facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybersecurity Awareness in Retail

Cybersecurity Awareness in Retail

Cybercrime is at a record high and today’s businesses are the ones that take the brunt of the issues. For the retail business, cybersecurity has a couple of different faces. For Cybersecurity Awareness Month, we thought we’d talk a little bit about the retail space and how businesses are securing their customers’ information. 

0 Comments
Continue reading

Tip of the Week: Network Security Basics

Tip of the Week: Network Security Basics

The modern threat landscape is filled with horror stories of people that have been the victim of software vulnerabilities, hackers, and situations that could have been managed differently. Today, we will go over some of the best ways to keep your business from being a victim of a data breach, data theft, or malware attack.

0 Comments
Continue reading

Ransomware Revisited

Ransomware Revisited

Ransom: a sum of money is demanded in order for the release of goods.
Software: the programs and other operating information used by a computer.

What do you get when you combine the two? Ransomware. 

0 Comments
Continue reading

Opening the Cybercriminal Toolbox

Opening the Cybercriminal Toolbox

People’s exposure to cybercrime has been increasing for some time. Today, people with very little coding experience can infiltrate systems and steal data. There is demand for data, and now there is a supply of low-cost--or even free--hacking tools available on the dark web that allows people to get closer to that data. In fact, according to a report by Deloitte entitled Black Market Ecosystem: Estimating the Cost of “Pwnership”, there is a complete economy built around these readily-available hacking tools that are relatively easy to use.

0 Comments
Continue reading

Diagnosing a Man-In-the-Middle Attack

Diagnosing a Man-In-the-Middle Attack

The man in the middle has a lot of power and influence over the end result, and this is true even in the technological world. In fact, there are attacks dedicated to this vector, twisting and turning something that your organization needs into what amounts to a threat. We’ll discuss what a Man-in-the-Middle (MitM) attack is, as well as what you can do to combat these threats.

0 Comments
Continue reading

Passwords Hold Everything Together

Passwords Hold Everything Together

Passwords are often all that stands between hackers and account information; this is true for both personal and business data. However, passwords are often not enough to protect data from the clutches of hackers. We’ll walk you through how to ensure your organization implements only the most powerful of passwords, as well as additional security measures to guarantee maximum protection.

0 Comments
Continue reading

Protect Your Reputation with Solid Network Security

Protect Your Reputation with Solid Network Security

Your organization needs to take network security as seriously as possible. While it might seem tempting to just implement security solutions and hide behind them, thinking you’re safe, it’s much more important that you invest time and consideration into your organization’s culture. We’ll walk you through how you can minimize threats to your network, as well as provide a primer for what to expect from comprehensive enterprise network security solutions.

0 Comments
Continue reading

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

0 Comments
Continue reading

Make Sure Your Staff Understands How Data Disasters Come to Be

Make Sure Your Staff Understands How Data Disasters Come to Be

Disasters lurk around every corner in the workplace, even on an end-user level. All employees of a business should understand how to identify specific office disasters and what to do when they are encountered. We’ll discuss some of the most common (and deceptive) disasters, as well as how your team should handle them on the off chance they show themselves.

0 Comments
Continue reading

SIEM Can Remove Some Big Headaches

SIEM Can Remove Some Big Headaches

Properly handling cybersecurity is extremely important for individuals and businesses, alike, but if you are an organization that has to meet external compliance mandates, it could be a major cost for a business that has a tendency be a target for nefarious outside entities. How many times can businesses get hacked before they take network security seriously? The answer is usually one. Prior to their first hack, most small businesses implore a “we’re too small to worry about it” strategy, but after (if there is an after), security is a major priority.

0 Comments
Continue reading

The Marriott Hack Exposes 500 Million People

The Marriott Hack Exposes 500 Million People

It’s nice to get away every now and then, but if you have stayed at any property under the Marriott umbrella, including St. Regis, Westin, Sheraton, or W hotel since 2014, there is a good chance that your personal information has been leaked, a spokesperson from parent company Marriott has said. They said the multinational hotel corporation will begin emailing users impacted by the leak in the coming days.

0 Comments
Continue reading

Phishing Attacks and How to Thwart Them

Phishing Attacks and How to Thwart Them

For twenty years, hackers have tried to breach organization’s networks by finding or breaking holes in the network’s perimeter, or in exposed servers. This led to the cybersecurity industry creating software designed specifically to stop these threat actors in the act. This, in essence, created a situation where the perimeter of an organization’s network was extremely hard to breach. The problem was that as soon as something was able to get through the outer defenses, there was no end to the devastation a hacker could cause inside a network.

