facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Three Tricks to Spot Phishing Attempts

Three Tricks to Spot Phishing Attempts

Cybersecurity needs to be a priority to any business that wants to continue their operations in the long-term. One threat that is very common today is the phishing attack.

0 Comments
Continue reading

Is It Fair to Be Fired for Falling for a Phishing… Test?

Is It Fair to Be Fired for Falling for a Phishing… Test?

Let’s run through a quick scenario: your company’s computing infrastructure is infected with ransomware. Fortunately, you have an offsite backup, so you are able to restore your systems without too much trouble, other than the time you’ve lost. As you investigate the root cause, you discover that one of your employees allowed the ransomware in by falling for a phishing email. So, do you fire them?

0 Comments
Continue reading

Social Media Scams and Everything You Should Know

Social Media Scams and Everything You Should Know

Social media has overtaken both the professional and personal aspects of online communication and connection, and while it might provide a considerable boon for both, it increases the odds of being contacted by scams and other malicious attempts. The best way to make sure you don’t fall prey to a scam is to remain vigilant. Today we’ll discuss the various scams that are created for use with social media.

0 Comments
Continue reading

Phishing Attacks and How to Avoid Them

Phishing Attacks and How to Avoid Them

Phishing attacks are the bane of modern businesses, and any organization’s employees need to be cognizant of the threat they pose. Unfortunately, no matter how much you protect against them, hackers are usually crafty enough to work their way around even the most well-defended security measures. However, not even the best security measures can keep your employees from making a split-second decision to click on a link or download an infected attachment.

0 Comments
Continue reading

Phishing Attacks Are Besting Two-Factor Authentication--Now What?

Phishing Attacks Are Besting Two-Factor Authentication--Now What?

What has proven to be one of the more effective ways of preventing phishing attacks may be under fire from more advanced threats designed specifically to penetrate the defenses of two-factor authentication. This means that users need to be more cognizant of avoiding these attacks, but how can you help them make educated decisions about this? Let’s start by discussing the phishing attacks that can beat 2FA.

0 Comments
Continue reading

Here Are Some Hacks You Should Be Cognizant Of

Here Are Some Hacks You Should Be Cognizant Of

In today’s modern business environment, your organization faces untold danger. There are several threats out there that your organization’s users could fall prey to. We’ve put together a list of some of the most dangerous ones out there, as well as how your business can respond to them.

0 Comments
Continue reading

The Marriott Hack Exposes 500 Million People

The Marriott Hack Exposes 500 Million People

It’s nice to get away every now and then, but if you have stayed at any property under the Marriott umbrella, including St. Regis, Westin, Sheraton, or W hotel since 2014, there is a good chance that your personal information has been leaked, a spokesperson from parent company Marriott has said. They said the multinational hotel corporation will begin emailing users impacted by the leak in the coming days.

0 Comments
Continue reading

Phishing Attacks and How to Thwart Them

Phishing Attacks and How to Thwart Them

For twenty years, hackers have tried to breach organization’s networks by finding or breaking holes in the network’s perimeter, or in exposed servers. This led to the cybersecurity industry creating software designed specifically to stop these threat actors in the act. This, in essence, created a situation where the perimeter of an organization’s network was extremely hard to breach. The problem was that as soon as something was able to get through the outer defenses, there was no end to the devastation a hacker could cause inside a network.

0 Comments
Continue reading

Fileless Malware Attacks Increasing

Fileless Malware Attacks Increasing

Ransomware has been far from low-profile since its inception several years ago. Everyone knows what the file-encrypting malware does, and they all know that paying the ransom can make the nightmare go away by decrypting the files located on their computer. As if the threat of losing data forever wasn’t enough, you’re staring down a ticking clock while this is going on. Nowadays, ransomware is becoming more difficult to manage through various tactics.

0 Comments
Continue reading

How to Thwart Targeted Phishing Attacks

How to Thwart Targeted Phishing Attacks

Modern businesses rely on email as a central part of their communications infrastructure, but this comes with its own set of threats and issues that can derail operations. Spam in particular is troublesome for organizations to deal with, as it wastes time and exposes your users to danger. While spam can be blocked, more dangerous types of messages can make their way past your defenses. These types of threats are known as phishing scams, and they present a considerable threat to your organization.

0 Comments
Continue reading

Would Your Users Fall For These Social Engineering Schemes?

Would Your Users Fall For These Social Engineering Schemes?

Social engineering is one of the trickiest parts of protecting your organization. It might sound like something out of a science fiction flick, but it’s one of the most dangerous attacks that a hacker can use against your business. Social engineering attempts to manipulate the target into giving away sensitive credentials or personal information for the purpose of stealing identities and other malicious intentions.

