facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Harden Your Security with a 2FA Authentication App

Harden Your Security with a 2FA Authentication App

Weak passwords are a huge problem, one that almost everyone is guilty of. Even if you think of yourself as being a diligent, security-minded person, you probably have at least one or two passwords that are common words, followed by a digit or two, followed by an exclamation point.

I’d be willing to bet that the digits in your password represent either your birthday, your anniversary, or your favorite football player’s jersey. With a little time, anyone could gain access to your account. That’s where two-factor authentication comes in.

0 Comments
Continue reading

Improving Organizational Cybersecurity

Improving Organizational Cybersecurity

The nature of many of today’s businesses is building one product over and over and over. When you have that level of repetitiveness, it helps people find their niche, yes, but it can also result in the attention given to the task to suffer. While a disengaged employee is nothing new, they can cause some operational problems. By and large, a couple of staff hiccups won’t have a huge impact on your business, unless that lack of engagement impacts your cybersecurity. That’s because there are some threats out there that could absolutely cripple your business’ ability to sustain operations. Today, we’ll talk about how to get your staff to care about malware, hackers, and the like. 

0 Comments
Continue reading

Start Off 2020 by Auditing Your Online Accounts and Passwords

Start Off 2020 by Auditing Your Online Accounts and Passwords

Let’s take a look at a real-world scenario that I ran into a few weeks ago with a family friend. For the sake of this story, let’s call him Bob. Bob lost access to a pretty important online account.

0 Comments
Continue reading

How Google is Trying to Make Passwords Easier and Better

How Google is Trying to Make Passwords Easier and Better

Common opinion more or less states that passwords aren’t so much “necessary,” as they are a “necessary evil.” The best practices that are recommended to maintain the efficacy of passwords today can certainly feel excessive - which tempts many users into ignoring these practices, to the detriment of their security. Fortunately, many large companies - like Google - are trying to make passwords easier to manage.

0 Comments
Continue reading

Scam Claims to Have Compromising Video… of You

Scam Claims to Have Compromising Video… of You

Every business (and every individual, for that matter) needs to be wary of Internet scams and other online tricks. This is because those scammers are wily and have many means of finding a user in a compromising position… or so they claim in a recent scam.

0 Comments
Continue reading

Data Security Must Be a Priority for Your Organization

Data Security Must Be a Priority for Your Organization

After 143 million people had their personal information put at risk in the Equifax data breach, it comes as no surprise that data security is an even hotter topic than usual. As much as you’d like to think that a breach like that would never happen to your business, this is an unrealistic hope that won’t do you any good if the threat of a data breach does come around. It is much better to be prepared.

0 Comments
Continue reading

Tip of the Week: 4 Security Best Practices You Need to Implement Right Away

Tip of the Week: 4 Security Best Practices You Need to Implement Right Away

Cybersecurity for business contains many complexities that are often difficult to keep track of. If your organization takes a proactive approach to understanding and implementing cybersecurity best practices, you can dramatically increase the security of your organization’s network.

0 Comments
Continue reading

Nearly 50% of Data Stolen in 2015 Were Passwords and Email Addresses

b2ap3_thumbnail_stolen_data_400.jpgIn 2015, there was an incredible amount of information stolen from organizations all over the world. From healthcare companies to government institutions, nobody was safe from the endless onslaught of hacking attacks. Now, in the wake of these hackers’ destruction, it seems that most of the incidents in question exposed passwords and email address; important credentials that put many users’ security in jeopardy.

0 Comments
Continue reading

3 Ways to Augment Your Password Security Practices

b2ap3_thumbnail_security_in_your_hands_400.jpgData breaches grow ever more common, especially in the professional sector. In the wake of high-profile hack attacks like those that targeted Sony and Home Depot, businesses are finding it more important than ever to invest heavily on security procedures and practices. However, one of the consistently forgotten aspects of security best practices is the password.

0 Comments
Continue reading

Practical Biometric Passwords Infiltrate the US Military

b2ap3_thumbnail_biometric_security_400.jpgHumans are always striving to create the next big security measure against the massive wave of online threats. One topic consistently in discussion is biometrics as a security measure, which take advantage of unique biological aspects of users in order to maximize security. Now, the US military is seeing the value of this kind of technology, and they’re funding a campaign to make it available to users.

0 Comments
Continue reading

It Seems Sony Can’t Get a Break from IT Issues

b2ap3_thumbnail_protect_your_identity_400.jpgIt’s the holiday season… for everyone but Sony, at least. The tech/entertainment supergiant has been experiencing a ton of security issues lately. Last month, someone hacked into Sony’s databases and stole a lot of information (including unreleased movies, which were later released to the world). This December, it was revealed that Sony stored their passwords in a folder on their server titled “Passwords.”

