facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

When Your Contacts Aren’t Your Contacts - Display Name Spoofing

When Your Contacts Aren’t Your Contacts - Display Name Spoofing

Business success is often tied to the quality of your business relationships. There are a lot of people you need to trust: your vendors to get you whatever supplies you need, your team to complete their responsibilities without letting in threats, and your customers to turn to you for what they need. Unfortunately, cybercriminals are willing to take advantage of such trust to accomplish their own ends.

0 Comments
Continue reading

Tip of the Week: 5 Warning Signs of a Phishing Attack

Tip of the Week: 5 Warning Signs of a Phishing Attack

Phishing attacks are a very common threat nowadays. Between the classic message from a supposed Nigerian Prince to a sudden and urgent email from the bank with attachment in tow, we’ve all seen our share of them. That’s the trick to stopping them—being able to spot them. Let’s go over five signals that a message may be a phishing attempt.

0 Comments
Continue reading

Cybersecurity Has Also Felt the Influence of COVID-19

Cybersecurity Has Also Felt the Influence of COVID-19

While businesses have always needed to focus on their data security, the COVID-19 pandemic has only made this more of a challenge. Let’s go over why this is, and how many industries (especially the healthcare industry) have had to adjust as a result.

0 Comments
Continue reading

Well-Trained Staff Will Avoid Ransomware

Well-Trained Staff Will Avoid Ransomware

Ransomware has been a real problem for the past several years. This is a result of a shift in the ways hackers approach their craft. Once known for breaching networks directly, the establishment of uncrackable encryption left hackers looking to change their strategies. Today, they use scams to get people to give them access to network resources. If they are successful, it can deliver more than headaches for a business. Let’s look at what makes ransomware so dangerous and how your company can combat the constant attacks that come your way. 

0 Comments
Continue reading

Don’t Get Tricked: Phishing Attacks Pretending to be Voicemail Attachments

Don’t Get Tricked: Phishing Attacks Pretending to be Voicemail Attachments

Human beings are naturally inquisitive creatures, which makes it all the easier for us to be convinced of different things. Cereal mascots promise wild flavors that will send kids on a Mom-approved adventure, magazine covers promise countless sure-fire ways to be rid of that stubborn belly fat, and—more sinisterly—phishing attacks promise to be something that they are not. As hackers have found, this tactic has proven to be worth investing time in.

0 Comments
Continue reading

There’s a Reason Some Scams are Painfully Transparent

There’s a Reason Some Scams are Painfully Transparent

“Hello sir/ma’am, I am a member of royal [sic] family and I am in grave danger in my country. If you send me money to get out safely, I will share my great riches with you as reward.”

Scams like this one have become a punchline for many, which makes you wonder why they are still commonly used by cybercriminals. As it turns out, there’s a very compelling reason that they do so, one that’s been known for years.

0 Comments
Continue reading

Tip of the Week: Phishing Training Has to Be a Priority

Tip of the Week: Phishing Training Has to Be a Priority

When reading through Microsoft’s latest Security Intelligence Report you will quickly get the notion that phishing attacks are some of the most prevalent cyberattacks. With businesses forced to use technology to support a remote workforce, this is definitely still relevant information. It, then, becomes extremely important that your business does a quality job of training your employees to spot phishing attempts before they become a problem. Let’s take you through some of the telltale signs that you have received a phishing message.

0 Comments
Continue reading

Three Tricks to Spot Phishing Attempts

Three Tricks to Spot Phishing Attempts

Cybersecurity needs to be a priority to any business that wants to continue their operations in the long-term. One threat that is very common today is the phishing attack.

0 Comments
Continue reading

Is It Fair to Be Fired for Falling for a Phishing… Test?

Is It Fair to Be Fired for Falling for a Phishing… Test?

Let’s run through a quick scenario: your company’s computing infrastructure is infected with ransomware. Fortunately, you have an offsite backup, so you are able to restore your systems without too much trouble, other than the time you’ve lost. As you investigate the root cause, you discover that one of your employees allowed the ransomware in by falling for a phishing email. So, do you fire them?

