facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Let Employee Access Doom Your Company

Don’t Let Employee Access Doom Your Company

When it comes to protecting your business, cybersecurity is a huge consideration that must be kept in mind. However, it isn’t the only consideration. Some of the biggest threats to your business can actually come from your own team. Let’s go over the three kinds of insider threats that you need to be on your guard against, and how to avoid them.

0 Comments
Continue reading

Train your Staff on These 4 Security Strategies

Train your Staff on These 4 Security Strategies

Millions of people find themselves sitting in front of a computer moving files around and corresponding with people over the phone, through email, or updating info in the company’s line of business app. What many of them don’t know, however, is that, at any time, they are only a couple of clicks away from causing major problems for their company. Therefore, it is extremely important to train your staff on what to look for and how to address those situations when they do arise.

0 Comments
Continue reading

Who Can You Trust to Keep Your Data Safe?

Who Can You Trust to Keep Your Data Safe?

As business owners, with so much talk about cybersecurity and all of the threats that face us, we tend to put a lot of faith in the security investments we make. I say we, because an IT company has to be as protected, if not more, than their most demanding client. I’m going to talk shop a little bit about security, and some major concerns that I have in regard to all of our businesses.

0 Comments
Continue reading

4 Key Steps to Better Cybersecurity

4 Key Steps to Better Cybersecurity

In many ways, explaining why sufficient cybersecurity is important for your business has become redundant - especially when it is much more important to understand how this cybersecurity needs to protect you. The threats to data and privacy are known, but no less potent. In order to counter them, you need to make sure you have what you need to protect your business - starting with a few key considerations.

0 Comments
Continue reading

Even If You Don’t Hear About Small Business Breaches, They Happen

Even If You Don’t Hear About Small Business Breaches, They Happen

If you have a bank account or a credit card, chances are you’ve been made aware of a hack or a data breach. Big organizations are more frequently being breached, forcing them to run damage control for the often millions of customers affected. News coverage often bashes these big organizations, but what about smaller ones? The truth is, smaller businesses are breached just as often, with the consequences being just as severe. 

0 Comments
Continue reading

Cybersecurity Awareness in Retail

Cybersecurity Awareness in Retail

Cybercrime is at a record high and today’s businesses are the ones that take the brunt of the issues. For the retail business, cybersecurity has a couple of different faces. For Cybersecurity Awareness Month, we thought we’d talk a little bit about the retail space and how businesses are securing their customers’ information. 

0 Comments
Continue reading

Tip of the Week: Network Security Basics

Tip of the Week: Network Security Basics

The modern threat landscape is filled with horror stories of people that have been the victim of software vulnerabilities, hackers, and situations that could have been managed differently. Today, we will go over some of the best ways to keep your business from being a victim of a data breach, data theft, or malware attack.

0 Comments
Continue reading

Ransomware Revisited

Ransomware Revisited

Ransom: a sum of money is demanded in order for the release of goods.
Software: the programs and other operating information used by a computer.

What do you get when you combine the two? Ransomware. 

0 Comments
Continue reading

Opening the Cybercriminal Toolbox

Opening the Cybercriminal Toolbox

People’s exposure to cybercrime has been increasing for some time. Today, people with very little coding experience can infiltrate systems and steal data. There is demand for data, and now there is a supply of low-cost--or even free--hacking tools available on the dark web that allows people to get closer to that data. In fact, according to a report by Deloitte entitled Black Market Ecosystem: Estimating the Cost of “Pwnership”, there is a complete economy built around these readily-available hacking tools that are relatively easy to use.

0 Comments
Continue reading

Diagnosing a Man-In-the-Middle Attack

Diagnosing a Man-In-the-Middle Attack

The man in the middle has a lot of power and influence over the end result, and this is true even in the technological world. In fact, there are attacks dedicated to this vector, twisting and turning something that your organization needs into what amounts to a threat. We’ll discuss what a Man-in-the-Middle (MitM) attack is, as well as what you can do to combat these threats.

0 Comments
Continue reading

Passwords Hold Everything Together

Passwords Hold Everything Together

Passwords are often all that stands between hackers and account information; this is true for both personal and business data. However, passwords are often not enough to protect data from the clutches of hackers. We’ll walk you through how to ensure your organization implements only the most powerful of passwords, as well as additional security measures to guarantee maximum protection.

0 Comments
Continue reading

Protect Your Reputation with Solid Network Security

Protect Your Reputation with Solid Network Security

Your organization needs to take network security as seriously as possible. While it might seem tempting to just implement security solutions and hide behind them, thinking you’re safe, it’s much more important that you invest time and consideration into your organization’s culture. We’ll walk you through how you can minimize threats to your network, as well as provide a primer for what to expect from comprehensive enterprise network security solutions.