0 Comments
Continue reading

Tip of the Week: How to Protect Your Business from 3 Common Disasters

b2ap3_thumbnail_protect_your_business_400.jpgIt doesn’t take much to disrupt your company’s network and cause downtime. Whether it’s from something major like a natural disaster, or something minor like forgetting your network login credentials, you need to have a plan in place that gets your network up and running as soon as possible. Here are three common scenarios that you need to plan for.

0 Comments
Continue reading

4 Tips to Stay Ahead of The Hackers' Wiley Ways

b2ap3_thumbnail_cloud_security_important_400.jpgCriminals sit in front of their computers trying to rip off your personal data out of the cloud using their mysterious hacking skills. You don't have to know the code of the hackers to successfully fend them off. Here are a four effective tips to keep your data in the cloud safe.

0 Comments
Continue reading

Make WiFi Passwords a Thing of the Past

b2ap3_thumbnail_wifi_security_400.jpgThe wireless router is something that has been around for a long time now, and you might still have yours from when you first got wireless Internet installed in your office. If this is the case, you owe it to yourself to upgrade to a newer model. Besides increasing the speed of your wireless connection, there are a few security benefits to updating your router.

0 Comments
Continue reading

The Heartbleed Aftermath

b2ap3_thumbnail_heartbleed_aftermath_400.jpgThe Heartbleed bug, one of the nastiest deficiencies in Internet security to date, was found last week. More than two-thirds of the Internet's secure information could have been leaked from websites utilizing the OpenSSL cryptographic library's encryption style. Most major websites have already issued a patch to resolve the problem, but that doesn't change the fact that this information has been available to anyone looking for it for over two years. Worse still is that you would have no idea how to tell whether your data has been compromised.

0 Comments
Continue reading

2 Million Stolen Passwords Recovered

b2ap3_thumbnail_pwrrrd400.jpgSecurity company Trustwave made a discovery last week that sent the online world into a frenzy. They recovered two million stolen passwords from 93,000 different websites. This password cache included user accounts from major companies like Facebook, LinkedIn, Google, Twitter, and Yahoo. Is your password part of this haul?

0 Comments
Continue reading

Hackers are Taking Advantage of Technology Improvements

b2ap3_thumbnail_PasswordSec400.jpgKeeping your network and data safe is extremely important. We advocate to our clients that they should come up with complex and unique passwords for each of their accounts. Account hackers have improved their methods, so in order to ensure that you aren't a victim of information theft or worse, diligence in the creation of your passwords is essential.