0 Comments
Continue reading

Social Media Scams and Everything You Should Know

Social Media Scams and Everything You Should Know

Social media has overtaken both the professional and personal aspects of online communication and connection, and while it might provide a considerable boon for both, it increases the odds of being contacted by scams and other malicious attempts. The best way to make sure you don’t fall prey to a scam is to remain vigilant. Today we’ll discuss the various scams that are created for use with social media.

0 Comments
Continue reading

Phishing Attacks and How to Avoid Them

Phishing Attacks and How to Avoid Them

Phishing attacks are the bane of modern businesses, and any organization’s employees need to be cognizant of the threat they pose. Unfortunately, no matter how much you protect against them, hackers are usually crafty enough to work their way around even the most well-defended security measures. However, not even the best security measures can keep your employees from making a split-second decision to click on a link or download an infected attachment.

0 Comments
Continue reading

Phishing Attacks Are Besting Two-Factor Authentication--Now What?

Phishing Attacks Are Besting Two-Factor Authentication--Now What?

What has proven to be one of the more effective ways of preventing phishing attacks may be under fire from more advanced threats designed specifically to penetrate the defenses of two-factor authentication. This means that users need to be more cognizant of avoiding these attacks, but how can you help them make educated decisions about this? Let’s start by discussing the phishing attacks that can beat 2FA.

0 Comments
Continue reading

Here Are Some Hacks You Should Be Cognizant Of

Here Are Some Hacks You Should Be Cognizant Of

In today’s modern business environment, your organization faces untold danger. There are several threats out there that your organization’s users could fall prey to. We’ve put together a list of some of the most dangerous ones out there, as well as how your business can respond to them.

0 Comments
Continue reading

The Marriott Hack Exposes 500 Million People

The Marriott Hack Exposes 500 Million People

It’s nice to get away every now and then, but if you have stayed at any property under the Marriott umbrella, including St. Regis, Westin, Sheraton, or W hotel since 2014, there is a good chance that your personal information has been leaked, a spokesperson from parent company Marriott has said. They said the multinational hotel corporation will begin emailing users impacted by the leak in the coming days.

0 Comments
Continue reading

Phishing Attacks and How to Thwart Them

Phishing Attacks and How to Thwart Them

For twenty years, hackers have tried to breach organization’s networks by finding or breaking holes in the network’s perimeter, or in exposed servers. This led to the cybersecurity industry creating software designed specifically to stop these threat actors in the act. This, in essence, created a situation where the perimeter of an organization’s network was extremely hard to breach. The problem was that as soon as something was able to get through the outer defenses, there was no end to the devastation a hacker could cause inside a network.

0 Comments
Continue reading

Fileless Malware Attacks Increasing

Fileless Malware Attacks Increasing

Ransomware has been far from low-profile since its inception several years ago. Everyone knows what the file-encrypting malware does, and they all know that paying the ransom can make the nightmare go away by decrypting the files located on their computer. As if the threat of losing data forever wasn’t enough, you’re staring down a ticking clock while this is going on. Nowadays, ransomware is becoming more difficult to manage through various tactics.

0 Comments
Continue reading

How to Thwart Targeted Phishing Attacks

How to Thwart Targeted Phishing Attacks

Modern businesses rely on email as a central part of their communications infrastructure, but this comes with its own set of threats and issues that can derail operations. Spam in particular is troublesome for organizations to deal with, as it wastes time and exposes your users to danger. While spam can be blocked, more dangerous types of messages can make their way past your defenses. These types of threats are known as phishing scams, and they present a considerable threat to your organization.

0 Comments
Continue reading

Would Your Users Fall For These Social Engineering Schemes?

Would Your Users Fall For These Social Engineering Schemes?

