facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Start Off 2020 by Auditing Your Online Accounts and Passwords

Start Off 2020 by Auditing Your Online Accounts and Passwords

Let’s take a look at a real-world scenario that I ran into a few weeks ago with a family friend. For the sake of this story, let’s call him Bob. Bob lost access to a pretty important online account.

0 Comments
Continue reading

How Google is Trying to Make Passwords Easier and Better

How Google is Trying to Make Passwords Easier and Better

Common opinion more or less states that passwords aren’t so much “necessary,” as they are a “necessary evil.” The best practices that are recommended to maintain the efficacy of passwords today can certainly feel excessive - which tempts many users into ignoring these practices, to the detriment of their security. Fortunately, many large companies - like Google - are trying to make passwords easier to manage.

0 Comments
Continue reading

Scam Claims to Have Compromising Video… of You

Scam Claims to Have Compromising Video… of You

Every business (and every individual, for that matter) needs to be wary of Internet scams and other online tricks. This is because those scammers are wily and have many means of finding a user in a compromising position… or so they claim in a recent scam.

0 Comments
Continue reading

Data Security Must Be a Priority for Your Organization

Data Security Must Be a Priority for Your Organization

After 143 million people had their personal information put at risk in the Equifax data breach, it comes as no surprise that data security is an even hotter topic than usual. As much as you’d like to think that a breach like that would never happen to your business, this is an unrealistic hope that won’t do you any good if the threat of a data breach does come around. It is much better to be prepared.

0 Comments
Continue reading

Tip of the Week: 4 Security Best Practices You Need to Implement Right Away

Tip of the Week: 4 Security Best Practices You Need to Implement Right Away

Cybersecurity for business contains many complexities that are often difficult to keep track of. If your organization takes a proactive approach to understanding and implementing cybersecurity best practices, you can dramatically increase the security of your organization’s network.

0 Comments
Continue reading

Nearly 50% of Data Stolen in 2015 Were Passwords and Email Addresses

b2ap3_thumbnail_stolen_data_400.jpgIn 2015, there was an incredible amount of information stolen from organizations all over the world. From healthcare companies to government institutions, nobody was safe from the endless onslaught of hacking attacks. Now, in the wake of these hackers’ destruction, it seems that most of the incidents in question exposed passwords and email address; important credentials that put many users’ security in jeopardy.

0 Comments
Continue reading

3 Ways to Augment Your Password Security Practices

b2ap3_thumbnail_security_in_your_hands_400.jpgData breaches grow ever more common, especially in the professional sector. In the wake of high-profile hack attacks like those that targeted Sony and Home Depot, businesses are finding it more important than ever to invest heavily on security procedures and practices. However, one of the consistently forgotten aspects of security best practices is the password.

0 Comments
Continue reading

Practical Biometric Passwords Infiltrate the US Military

b2ap3_thumbnail_biometric_security_400.jpgHumans are always striving to create the next big security measure against the massive wave of online threats. One topic consistently in discussion is biometrics as a security measure, which take advantage of unique biological aspects of users in order to maximize security. Now, the US military is seeing the value of this kind of technology, and they’re funding a campaign to make it available to users.

0 Comments
Continue reading

It Seems Sony Can’t Get a Break from IT Issues

b2ap3_thumbnail_protect_your_identity_400.jpgIt’s the holiday season… for everyone but Sony, at least. The tech/entertainment supergiant has been experiencing a ton of security issues lately. Last month, someone hacked into Sony’s databases and stole a lot of information (including unreleased movies, which were later released to the world). This December, it was revealed that Sony stored their passwords in a folder on their server titled “Passwords.”

0 Comments
Continue reading

Tip of the Week: How to Protect Your Business from 3 Common Disasters

b2ap3_thumbnail_protect_your_business_400.jpgIt doesn’t take much to disrupt your company’s network and cause downtime. Whether it’s from something major like a natural disaster, or something minor like forgetting your network login credentials, you need to have a plan in place that gets your network up and running as soon as possible. Here are three common scenarios that you need to plan for.

0 Comments
Continue reading

4 Tips to Stay Ahead of The Hackers' Wiley Ways

b2ap3_thumbnail_cloud_security_important_400.jpgCriminals sit in front of their computers trying to rip off your personal data out of the cloud using their mysterious hacking skills. You don't have to know the code of the hackers to successfully fend them off. Here are a four effective tips to keep your data in the cloud safe.