0 Comments
Continue reading

Prevent your Web Browser from Storing Passwords

For sites you need to log into often, having your browser remember your password can save you time logging in, especially if you are using secure passwords that you might need to look up otherwise. There are circumstances where you might want to manage what personal information gets stored in your web browser.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Software Internet Cloud Data Hackers Business Management Hardware Microsoft Workplace Tips Network Security Productivity Backup Business Managed Service Provider Hosted Solutions Email Productivity Malware IT Services Efficiency Saving Money Google Innovation Small Business User Tips Computer Collaboration IT Support Data Backup VoIP Quick Tips Network IT Support Smartphones Business Continuity communications Mobile Devices Data Recovery Gadgets Disaster Recovery Microsoft Office Android Social Media Cybersecurity Upgrade Smartphone Mobile Office Phishing Communication Server Virtualization Miscellaneous Mobile Device Management Passwords Mobile Device Ransomware Holiday Windows Users Vendor Management Operating System Tech Term Apps Outsourced IT Internet of Things BDR Windows 10 Managed IT Services Unified Threat Management Facebook Remote Monitoring Automation BYOD Apple Data Management Mobile Computing Analytics Managed IT services WiFi Remote Computing Windows 10 Cloud Computing Marketing Artificial Intelligence Training Browser The Internet of Things History Firewall Help Desk Business Technology Covid-19 Save Money App Alert Big data Spam Health Encryption Office Office 365 Information Technology Managed Service Budget Two-factor Authentication Bandwidth IT Consultant VPN Content Filtering Going Green Access Control Maintenance Gmail Printer Windows 7 Bring Your Own Device Managed IT Government Antivirus Information Blockchain Cybercrime Hard Drives Networking Computers Cost Management Saving Time Outlook Lithium-ion Battery Windows 8 Best Practice Wi-Fi Virus Remote Work Tech Support Wireless Technology Recovery Employer-Employee Relationship Document Management Hiring/Firing Search Retail Healthcare Hacking iPhone Project Management Travel Education Computing Conferencing IBM Update Customer Service Augmented Reality Humor Data Security It Management Storage Money Data Loss Phone System Legal Hacker Voice over Internet Protocol Applications Twitter Regulations Intranet SaaS Risk Management Customer Relationship Management PowerPoint Wireless Law Enforcement Save Time Vendor Website Downtime Solid State Drive Compliance File Sharing Administration Data storage Patch Management Flexibility Hard Drive Computer Repair Running Cable Mobility Proactive IT Laptop Data Breach Password Avoiding Downtime Current Events Value Digital Meetings Websites Private Cloud Paperless Office Excel Sports Fax Server Telephony Disaster Software as a Service User End of Support Employee/Employer Relationship Hosted Solution Machine Learning Virtual Desktop Social Net Neutrality Telephone Systems Robot Business Intelligence Cooperation Monitoring Chrome Securty Digital Payment DDoS Router Management Comparison Tablet Black Market Scam Company Culture Cryptocurrency Google Maps Word Vulnerabilities Social Networking Social Engineering Cortana Business Growth User Error Chromebook Monitors Programming Co-managed IT Integration Cleaning Evernote Statistics Smart Devices Network Congestion Computing Infrastructure Office Tips Hack Virtual Assistant Processors Pain Points How To YouTube Download Managed Services Provider Start Menu Tech Terms Video Conferencing Distribution USB Presentation Streaming Media Unified Communications Settings Mobile Technology Lifestyle How To Microchip Managed Services Uninterrupted Power Supply Taxes Specifications Safety Cost Managed IT Service Distributed Denial of Service Vulnerability IT service Documents Gaming Console Bitcoin Data Protection Entertainment Public Cloud Licensing Teamwork Heating/Cooling Webcam Text Messaging Processor Multi-factor Authentication Bluetooth Downloads Computer Accessories Identity Theft Notifications Telephone Solutions Trending Professional Services Politics Memory eWaste Mouse Virtual Reality Employees Google Docs Redundancy Emails Experience Automobile Inbound Marketing Tech Hypervisor Motion Sickness Knowledge Development Troubleshooting Startup Leadership Asset Tracking Scalability Consultation FinTech Entrepreneur Business Cards Adminstration Service Level Agreement Pirating Information HIPAA Username Point of Contact Webinar Advertising Messenger Holidays Flash Tracking Technology Tips Data Storage Environment Unified Threat Management Backup and Disaster Recovery Fileless Malware CIO Hybrid Cloud Gamification Modem Windows XP Rental Service Strategy Audit Procurement Electronic Payment Screen Reader Customer Resource management Proxy Server Staffing Azure Google Wallet Fake News Competition Term Displays Web Server Business Owner Smart Tech Electronic Medical Records Transportation Society Cabling Data Warehousing Organization Piracy Upload Communitications IP Address HTML Analytic Recording Books Optimization Access Workers PCI DSS Fiber-Optic Database Recycling Directions Display Micrsooft Administrator Emergency Hard Drive Disposal Mobile Security Product Reviews SSID Supercomputer Computer Care Supply Chain Management Human Resources Upselling Telephone System Dark Web Free Resource Drones Microsoft Excel Application Best Practives Processing Internet Service Provider Multi-Factor Security Read Health IT Google Drive Worker Windows Server 2008 AI Software License Trends Video Surveillance IT Assessment Devices Saving ZTime Logistics Permissions Reading Virtual Machines Spyware Language Samsung Mobile Payment Regulations Compliance Fraud Tactics Wasting Time UTM Content Cyber security Electricity Employer Employee Relationship Printing Remote Working Device Management Bookmark Microserver G Suite Digital Signature Business Managemenet Google Play switches Hacks Telephone Service Writing Physical Security Harddrive Legislation Error Content Management Employer/Employee Relationships Music Supply Chains IT Plan Enterprise Resource Planning Debate Upgrades Botnet Electronic Health Records Accountants A.I. Microsoft 365 Relocation cache Tablets Television Financial Data email scam GPS Addiction Get More Done Banking Managing Costs External Harddrive Printer Server Medical IT LiFi Trend Micro WannaCry PDF online Currency Browsers Turn Key Sync Memes Trojan Security Cameras Threats Corporate Profile CCTV Managing IT Services Wireless Headphones User Tip Proactive Maintenance Time Management Freedom of Information Best Available 2FA Keyboard Migration Connected Devices Navigation Business Metrics Virtual Machine Deep Learning Computer Malfunction Surveillance Domains Equifax Thin CLient Fleet Tracking Organize Reliable Computing Assessment Work/Life Balance SharePoint Telework 3D Network Management Ebay LinkedIn IT Public Speaking Smart Phones Device security MSP Visible Light Communication eCommerce Google Calendar Remote Workers Data Analysis In Internet of Things Tip of the week Skype GDPR IT consulting Managing Risk VoIP Virtual Private Network Nanotechnology Social Network Archive Printers SQL Server Touchscreen News Remote Shortcut Desktop Finance Capital Managing Stress Productuvuty Regulation Personal Information Financial CrashOverride 3D Printing

toner1