Social engineering is one of the trickiest parts of protecting your organization. It might sound like something out of a science fiction flick, but it’s one of the most dangerous attacks that a hacker can use against your business. Social engineering attempts to manipulate the target into giving away sensitive credentials or personal information for the purpose of stealing identities and other malicious intentions.

0 Comments
Continue reading

How To Spot A SMiShing Attempt

How To Spot A SMiShing Attempt

Phishing--it’s a threat that tells a tantalizing lie to entrap its target, and one that you’ve likely heard of before. However, as technology has advanced, so have the opportunities that cybercriminals have to leverage phishing attempts. Smartphones, for instance, make it so that you must be aware and on the lookout for SMiShing scams.

0 Comments
Continue reading

Tip of the Week: A URL Can Help Give Away A Phishing Attack

b2ap3_large_phishing_status_400

Back in 1995, scammers pulled the first phishing attack. They took the identity of AOL employees and requested the billing information of users through instant messaging. More sophisticated phishing attempts have evolved over the years, culminating in the commonly-seen email phishing attack, which tricks users into handing over personal or sensitive information. Phishing attacks can be seen through, so we’ll show you how you can identify threats before they become a problem.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Software Internet Cloud Data Hackers Business Management Hardware Workplace Tips Microsoft Network Security Productivity Backup Business Hosted Solutions Email Managed Service Provider Productivity Saving Money IT Services Malware Efficiency Google Innovation Small Business Computer User Tips Collaboration IT Support VoIP Smartphones Quick Tips Data Backup Network IT Support Mobile Devices communications Business Continuity Data Recovery Gadgets Disaster Recovery Microsoft Office Android Social Media Cybersecurity Smartphone Upgrade Phishing Mobile Office Communication Server Virtualization Miscellaneous Mobile Device Management Windows Mobile Device Passwords Ransomware Users Managed IT Services Vendor Management Holiday Operating System Apps Tech Term BDR Windows 10 Outsourced IT Internet of Things Unified Threat Management Remote Monitoring Facebook Automation BYOD Remote Computing Apple Mobile Computing Managed IT services Analytics WiFi Data Management Windows 10 Artificial Intelligence Marketing Cloud Computing Browser The Internet of Things Save Money Help Desk Training History Firewall Managed Service Covid-19 Business Technology App Big data Encryption Spam Health Alert Bandwidth Two-factor Authentication Information Technology Office 365 IT Consultant Office Budget Managed IT Gmail Content Filtering Government Going Green Cybercrime Maintenance Printer Hard Drives Access Control Bring Your Own Device Antivirus Windows 7 VPN Blockchain Information Healthcare Windows 8 Outlook Lithium-ion Battery Best Practice Recovery Employer-Employee Relationship Retail Remote Work Document Management Hiring/Firing Wi-Fi Networking Tech Support Virus Cost Management Wireless Technology Saving Time Computers Search Data Loss Update Customer Service iPhone Storage Project Management IBM Money Humor Augmented Reality Conferencing Hacking It Management Computing Data Security Travel Phone System Education Avoiding Downtime Hard Drive Law Enforcement Risk Management Mobility Wireless Solid State Drive Compliance Data Breach Data storage Flexibility Website Save Time Applications Downtime Laptop Customer Relationship Management Voice over Internet Protocol Legal Password Value PowerPoint Regulations Computer Repair Running Cable Proactive IT Hacker Administration SaaS Twitter Intranet End of Support Vendor File Sharing Patch Management Current Events Virtual Desktop Securty Vulnerabilities Social Google Maps Scam Net Neutrality Social Engineering DDoS Business Intelligence Black Market Fax Server Chrome Excel Digital Payment Cryptocurrency Digital Meetings Websites Router Private Cloud Word Business Growth Comparison Tablet Telephony Software as a Service Cortana Company Culture Machine Learning Social Networking Paperless Office Telephone