0 Comments
Continue reading

Tip of the Week: Ward Off Holiday Scammers

Tip of the Week: Ward Off Holiday Scammers

It’s the most wonderful time of the year… for scammers, that is. These kinds of criminals love to take advantage of the gift-giving season. With the right tools for the job, hackers can have a field day stealing sensitive information, like credit card numbers, due to the sheer amount of stuff being purchased by consumers. It’s up to you to stay vigilant and make sure you’re not being scammed, but we have a couple of tricks you can use to stay as safe as possible.

0 Comments
Continue reading

Why Protecting Your Google Account Should Be a Priority

Why Protecting Your Google Account Should Be a Priority

Your Google account is one of your most important assets, regardless of whether you’re a business professional or a casual user. The tricky part of using Google, however, is to make sure that you’re using this asset safely. By securing your account and valuing your Google account credentials, you can make sure your account stays safe.

0 Comments
Continue reading

Tip of the Week: Improvement Needed to Avoid Cybercrime

Tip of the Week: Improvement Needed to Avoid Cybercrime

Did you know that almost 90 percent of small business owners feel they are completely safe from attack? It’s unfortunate, but the truth of the matter is that half of these businesses will eventually be proven wrong--they too can suffer from a cyberattack. Are you going to risk becoming one of them? You should know now that there is no reason to.

0 Comments
Continue reading

How to Thwart Targeted Phishing Attacks

How to Thwart Targeted Phishing Attacks

Modern businesses rely on email as a central part of their communications infrastructure, but this comes with its own set of threats and issues that can derail operations. Spam in particular is troublesome for organizations to deal with, as it wastes time and exposes your users to danger. While spam can be blocked, more dangerous types of messages can make their way past your defenses. These types of threats are known as phishing scams, and they present a considerable threat to your organization.

0 Comments
Continue reading

A Look at this Year’s Worst Cybercrimes

A Look at this Year’s Worst Cybercrimes

It’s fair to say that today's organizations are faced with more online threats than ever before. To properly manage the information systems that they depend on for productivity, redundancy, and operational management, they need to ensure that they are doing what they need to do to mitigate problems stemming from the continuous flow of threats.

0 Comments
Continue reading

Is Antivirus Software Important?

Is Antivirus Software Important?

Modern organizations have a lot of threats that they need to secure themselves from. This is not something that you can ignore, as the slightest fault in your network security could usher in much more dangerous threats. If you haven’t implemented some of the most basic security solutions out there, you’re needlessly putting your business’ future on the line. We’re here to help make sure you don’t do that.

0 Comments
Continue reading

Hackers Continuously Target Major Sporting Events

Hackers Continuously Target Major Sporting Events

Sports are a very popular thing around the world, which means that these athletic contests gather many fans to them. In turn, this means that these events are chock full of potential targets for a hacking attack. Today, we’ll examine the assortment of hacks that have taken place around sporting events.