0 Comments
Continue reading

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

0 Comments
Continue reading

Make Sure Your Staff Understands How Data Disasters Come to Be

Make Sure Your Staff Understands How Data Disasters Come to Be

Disasters lurk around every corner in the workplace, even on an end-user level. All employees of a business should understand how to identify specific office disasters and what to do when they are encountered. We’ll discuss some of the most common (and deceptive) disasters, as well as how your team should handle them on the off chance they show themselves.

0 Comments
Continue reading

SIEM Can Remove Some Big Headaches

SIEM Can Remove Some Big Headaches

Properly handling cybersecurity is extremely important for individuals and businesses, alike, but if you are an organization that has to meet external compliance mandates, it could be a major cost for a business that has a tendency be a target for nefarious outside entities. How many times can businesses get hacked before they take network security seriously? The answer is usually one. Prior to their first hack, most small businesses implore a “we’re too small to worry about it” strategy, but after (if there is an after), security is a major priority.

0 Comments
Continue reading

The Marriott Hack Exposes 500 Million People

The Marriott Hack Exposes 500 Million People

It’s nice to get away every now and then, but if you have stayed at any property under the Marriott umbrella, including St. Regis, Westin, Sheraton, or W hotel since 2014, there is a good chance that your personal information has been leaked, a spokesperson from parent company Marriott has said. They said the multinational hotel corporation will begin emailing users impacted by the leak in the coming days.

0 Comments
Continue reading

Phishing Attacks and How to Thwart Them

Phishing Attacks and How to Thwart Them

For twenty years, hackers have tried to breach organization’s networks by finding or breaking holes in the network’s perimeter, or in exposed servers. This led to the cybersecurity industry creating software designed specifically to stop these threat actors in the act. This, in essence, created a situation where the perimeter of an organization’s network was extremely hard to breach. The problem was that as soon as something was able to get through the outer defenses, there was no end to the devastation a hacker could cause inside a network.

0 Comments
Continue reading

Tip of the Week: Ward Off Holiday Scammers

Tip of the Week: Ward Off Holiday Scammers

It’s the most wonderful time of the year… for scammers, that is. These kinds of criminals love to take advantage of the gift-giving season. With the right tools for the job, hackers can have a field day stealing sensitive information, like credit card numbers, due to the sheer amount of stuff being purchased by consumers. It’s up to you to stay vigilant and make sure you’re not being scammed, but we have a couple of tricks you can use to stay as safe as possible.

0 Comments
Continue reading

Why Protecting Your Google Account Should Be a Priority

Why Protecting Your Google Account Should Be a Priority

Your Google account is one of your most important assets, regardless of whether you’re a business professional or a casual user. The tricky part of using Google, however, is to make sure that you’re using this asset safely. By securing your account and valuing your Google account credentials, you can make sure your account stays safe.

