regardless, ransomware is now a prevalent part of the online crime scene, and people are using it to extort money from innocent users, making it a considerable threat.

0 Comments
Continue reading

When Pyramid Scheme Meets Ransomware

When Pyramid Scheme Meets Ransomware

First hackers created a formidable ransomware. Then, when word got out about how to avoid this ransomware, they began to bundle a second ransomware to create an encryption catch-22. Now, the developers of the Petya and Mischa ransomware have adopted a Ransomware-as-a-Service model and have opened their nefarious malware up to distribution.

0 Comments
Continue reading

A Classic Example of Why You Should Only Allow Trusted Apps to Access Your Data

A Classic Example of Why You Should Only Allow Trusted Apps to Access Your Data

If your employees are given an Android device to use for work, or if they bring in their own as a part of a Bring Your Own Device strategy, you may want to pay special attention to what follows.

0 Comments
Continue reading

Scammers Use Whaling Attack Emails to Pose as “Big Fish”

  Authentication required.

This is a password protected blog, please kindly enter the password into the password field below to view the blog.

Ransomware Hit PC Users for $325 Million in 2015 Alone

b2ap3_thumbnail_randomware_issues_400.jpgOf the many types of malware in the online environment, few are as dangerous as the notorious ransomware. As a threat that’s capable of instantaneously locking down your files and preventing you from accessing them, hackers will add insult to injury by demanding a ransom for the safe return of your files. How can your business prevent this growing threat from setting its sights on your assets?

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Network Security Business Email Hosted Solutions Saving Money Malware IT Services Efficiency Google IT Support Small Business User Tips Computer Smartphones Innovation Mobile Devices Quick Tips Business Continuity Gadgets Microsoft Office Network VoIP Disaster Recovery Productivity Android Data Backup Social Media Mobile Office Collaboration Communication Virtualization Server Smartphone Mobile Device Management communications Upgrade Data Recovery Miscellaneous Windows 10 Tech Term Cybersecurity IT Support Ransomware Unified Threat Management Phishing Windows Holiday Operating System Passwords Remote Monitoring Facebook Vendor Management BYOD Remote Computing Apps Mobile Computing Automation Analytics Managed IT services BDR Users WiFi Data Management Apple Marketing Outsourced IT Mobile Device Internet of Things The Internet of Things Artificial Intelligence Firewall History Alert App Managed IT Services Browser Save Money Big data Cloud Computing Encryption IT Consultant Windows 10 Office Content Filtering Office 365 Going Green Spam Maintenance Printer Two-factor Authentication Gmail Bandwidth Bring Your Own Device Health Antivirus Cost Management Outlook Windows 8 Information Technology Lithium-ion Battery Training Best Practice Budget Hiring/Firing Virus Tech Support Business Technology Hard Drives Help Desk Managed IT Wireless Technology Saving Time Cybercrime Search Travel Education Hacking Update Healthcare Access Control IBM Money Document Management It Management Blockchain Recovery Employer-Employee Relationship Computers VPN Phone System Intranet Twitter Legal Networking Information iPhone Risk Management Regulations Save Time SaaS Humor File Sharing Customer Service Law Enforcement Applications Augmented Reality Hard Drive PowerPoint Government Proactive IT Compliance Managed Service Mobility Website Running Cable Data storage Administration Data Breach Laptop Current Events Business Growth Value Password Cortana Digital Avoiding Downtime Project Management Telephony Hacker Websites Management Machine Learning Paperless Office Fax Server Vulnerabilities Telephone Systems Sports Business Intelligence Disaster Excel User Digital Payment Computing Hosted Solution End of Support Router Downtime Social Robot Customer Relationship Management Wireless Data Security Securty Comparison Tablet Google Maps DDoS Company Culture Computer Repair Patch Management Solid State Drive Data Loss Social Engineering Social Networking Scam Black Market Flexibility Word Retail Cryptocurrency How To eWaste Google Docs Monitoring Experience User Error Download Evernote Co-managed IT Private Cloud Inbound Marketing Monitors Streaming Media Virtual Assistant Cleaning Office Tips Start Menu Tech Terms Microchip Taxes Processors Lifestyle Distributed Denial of Service USB Net Neutrality Mobile Technology YouTube Pain Points Chrome Presentation Cooperation Software as a Service Unified Communications Settings Vendor Uninterrupted Power Supply Public Cloud Virtual Desktop Specifications Safety Vulnerability Identity Theft Computer Accessories Bitcoin Documents Data Protection Windows 7 IT service Heating/Cooling Trending Gaming Console Distribution Entertainment Virtual Reality Mouse Politics Storage Webcam Emails Bluetooth Text Messaging Conferencing Automobile Chromebook Statistics Programming Computing Infrastructure Hack Network Congestion Voice over Internet Protocol Redundancy Proxy Server VoIP Thin CLient UTM Content Rental Service Meetings Public Speaking Modem Touchscreen News Visible Light Communication Memory 3D Ebay Knowledge Smart Phones IT Plan Enterprise Resource Planning Web Server Shortcut Term Consultation IT consulting Legislation Error Cabling Electronic Medical Records email scam Addiction Wi-Fi Administrator Entrepreneur Recycling Directions Technology Tips Webinar Accountants A.I. Books Workers Troubleshooting Analytic Recording Environment Dark Web Audit CIO Leadership Multi-factor Authentication Supercomputer HIPAA Product Reviews SSID Fake News Advertising Flash Adminstration Pirating Information Read Health IT Staffing Google Wallet Migration Connected Devices Competition Processing Data Warehousing Windows XP Wireless Headphones Telephone Worker Electronic Payment Society Network Management Managed IT Service Access Displays Equifax Fleet Tracking Reading Samsung Business Owner Logistics Emergency Hard Drive Disposal G Suite Device Management Bookmark Computer Care Micrsooft Device security MSP Employer Employee Relationship IP Address Microsoft Excel Human Resources Content Management Drones Best Practives Desktop Finance Hacks Physical Security Application Business Managemenet Google Play Google Drive Windows Server 2008 Nanotechnology Social Network Licensing Business Cards Service Level Agreement Banking Botnet Processor Spyware Mobile Payment Upselling Startup Asset Tracking Relocation Tablets Microsoft 365 Unified Threat Management Video Surveillance Backup and Disaster Recovery Sync online Currency Browsers Electricity Printing Username Medical IT Permissions Language Microserver User Tip Saving ZTime Gamification Notifications CCTV Digital Signature Security Cameras Screen Reader Customer Resource management Music Get More Done Piracy Upload Business Metrics Computer Malfunction Teamwork LinkedIn Navigation cache Television switches Writing Smart Tech Reliable Computing Solutions Fiber-Optic Debate Database In Internet of Things Data Analysis WannaCry Downloads Upgrades Printer Server Harddrive HTML Professional Services Turn Key PDF Archive Corporate Profile Trojan Mobile Security Skype GDPR Time Management Freedom of Information LiFi GPS Telephone System External Harddrive Software License Trends Motion Sickness Best Available Keyboard Tech Assessment SharePoint Organize Multi-Factor Security Cost Scalability Integration Fraud Tactics Fileless Malware Google Calendar Deep Learning Devices Messenger Tracking Domains Point of Contact Tip of the week Work/Life Balance Transportation 3D Printing Capital Productuvuty Printers Managing Stress CrashOverride Regulation

toner1