0 Comments
Continue reading

Your Employees Are Your Biggest Cybersecurity Risk

Your Employees Are Your Biggest Cybersecurity Risk

If we asked you to identify the biggest risk to your business’ network security, what would you think it would be? Some might think that the countless threats on the Internet are the biggest issues your organization will have to deal with, while others might think natural disasters represent the biggest problem for your business. Many others, however, see the end user as the biggest threat to their business, and they are right… to an extent.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Hackers Data Hardware Microsoft Workplace Tips Backup Network Security Managed Service Provider Productivity Business Hosted Solutions Email Malware Saving Money IT Services Efficiency Computer IT Support Google Productivity User Tips Small Business Innovation Smartphones Mobile Devices Quick Tips Data Backup Microsoft Office Business Continuity Gadgets VoIP Social Media Collaboration Data Recovery Network Disaster Recovery Android Upgrade Mobile Office Server communications IT Support Virtualization Communication Miscellaneous Mobile Device Management Smartphone Phishing Cybersecurity Ransomware Windows Tech Term Windows 10 Apps Facebook Operating System Holiday Vendor Management Unified Threat Management Outsourced IT Automation Remote Monitoring Passwords BDR Analytics Users BYOD Remote Computing Managed IT services Mobile Computing Mobile Device Internet of Things WiFi Managed IT Services Marketing Data Management The Internet of Things Artificial Intelligence Apple Firewall History Browser Save Money Alert App Big data Spam Office 365 Help Desk Two-factor Authentication Cloud Computing IT Consultant Encryption Going Green Business Technology Maintenance Bring Your Own Device Printer Antivirus Gmail Windows 10 Bandwidth Health Office Cybercrime Content Filtering Information Technology Cost Management Windows 8 Outlook Hiring/Firing Hard Drives Training Budget Wireless Technology Computers Tech Support Saving Time Virus Search VPN Managed IT Information Government Employer-Employee Relationship Best Practice Lithium-ion Battery Hacking Networking It Management IBM Money Managed Service Document Management Blockchain Customer Service Travel Education Recovery Update Phone System Healthcare Retail Access Control Legal Save Time Applications Downtime Hacker Regulations Augmented Reality PowerPoint Data Loss Running Cable Proactive IT Humor SaaS File Sharing Administration Hard Drive Law Enforcement Intranet Twitter Compliance Mobility Website Data storage Avoiding Downtime Current Events iPhone Risk Management Password Value Excel Digital Payment Router Windows 7 Telephony Data Security Machine Learning Fax Server Customer Relationship Management Paperless Office Telephone Systems Patch Management Comparison Tablet Company Culture Sports Computer Repair Disaster User Scam Computing Hosted Solution End of Support Social Networking Social Robot Monitoring Data Breach Wireless Securty Google Maps DDoS Digital Project Management Solid State Drive Websites Management Storage Social Engineering Black Market Flexibility Vulnerabilities Cryptocurrency Word Laptop Private Cloud Cortana Business Growth Business Intelligence Cleaning Wi-Fi Bitcoin Monitors Office Tips Data Protection Processors Computer Accessories Distribution Microchip Taxes Lifestyle Downloads Distributed Denial of Service USB YouTube Unified Communications Settings Conferencing Trending Presentation Gaming Console Public Cloud Licensing Mouse Specifications Safety Text Messaging Voice over Internet Protocol Virtual Desktop Redundancy Webcam Programming Identity Theft Statistics Network Congestion Documents Evernote IT service Entertainment Teamwork Heating/Cooling Virtual Assistant Virtual Reality Politics Bluetooth Streaming Media Automobile Inbound Marketing Emails Start Menu Tech Terms Managed IT Service Mobile Technology Chromebook Computing Infrastructure Hack Cooperation Software as a Service Memory How To eWaste Co-managed IT Google Docs Net Neutrality Vendor User Error Uninterrupted Power Supply Pain Points Processor Experience Chrome Download Vulnerability Troubleshooting Electricity Printing Username Content Management Administrator Medical IT Entrepreneur Unified Threat Management Backup and Disaster Recovery Business Managemenet Books Workers Browsers Advertising Flash Gamification Security Cameras Environment CIO Screen Reader Customer Resource management Supercomputer User Tip Proactive Maintenance HIPAA Upselling Worker Navigation Virtual Machine Electronic Payment cache Television Video Surveillance Staffing Google Wallet Smart Tech online Currency Solutions Competition Windows XP Piracy Upload Data Analysis Employees Business Owner WannaCry Society HTML Professional Services Saving ZTime Displays Fiber-Optic Database Reading Samsung Mobile Security G Suite GDPR Time Management Freedom of Information Micrsooft Telephone System LinkedIn Employer Employee Relationship SQL Server Best Practives IP Address Corporate Profile Trends Tech Hypervisor Human Resources Assessment SharePoint Debate Drones Multi-Factor Security Cost Hacks Physical Security Integration Application Harddrive Software License Relocation Tablets Fileless Malware Hybrid Cloud Google Calendar GPS Devices Archive Banking Botnet Microserver Tip of the week Fraud Tactics Skype Permissions Language UTM Content Sync Modem Touchscreen External Harddrive News Proxy Server Azure VoIP IT Plan Enterprise Resource Planning Point of Contact Term Managed Services Provider Consultation Legislation Error Notifications CCTV Electronic Medical Records Transportation Digital Signature Get More Done Knowledge Reliable Computing Directions Display Printer Server Technology Tips 3D Ebay Music Accountants A.I. Business Metrics Computer Malfunction Recording Turn Key Thin CLient switches Writing email scam Addiction Audit Multi-factor Authentication In Internet of Things SSID Smart Phones Fake News Upgrades Dark Web Free Resource Trojan LiFi Migration Connected Devices Analytic Processing PDF Organize Data Warehousing Wireless Headphones Recycling Telephone Health IT Employee/Employer Relationship Scalability Wasting Time Access Adminstration Pirating Information Equifax Fleet Tracking Motion Sickness Logistics Best Available Keyboard Emergency Hard Drive Disposal Leadership Network Management Product Reviews Computer Care Work/Life Balance Device security MSP Read Microsoft Excel Deep Learning Messenger Tracking Bookmark Domains Visible Light Communication Desktop Finance Google Play Google Drive Windows Server 2008 Nanotechnology Social Network Rental Service Meetings Employer/Employee Relationships Public Speaking Cabling Managing Costs Webinar Spyware Mobile Payment Startup Device Management Asset Tracking Web Server Microsoft 365 Shortcut IT consulting Business Cards Service Level Agreement Financial Managing Stress Printers CrashOverride Regulation Capital Managed Services Productuvuty Personal Information 3D Printing

toner1