0 Comments
Continue reading

Tip of the Week: Improvement Needed to Avoid Cybercrime

Tip of the Week: Improvement Needed to Avoid Cybercrime

Did you know that almost 90 percent of small business owners feel they are completely safe from attack? It’s unfortunate, but the truth of the matter is that half of these businesses will eventually be proven wrong--they too can suffer from a cyberattack. Are you going to risk becoming one of them? You should know now that there is no reason to.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Software Cloud Business Management Data Hackers Hardware Microsoft Workplace Tips Network Security Backup Managed Service Provider Business Hosted Solutions Productivity Email Malware IT Services Saving Money Efficiency Productivity Computer Google User Tips Innovation IT Support Small Business Smartphones IT Support Mobile Devices Data Backup VoIP Quick Tips Collaboration communications Network Business Continuity Gadgets Android Microsoft Office Data Recovery Upgrade Social Media Cybersecurity Mobile Office Server Disaster Recovery Communication Virtualization Smartphone Mobile Device Management Miscellaneous Phishing Holiday Ransomware Passwords Tech Term Windows Outsourced IT Vendor Management Operating System Windows 10 Unified Threat Management Apps Facebook Managed IT Services Internet of Things Remote Monitoring Mobile Device Automation BDR Apple Data Management Analytics Users Mobile Computing BYOD Remote Computing Managed IT services Windows 10 WiFi Marketing Artificial Intelligence History The Internet of Things Firewall Cloud Computing Browser Save Money Training Alert Help Desk Big data App Encryption Information Technology Office 365 Business Technology Two-factor Authentication Bandwidth IT Consultant Spam Hard Drives Content Filtering Windows 7 Going Green Office Maintenance Gmail Printer Bring Your Own Device Government Antivirus Health Cybercrime Managed IT Access Control Windows 8 Best Practice Outlook Lithium-ion Battery Computers Saving Time VPN Budget Managed Service Tech Support Virus Wireless Technology Recovery Search Employer-Employee Relationship Information Retail Cost Management Hiring/Firing Healthcare iPhone It Management Networking IBM Blockchain Data Loss Travel Augmented Reality Education Humor Customer Service Update Computing Project Management Phone System Money Document Management Hacking Hacker Computer Repair Running Cable Proactive IT File Sharing Legal Applications Hard Drive Patch Management Twitter Mobility Intranet Regulations Customer Relationship Management Conferencing Wireless PowerPoint Data Breach SaaS Risk Management Storage Website Administration Law Enforcement Save Time Downtime Compliance Solid State Drive Avoiding Downtime Data storage Value Current Events Password Cryptocurrency Company Culture Laptop Data Security Social Networking Business Growth Fax Server Excel Google Maps User Virtual Desktop Cooperation Paperless Office Social Vendor Scam Social Engineering Sports Disaster DDoS Meetings Hosted Solution End of Support Monitoring Digital Private Cloud Robot Business Intelligence Securty Websites Wi-Fi Telephony Digital Payment Word Management Machine Learning Router Vulnerabilities Voice over Internet Protocol Software as a Service Telephone Systems Cortana Comparison Tablet Black Market Flexibility Managed Services Provider Public Cloud Licensing Vulnerability Trending Pain Points Google Docs Mouse Bitcoin Memory Processors Data Protection Experience USB Identity Theft Cleaning Managed Services Programming Monitors Lifestyle Presentation Smart Devices Statistics Managed IT Service Downloads Network Congestion Office Tips Distribution Politics Virtual Reality Specifications Safety Emails Automobile YouTube Processor Gaming Console Streaming Media Redundancy Chromebook Unified Communications Settings Documents Teamwork Heating/Cooling Computing Infrastructure Hack Entertainment Text Messaging Evernote How To Webcam Download Virtual Assistant Net Neutrality Professional Services Chrome IT service Start Menu Tech Terms Multi-factor Authentication eWaste Mobile Technology Integration Telephone Microchip Taxes Inbound Marketing Computer Accessories Distributed Denial of Service Bluetooth Uninterrupted Power Supply Co-managed IT User Error Work/Life Balance Webinar Environment Term Desktop Finance Spyware Mobile Payment Deep Learning HIPAA Electronic Medical Records Transportation Nanotechnology Social Network IT Hacks Physical Security LinkedIn Display Business Cards Service Level Agreement Electricity Printing Relocation Tablets Competition Recording Optimization Startup Asset Tracking Banking Botnet Visible Light Communication Electronic Payment Directions Development Skype SSID How To Username Sync Archive IT consulting Business Owner Dark Web Free Resource Unified Threat Management Backup and Disaster Recovery Processing Gamification cache Television IP Address Health IT Employee/Employer Relationship Screen Reader Customer Resource management Notifications CCTV Wasting Time Upselling Piracy Upload WannaCry Reliable Computing Point of Contact CIO Application Logistics Virtual Machines Smart Tech Business Metrics Computer Malfunction Advertising Flash Human Resources Corporate Profile Video Conferencing Staffing Google Wallet Cyber security HTML Video Surveillance Time Management Freedom of Information In Internet of Things Windows XP Best Practives Bookmark Fiber-Optic Database Society Google Play Telephone Service Mobile Security Assessment SharePoint Displays Employer/Employee Relationships Saving ZTime Telephone System Communitications Managing Costs Software License Trends Google Calendar Scalability Analytic Micrsooft Digital Signature Microserver Microsoft 365 Multi-Factor Security Cost Recycling Tip of the week Motion Sickness VoIP Messenger Tracking Product Reviews Drones Medical IT Trend Micro Devices Debate Touchscreen News Browsers Harddrive Fraud Tactics IT Assessment Knowledge Rental Service Security Cameras Threats GPS UTM Content Consultation Read Get More Done User Tip Proactive Maintenance PDF Navigation Virtual Machine IT Plan Enterprise Resource Planning Technology Tips Cabling Turn Key Solutions External Harddrive Legislation Error Web Server Permissions Language Printer Server Addiction Audit Books Workers Best Available Keyboard eCommerce Accountants A.I. Device Management Fake News Administrator Trojan Data Analysis Employees email scam Electronic Health Records Supercomputer Business Managemenet Music Organize GDPR Managing Risk 3D Ebay Data Warehousing Content Management switches Writing Domains SQL Server Thin CLient Tech Hypervisor Migration Connected Devices Access Worker Upgrades Public Speaking Smart Phones Wireless Headphones Memes Emergency Hard Drive Disposal Network Management Computer Care Reading Samsung Shortcut Holidays Equifax Fleet Tracking Microsoft Excel online Currency LiFi Fileless Malware Hybrid Cloud Surveillance Employer Employee Relationship Entrepreneur Modem Strategy Adminstration Device security Pirating Information MSP Google Drive Windows Server 2008 G Suite Troubleshooting Proxy Server Azure Leadership 3D Printing Personal Information Managing Stress CrashOverride Regulation Financial Capital Printers Productuvuty

toner1