facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scam Claims to Have Compromising Video… of You

Scam Claims to Have Compromising Video… of You

Every business (and every individual, for that matter) needs to be wary of Internet scams and other online tricks. This is because those scammers are wily and have many means of finding a user in a compromising position… or so they claim in a recent scam.

0 Comments
Continue reading

Data Security Must Be a Priority for Your Organization

Data Security Must Be a Priority for Your Organization

After 143 million people had their personal information put at risk in the Equifax data breach, it comes as no surprise that data security is an even hotter topic than usual. As much as you’d like to think that a breach like that would never happen to your business, this is an unrealistic hope that won’t do you any good if the threat of a data breach does come around. It is much better to be prepared.

0 Comments
Continue reading

Tip of the Week: 4 Security Best Practices You Need to Implement Right Away

Tip of the Week: 4 Security Best Practices You Need to Implement Right Away

Cybersecurity for business contains many complexities that are often difficult to keep track of. If your organization takes a proactive approach to understanding and implementing cybersecurity best practices, you can dramatically increase the security of your organization’s network.

0 Comments
Continue reading

Nearly 50% of Data Stolen in 2015 Were Passwords and Email Addresses

b2ap3_thumbnail_stolen_data_400.jpgIn 2015, there was an incredible amount of information stolen from organizations all over the world. From healthcare companies to government institutions, nobody was safe from the endless onslaught of hacking attacks. Now, in the wake of these hackers’ destruction, it seems that most of the incidents in question exposed passwords and email address; important credentials that put many users’ security in jeopardy.

0 Comments
Continue reading

3 Ways to Augment Your Password Security Practices

b2ap3_thumbnail_security_in_your_hands_400.jpgData breaches grow ever more common, especially in the professional sector. In the wake of high-profile hack attacks like those that targeted Sony and Home Depot, businesses are finding it more important than ever to invest heavily on security procedures and practices. However, one of the consistently forgotten aspects of security best practices is the password.

0 Comments
Continue reading

Practical Biometric Passwords Infiltrate the US Military

b2ap3_thumbnail_biometric_security_400.jpgHumans are always striving to create the next big security measure against the massive wave of online threats. One topic consistently in discussion is biometrics as a security measure, which take advantage of unique biological aspects of users in order to maximize security. Now, the US military is seeing the value of this kind of technology, and they’re funding a campaign to make it available to users.

0 Comments
Continue reading

It Seems Sony Can’t Get a Break from IT Issues

b2ap3_thumbnail_protect_your_identity_400.jpgIt’s the holiday season… for everyone but Sony, at least. The tech/entertainment supergiant has been experiencing a ton of security issues lately. Last month, someone hacked into Sony’s databases and stole a lot of information (including unreleased movies, which were later released to the world). This December, it was revealed that Sony stored their passwords in a folder on their server titled “Passwords.”

0 Comments
Continue reading

Tip of the Week: How to Protect Your Business from 3 Common Disasters

b2ap3_thumbnail_protect_your_business_400.jpgIt doesn’t take much to disrupt your company’s network and cause downtime. Whether it’s from something major like a natural disaster, or something minor like forgetting your network login credentials, you need to have a plan in place that gets your network up and running as soon as possible. Here are three common scenarios that you need to plan for.

0 Comments
Continue reading

4 Tips to Stay Ahead of The Hackers' Wiley Ways

b2ap3_thumbnail_cloud_security_important_400.jpgCriminals sit in front of their computers trying to rip off your personal data out of the cloud using their mysterious hacking skills. You don't have to know the code of the hackers to successfully fend them off. Here are a four effective tips to keep your data in the cloud safe.

0 Comments
Continue reading

Make WiFi Passwords a Thing of the Past

b2ap3_thumbnail_wifi_security_400.jpgThe wireless router is something that has been around for a long time now, and you might still have yours from when you first got wireless Internet installed in your office. If this is the case, you owe it to yourself to upgrade to a newer model. Besides increasing the speed of your wireless connection, there are a few security benefits to updating your router.

0 Comments
Continue reading

The Heartbleed Aftermath

b2ap3_thumbnail_heartbleed_aftermath_400.jpgThe Heartbleed bug, one of the nastiest deficiencies in Internet security to date, was found last week. More than two-thirds of the Internet's secure information could have been leaked from websites utilizing the OpenSSL cryptographic library's encryption style. Most major websites have already issued a patch to resolve the problem, but that doesn't change the fact that this information has been available to anyone looking for it for over two years. Worse still is that you would have no idea how to tell whether your data has been compromised.

0 Comments
Continue reading

2 Million Stolen Passwords Recovered

b2ap3_thumbnail_pwrrrd400.jpgSecurity company Trustwave made a discovery last week that sent the online world into a frenzy. They recovered two million stolen passwords from 93,000 different websites. This password cache included user accounts from major companies like Facebook, LinkedIn, Google, Twitter, and Yahoo. Is your password part of this haul?

0 Comments
Continue reading

Hackers are Taking Advantage of Technology Improvements

b2ap3_thumbnail_PasswordSec400.jpgKeeping your network and data safe is extremely important. We advocate to our clients that they should come up with complex and unique passwords for each of their accounts. Account hackers have improved their methods, so in order to ensure that you aren't a victim of information theft or worse, diligence in the creation of your passwords is essential.