0 Comments
Continue reading

Make WiFi Passwords a Thing of the Past

b2ap3_thumbnail_wifi_security_400.jpgThe wireless router is something that has been around for a long time now, and you might still have yours from when you first got wireless Internet installed in your office. If this is the case, you owe it to yourself to upgrade to a newer model. Besides increasing the speed of your wireless connection, there are a few security benefits to updating your router.

0 Comments
Continue reading

The Heartbleed Aftermath

b2ap3_thumbnail_heartbleed_aftermath_400.jpgThe Heartbleed bug, one of the nastiest deficiencies in Internet security to date, was found last week. More than two-thirds of the Internet's secure information could have been leaked from websites utilizing the OpenSSL cryptographic library's encryption style. Most major websites have already issued a patch to resolve the problem, but that doesn't change the fact that this information has been available to anyone looking for it for over two years. Worse still is that you would have no idea how to tell whether your data has been compromised.

0 Comments
Continue reading

2 Million Stolen Passwords Recovered

b2ap3_thumbnail_pwrrrd400.jpgSecurity company Trustwave made a discovery last week that sent the online world into a frenzy. They recovered two million stolen passwords from 93,000 different websites. This password cache included user accounts from major companies like Facebook, LinkedIn, Google, Twitter, and Yahoo. Is your password part of this haul?

0 Comments
Continue reading

Hackers are Taking Advantage of Technology Improvements

b2ap3_thumbnail_PasswordSec400.jpgKeeping your network and data safe is extremely important. We advocate to our clients that they should come up with complex and unique passwords for each of their accounts. Account hackers have improved their methods, so in order to ensure that you aren't a victim of information theft or worse, diligence in the creation of your passwords is essential.