0 Comments
Continue reading

How To Spot A SMiShing Attempt

How To Spot A SMiShing Attempt

Phishing--it’s a threat that tells a tantalizing lie to entrap its target, and one that you’ve likely heard of before. However, as technology has advanced, so have the opportunities that cybercriminals have to leverage phishing attempts. Smartphones, for instance, make it so that you must be aware and on the lookout for SMiShing scams.

0 Comments
Continue reading

Tip of the Week: A URL Can Help Give Away A Phishing Attack

b2ap3_large_phishing_status_400

Back in 1995, scammers pulled the first phishing attack. They took the identity of AOL employees and requested the billing information of users through instant messaging. More sophisticated phishing attempts have evolved over the years, culminating in the commonly-seen email phishing attack, which tricks users into handing over personal or sensitive information. Phishing attacks can be seen through, so we’ll show you how you can identify threats before they become a problem.

0 Comments
Continue reading

Scammers Use Whaling Attack Emails to Pose as “Big Fish”

  Authentication required.

This is a password protected blog, please kindly enter the password into the password field below to view the blog.

Tip of the Week: 5 Giveaways that You’re Being Baited With a Phishing Scam

b2ap3_thumbnail_phishing_scams_400.jpgPhishing attacks grow more common every day, particularly because it’s so challenging to know who’s for real and who’s a fake on the Internet. The anonymity of the Internet has fostered an environment where hackers can extort money with little fear of getting caught, under the right circumstances. How can you protect yourself and your business from being targeted by phishing attacks?

0 Comments
Continue reading

4 Obvious Signs of a Phishing Attack

b2ap3_thumbnail_phishing_attacks_400.jpgThe online world is full of threats that are waiting for you to let your system's guard down. Thanks to powerful security measures, you might not be worried enough to consider that hackers have found ways to get around your defenses. If you’ve grown complacent, you might be in for a rude awakening when a hacker’s phishing scam works on you.

0 Comments
Continue reading

78% of Phishing Scams are Hackers Impersonating IT Staff

b2ap3_thumbnail_phishing_emails_400.jpgWhen it comes to protecting your business from hackers, having a strong firewall is important, but it isn’t enough to fully keep the bad guys out of your network. If they can’t hack their way through a system vulnerability, they will try another, more devious way; namely, by tricking your staff with phishing tactics.