Systems Employee/Employer Relationship Monitoring Sports Disaster Remote Hosted Solution Cooperation Management User Robot Telephone Notifications Specifications Safety IT service Smart Devices Co-managed IT Processor Streaming Media Inbound Marketing User Error Politics Documents Redundancy Video Conferencing Virtual Reality Entertainment Emails Bluetooth Pain Points Teamwork Automobile Heating/Cooling Solutions Evernote Employees Lifestyle Professional Services Chromebook Virtual Assistant Computing Infrastructure Hack Integration Memory How To Google Docs Start Menu Tech Terms Experience Computer Accessories Distribution Download eWaste Cleaning Mobile Technology Monitors Trending Gaming Console Managed Services Provider Office Tips Microchip Taxes Display Uninterrupted Power Supply Mouse Cost Webcam Vulnerability Text Messaging How To Distributed Denial of Service YouTube Statistics Processors Bitcoin Unified Communications Settings Managed Services Programming Managed IT Service Network Congestion USB Public Cloud Data Protection Licensing Presentation Multi-factor Authentication Identity Theft Downloads Wireless Headphones CCTV Time Management Freedom of Information Managing Costs Migration Connected Devices Analytic Corporate Profile Data Storage Microsoft 365 Recycling switches Writing Reviews Leadership Webinar Browsers Network Management Product Reviews Reliable Computing Music Procurement Adminstration Pirating Information Medical IT Trend Micro Equifax Fleet Tracking Business Metrics Computer Malfunction Assessment SharePoint User Tip Proactive Maintenance Tip of the week Security Cameras Threats Device security MSP Read Digital Signature In Internet of Things Google Calendar Upgrades Organization Nanotechnology Social Network Touchscreen News LiFi Communitications Navigation Virtual Machine Desktop Finance VoIP PCI DSS Data Analysis Business Cards Service Level Agreement Scalability Knowledge Supply Chain Management eCommerce Device Management Startup Asset Tracking Motion Sickness Consultation AI Printers SQL Server Unified Threat Management Backup and Disaster Recovery Business Managemenet Messenger PDF Tracking Work/Life Balance Internet Service Provider GDPR Managing Risk Content Management Username Technology Tips Deep Learning Screen Reader Customer Resource management Rental Service Fake News Visible Light Communication IT Assessment Upselling Tech Hypervisor Gamification Best Available Keyboard Audit Regulations Compliance Best Practives Web Server Domains Data Warehousing IT consulting Fileless Malware Hybrid Cloud Piracy Upload Cabling Remote Working Video Surveillance Holidays Smart Tech online Currency Supply Chains Saving ZTime Proxy Server Azure Fiber-Optic Database Books Workers Emergency Hard Drive Disposal Microserver Modem Strategy HTML Administrator Access Public Speaking Electronic Medical Records Transportation LinkedIn Telephone System Supercomputer Microsoft Excel Advertising Flash Electronic Health Records Term Mobile Security Shortcut Computer Care CIO Financial Data Troubleshooting Google Drive Windows Server 2008 Windows XP Memes Harddrive Directions Software License Trends Entrepreneur Worker Staffing Google Wallet Debate Get More Done Recording Optimization Multi-Factor Security 2FA Printer Server Dark Web Free Resource Fraud Tactics Skype Reading Environment Samsung Society Managing IT Services GPS Turn Key SSID Devices Archive HIPAA Spyware Mobile Payment Displays Health IT Electronic Payment Employer Employee Relationship Surveillance Processing UTM Content G Suite Electricity Competition Printing Micrsooft Telework External Harddrive Trojan Error Hacks Business Owner Physical Security IT Organize Wasting Time IT Plan Point of Contact Enterprise Resource Planning Drones Remote Workers Logistics Virtual Machines Legislation Thin CLient Bookmark email scam Addiction Relocation Tablets Virtual Private Network 3D Ebay Cyber security Accountants A.I. Banking Botnet cache IP Address Television Employer/Employee Relationships Human Resources Permissions Language Development Google Play Telephone Service Sync WannaCry Application FinTech Smart Phones Financial CrashOverride Capital 3D Printing Managing Stress Productuvuty Regulation Personal Information

toner1