0 Comments
Continue reading

Prevent your Web Browser from Storing Passwords

For sites you need to log into often, having your browser remember your password can save you time logging in, especially if you are using secure passwords that you might need to look up otherwise. There are circumstances where you might want to manage what personal information gets stored in your web browser.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Network Security Business Email Malware Hosted Solutions Saving Money IT Services Efficiency IT Support Google Small Business User Tips Computer Smartphones Innovation Mobile Devices Quick Tips Business Continuity Gadgets Disaster Recovery Network VoIP Microsoft Office Android Social Media Productivity Data Backup Mobile Office Virtualization Collaboration Communication Server Smartphone Data Recovery Upgrade Mobile Device Management communications Miscellaneous Cybersecurity Tech Term IT Support Ransomware Windows 10 Unified Threat Management Windows Phishing Passwords Facebook Holiday Operating System Remote Monitoring Vendor Management Analytics Apps Automation BYOD Managed IT services Remote Computing Mobile Computing Users WiFi BDR Outsourced IT Internet of Things Marketing Apple The Internet of Things Data Management Mobile Device Firewall History Artificial Intelligence Alert Managed IT Services Browser App Save Money Cloud Computing Encryption Big data IT Consultant Bring Your Own Device Two-factor Authentication Bandwidth Antivirus Gmail Office Maintenance Printer Windows 10 Content Filtering Going Green Health Spam Office 365 Budget Help Desk Wireless Technology Saving Time Outlook Windows 8 Search Business Technology Managed IT Cybercrime Virus Tech Support Best Practice Information Technology Lithium-ion Battery Cost Management Hiring/Firing Training Hard Drives Access Control Computers It Management VPN Travel Blockchain Education Recovery Employer-Employee Relationship Update Hacking Money IBM Document Management Phone System Healthcare SaaS Running Cable PowerPoint Proactive IT File Sharing Customer Service Hard Drive Law Enforcement Administration Applications Twitter Intranet Managed Service Mobility Website Government Compliance Data storage Humor Risk Management iPhone Legal Save Time Networking Information Regulations Augmented Reality Computing Computer Repair Disaster User End of Support Social Networking Hosted Solution Social Robot Wireless Data Security Securty Fax Server Google Maps DDoS Patch Management Solid State Drive Data Loss Social Engineering Flexibility Scam Black Market Avoiding Downtime Retail Cryptocurrency Word Data Breach Laptop Business Intelligence Password Cortana Business Growth Value Project Management Digital Digital Payment Hacker Websites Router Excel Downtime Management Telephony Machine Learning Comparison Tablet Paperless Office Customer Relationship Management Vulnerabilities Telephone Systems Company Culture Sports Current Events User Error Public Cloud Vendor Uninterrupted Power Supply Co-managed IT Mouse Gaming Console Specifications Safety Vulnerability Virtual Desktop Bitcoin Webcam Programming Identity Theft Statistics Text Messaging Windows 7 IT service Network Congestion Documents Data Protection Distribution Entertainment Heating/Cooling Lifestyle Politics Storage Virtual Reality Bluetooth Streaming Media Conferencing Automobile Emails Inbound Marketing Chromebook Voice over Internet Protocol Redundancy Computing Infrastructure Hack Monitoring How To eWaste Google Docs Net Neutrality Evernote Private Cloud Experience Chrome Pain Points Download Virtual Assistant Cleaning Monitors Office Tips Processors Start Menu Tech Terms Computer Accessories Microchip Taxes Distributed Denial of Service USB Mobile Technology YouTube Presentation Cooperation Software as a Service Unified Communications Settings Trending Google Play Google Drive Windows Server 2008 Nanotechnology Social Network Licensing Human Resources Drones Desktop Finance Hacks Physical Security Application Skype Debate Startup Asset Tracking Relocation Tablets Microsoft 365 Webinar Archive Harddrive Business Cards Service Level Agreement Banking Botnet Processor Spyware Mobile Payment Username Medical IT Permissions Language Unified Threat Management Backup and Disaster Recovery Sync Browsers Electricity Printing GPS Security Cameras Point of Contact External Harddrive Screen Reader Customer Resource management User Tip Gamification Notifications CCTV Digital Signature switches Writing Smart Tech Reliable Computing Solutions Music Piracy Upload Business Metrics Computer Malfunction Teamwork Navigation cache Television HTML Professional Services Thin CLient Fiber-Optic Database In Internet of Things Data Analysis WannaCry Downloads Upgrades 3D Ebay GDPR Time Management Freedom of Information Best Practives LiFi Smart Phones Analytic Telephone System PDF Corporate Profile Recycling Mobile Security SharePoint Product Reviews Multi-Factor Security Cost Scalability Integration Software License Trends Motion Sickness Best Available Keyboard Tech Assessment Pirating Information Devices Messenger Tracking Domains Tip of the week Work/Life Balance Read Leadership Fraud Tactics Fileless Malware Google Calendar Microserver Deep Learning Adminstration Public Speaking Modem Touchscreen News Visible Light Communication Memory Proxy Server VoIP UTM Content Rental Service Meetings Consultation Get More Done IT consulting Legislation Error Cabling Electronic Medical Records Knowledge Device Management IT Plan Enterprise Resource Planning Web Server Shortcut Term Business Managemenet Accountants A.I. Books Workers Troubleshooting Recording Printer Server Content Management email scam Addiction Wi-Fi Administrator Entrepreneur Directions Technology Tips Turn Key Supercomputer HIPAA SSID Fake News Trojan Advertising Flash Environment Dark Web Audit CIO Multi-factor Authentication Data Warehousing Windows XP Wireless Headphones Telephone Worker Electronic Payment Health IT Staffing Organize Google Wallet online Currency Upselling Migration Connected Devices Competition Processing Video Surveillance Equifax Fleet Tracking Reading Samsung Business Owner Logistics Emergency Hard Drive Disposal Society Network Management Managed IT Service Access Displays Employer Employee Relationship IP Address Microsoft Excel Saving ZTime G Suite Bookmark Computer Care Micrsooft LinkedIn Device security MSP Printers Managing Stress Regulation CrashOverride 3D Printing Transportation Capital Productuvuty

toner1