0 Comments
Continue reading

Dyre Wolf Malware Bleeds Businesses of $1.5 Million Per Hack

b2ap3_thumbnail_dyre_wolf_phishing_400.jpgWith spring arriving, “winter is coming” as the new season of the critically-acclaimed television series Game of Thrones returns to millions of viewers worldwide. Ironically, there’s also a type of malware gaining traction in the online community that matches its bark with its bite, aptly dubbed Dyre Wolf. This threat has the potential to cost businesses as much as $1.5 million per hack, and takes advantage of the ever-common spear phishing tactic.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Software Cloud Business Management Data Hackers Hardware Microsoft Workplace Tips Network Security Backup Managed Service Provider Business Hosted Solutions Productivity Email Malware IT Services Saving Money Efficiency Computer Productivity User Tips Google IT Support Innovation Smartphones Small Business Data Backup Mobile Devices Quick Tips VoIP IT Support Business Continuity Network Gadgets Collaboration Microsoft Office communications Android Upgrade Social Media Data Recovery Disaster Recovery Server Mobile Office Cybersecurity Virtualization Communication Smartphone Mobile Device Management Miscellaneous Phishing Ransomware Holiday Vendor Management Passwords Windows 10 Operating System Tech Term Windows Managed IT Services Apps Facebook Unified Threat Management Remote Monitoring Outsourced IT Internet of Things BDR Mobile Device Automation Managed IT services BYOD Remote Computing Apple Data Management Mobile Computing Users Analytics Windows 10 WiFi History Marketing Artificial Intelligence The Internet of Things Browser Cloud Computing Save Money Firewall Help Desk Alert App Big data IT Consultant Business Technology Encryption Office 365 Training Spam Two-factor Authentication Bandwidth Bring Your Own Device Government Managed IT Antivirus Cybercrime Office Maintenance Content Filtering Information Technology Printer Going Green Access Control Health Gmail Hard Drives Wireless Technology Saving Time Recovery Computers VPN Employer-Employee Relationship Search Information Retail Windows 8 Outlook Cost Management Healthcare Lithium-ion Battery Best Practice Tech Support Virus Budget Managed Service Hiring/Firing Windows 7 Phone System Blockchain Data Loss Travel Education Networking Hacking Project Management Update iPhone Humor IBM Money Customer Service Document Management It Management Proactive IT Running Cable Compliance Current Events Mobility Website Patch Management Solid State Drive Data storage Administration Twitter Intranet Data Breach Value Avoiding Downtime Password Legal Risk Management Hacker Regulations Applications Save Time SaaS Computing Downtime Customer Relationship Management File Sharing Augmented Reality Conferencing PowerPoint Law Enforcement Hard Drive Wireless Computer Repair Google Maps DDoS Voice over Internet Protocol Social Networking Storage Monitoring Social Engineering Flexibility Scam Black Market Word Cryptocurrency Management Laptop Vulnerabilities Fax Server Private Cloud Cortana Business Growth Digital Cooperation Wi-Fi Vendor Telephony Websites Machine Learning Telephone Systems Business Intelligence Paperless Office Excel Sports Digital Payment Software as a Service User Router Disaster Virtual Desktop End of Support Hosted Solution Robot Comparison Tablet Social Securty Company Culture Data Security Smart Devices Mouse Teamwork Heating/Cooling Entertainment Downloads Webcam Politics Text Messaging Virtual Reality Co-managed IT Statistics Emails Managed Services Provider Bluetooth User Error Programming Automobile Chromebook Network Congestion Multi-factor Authentication Redundancy Computing Infrastructure Hack Google Docs Meetings Memory How To Telephone eWaste Download Managed IT Service Evernote Lifestyle Streaming Media Experience Inbound Marketing Monitors Virtual Assistant Cleaning Office Tips Net Neutrality Microchip Taxes Processor Pain Points Processors Start Menu Tech Terms Chrome Distributed Denial of Service USB Mobile Technology YouTube Presentation Unified Communications Settings Public Cloud Distribution Licensing Uninterrupted Power Supply Computer Accessories Specifications Safety Professional Services Vulnerability Bitcoin Identity Theft Trending Gaming Console IT service Documents Data Protection Fraud Business Metrics Tactics Computer Malfunction Fileless Malware cache Hybrid Cloud Television Harddrive switches Writing Devices Reliable Computing Holidays Music Debate Proxy Server WannaCry Azure Upgrades UTM Skype Content Modem Strategy GPS Archive In Internet of Things External Harddrive IT Plan Enterprise Resource Planning Term Time Management Freedom of Information LiFi Legislation Error PDF Electronic Medical Records Corporate Profile Transportation Webinar Communitications email scam Addiction Motion Sickness Best Available Keyboard Directions Assessment Display SharePoint Point of Contact Accountants Scalability A.I. Recording Optimization Dark Web Free Resource Google Calendar Thin CLient Deep Learning Messenger Tracking Domains SSID How To Tip of the week 3D Ebay Work/Life Balance Health IT VoIP Employee/Employer Relationship Smart Phones Migration Rental Service Connected Devices Public Speaking Processing Touchscreen Managed Services News Visible Light Communication Wireless Headphones IT Assessment Recycling Network Management Web Server Shortcut Consultation Wasting Time IT consulting Equifax Analytic Fleet Tracking Cabling Logistics Knowledge Virtual Machines Administrator Entrepreneur Bookmark Technology Tips Leadership Device security Product Reviews Books MSP Workers Troubleshooting Cyber security Adminstration Pirating Information Employer/Employee Relationships Audit CIO Desktop Finance Supercomputer HIPAA Google Play Telephone Service Fake News Advertising Flash Best Practives Nanotechnology Read Social Network Environment Electronic Health Records Business Cards Service Level Agreement Competition Managing Costs Data Warehousing Windows XP Startup Asset Tracking Worker Electronic Payment Microsoft 365 Staffing Google Wallet Unified Threat Management Backup and Disaster Recovery Browsers Access Displays Microserver Reading Username Samsung Business Owner Medical IT Emergency Trend Micro Hard Drive Disposal Society Memes Device Management User Tip Proactive Maintenance Computer Care Micrsooft Business Managemenet Gamification Employer Employee Relationship IP Address Security Cameras Threats Microsoft Excel Content Management Screen Reader G Suite Customer Resource management Drones Surveillance Piracy Hacks Upload Physical Security Application Navigation Google Drive Virtual Machine Windows Server 2008 Upselling Get More Done Smart Tech Human Resources Solutions Fiber-Optic online Currency Banking Database Botnet Data Analysis Spyware Employees Mobile Payment Turn Key HTML Relocation Tablets eCommerce Video Surveillance Printer Server IT Electricity SQL Server Printing Saving ZTime Mobile Security GDPR Managing Risk Permissions Language Trojan Sync Telephone System Organize Software License LinkedIn Notifications Trends CCTV Digital Signature Tech Hypervisor Multi-Factor Security Cost Integration Regulation CrashOverride 3D Printing Personal Information Capital Financial Productuvuty Printers Managing Stress Development

toner1