0 Comments
Continue reading

Prevent your Web Browser from Storing Passwords

For sites you need to log into often, having your browser remember your password can save you time logging in, especially if you are using secure passwords that you might need to look up otherwise. There are circumstances where you might want to manage what personal information gets stored in your web browser.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Software Cloud Business Management Data Hackers Hardware Microsoft Network Security Workplace Tips Backup Managed Service Provider Business Hosted Solutions Productivity Email Malware IT Services Saving Money Efficiency Productivity Computer Google User Tips Innovation IT Support Small Business Smartphones IT Support Data Backup Mobile Devices VoIP Quick Tips Business Continuity Network communications Collaboration Gadgets Android Data Recovery Microsoft Office Upgrade Social Media Cybersecurity Mobile Office Server Disaster Recovery Communication Virtualization Smartphone Miscellaneous Mobile Device Management Phishing Ransomware Holiday Windows Passwords Outsourced IT Tech Term Windows 10 Operating System Vendor Management Apps Facebook Internet of Things Managed IT Services Remote Monitoring Unified Threat Management Automation Mobile Device BDR Analytics Users Managed IT services BYOD Mobile Computing Remote Computing Apple Data Management Windows 10 WiFi Marketing Artificial Intelligence History The Internet of Things Firewall Browser Cloud Computing Save Money Training Help Desk Alert Big data App Information Technology Business Technology Two-factor Authentication Bandwidth Office Encryption IT Consultant Spam Office 365 Hard Drives Going Green Gmail Government Bring Your Own Device Maintenance Cybercrime Managed IT Printer Antivirus Health Access Control Content Filtering Windows 7 Hiring/Firing Best Practice Lithium-ion Battery Budget Outlook Information Windows 8 Computers Saving Time VPN Healthcare Recovery Wireless Technology Employer-Employee Relationship Virus Search Retail Tech Support Cost Management Managed Service Document Management Blockchain IBM Data Loss Computing Customer Service Augmented Reality Travel Education Humor Project Management Update Hacking Phone System iPhone Networking It Management Money Regulations Patch Management Proactive IT File Sharing Computer Repair Running Cable Customer Relationship Management Hard Drive SaaS Wireless PowerPoint Data Breach Mobility Intranet Law Enforcement Twitter Storage Website Administration Solid State Drive Compliance Data storage Risk Management Applications Password Value Avoiding Downtime Save Time Conferencing Hacker Downtime Legal Current Events Monitoring Comparison Tablet Company Culture Paperless Office User Excel Virtual Desktop Sports Management Social Scam Disaster Social Networking Fax Server Hosted Solution Google Maps End of Support DDoS Vulnerabilities Robot Cooperation Social Engineering Securty Vendor Digital Websites Word Meetings Flexibility Black Market Private Cloud Cortana Software as a Service Wi-Fi Cryptocurrency Telephony Laptop Business Intelligence Business Growth Digital Payment Machine Learning Router Telephone Systems Voice over Internet Protocol Data Security Public Cloud Licensing User Error Presentation Co-managed IT Managed Services Provider Trending Downloads YouTube Safety Identity Theft Unified Communications Settings Mouse Specifications Multi-factor Authentication Smart Devices Programming Documents Telephone Lifestyle Managed Services Redundancy Statistics Entertainment Managed IT Service Gaming Console Virtual Reality Teamwork Heating/Cooling Politics Network Congestion Evernote Automobile IT service Emails Text Messaging Chromebook Virtual Assistant Webcam Processor Computing Infrastructure Hack Streaming Media How To Bluetooth Start Menu Tech Terms eWaste Download Mobile Technology Distribution Net Neutrality Memory Chrome Professional Services Inbound Marketing Uninterrupted Power Supply Google Docs Vulnerability Microchip Taxes Experience Processors Bitcoin Distributed Denial of Service Cleaning Integration Monitors Pain Points Computer Accessories USB Data Protection Office Tips cache Television Windows XP Modem Strategy Hacks Physical Security Staffing Google Wallet UTM IT Content IP Address Proxy Server Azure Legislation Error Human Resources Term Banking Botnet Society LinkedIn IT Plan Enterprise Resource Planning Application Webinar Electronic Medical Records Transportation WannaCry Relocation Tablets Displays A.I. Directions Display Upselling Time Management Freedom of Information Sync email scam Addiction Recording Optimization Corporate Profile Micrsooft Accountants Development Assessment SharePoint Archive SSID How To Video Surveillance Notifications CCTV Drones Skype Dark Web Free Resource Wireless Headphones Processing Business Metrics Tip of the week Computer Malfunction Migration Digital Signature Connected Devices Health IT Employee/Employer Relationship Saving ZTime Google Calendar Reliable Computing Equifax Video Conferencing Fleet Tracking Wasting Time Touchscreen News In Internet of Things Permissions Language Network Management Logistics Virtual Machines VoIP Point of Contact Harddrive Consultation Best Practives Cyber security Debate Knowledge Device security Communitications MSP Bookmark Writing Nanotechnology PDF Social Network Google Play Telephone Service GPS Motion Sickness Music Desktop Finance Employer/Employee Relationships Technology Tips Scalability switches Startup Asset Tracking Microserver Managing Costs Fake News Recycling Business Cards Best Available Service Level Agreement Keyboard Microsoft 365 External Harddrive Audit Messenger Tracking Upgrades Analytic Data Warehousing LiFi Unified Threat Management Backup and Disaster Recovery Medical IT Trend Micro Rental Service Product Reviews IT Assessment Username Domains Browsers Read Screen Reader Customer Resource management Get More Done Security Cameras Threats 3D Ebay Emergency Hard Drive Disposal Web Server Gamification Public Speaking User Tip Proactive Maintenance Thin CLient Access Cabling Smart Tech Turn Key Navigation Virtual Machine Microsoft Excel Administrator Work/Life Balance Piracy Upload Shortcut Printer Server Solutions Smart Phones Computer Care Books Workers Deep Learning Data Analysis Employees Google Drive Windows Server 2008 Visible Light Communication Device Management Fiber-Optic Database Entrepreneur Trojan eCommerce Supercomputer HTML Troubleshooting Electronic Health Records Worker IT consulting Content Management Environment Telephone System GDPR Managing Risk Adminstration Pirating Information Business Managemenet Mobile Security HIPAA Memes Organize SQL Server Leadership Spyware Mobile Payment Multi-Factor Security Electronic Payment Cost Tech Hypervisor Software License Trends Competition Electricity Printing Reading Samsung Fileless Malware Hybrid Cloud G Suite Advertising Flash online Currency Fraud Tactics Holidays Employer Employee Relationship CIO Devices Business Owner Surveillance CrashOverride Personal Information Internet Service Provider Capital Financial Productuvuty 3D Printing Managing Stress Printers Regulation

toner1