facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

It’s Now Legal for ISPs to Sell Your Online Browsing History

It’s Now Legal for ISPs to Sell Your Online Browsing History

Due to recent legislative activity, the rules and regulations that the Federal Communications Commission put in place to protect the personal data of Internet users have been struck down. This change now allows ISPs, or Internet Service Providers, to sell the browsing information of their customers to advertisers without consent--a move many consider to be a threat to net neutrality. This is what you need to know.

0 Comments
Continue reading

Voter Databases Do a Lousy Job at Securing Personal Data

Voter Databases Do a Lousy Job at Securing Personal Data

Hackers are known to go after data of all kinds, but sometimes they have other goals in mind. With one of the biggest events in world politics fast approaching--the 2016 United States presidential election--it’s thought that this event could potentially be influenced by hackers.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Hackers Business Management Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Network Security Business Email Saving Money Malware Hosted Solutions IT Services IT Support Efficiency Google Small Business Computer Smartphones User Tips Mobile Devices Quick Tips Innovation Gadgets Business Continuity Disaster Recovery VoIP Microsoft Office Android Network Social Media Mobile Office Virtualization Collaboration Data Backup Productivity Server Smartphone Mobile Device Management Communication Data Recovery Miscellaneous Tech Term Ransomware Upgrade Windows 10 communications IT Support Unified Threat Management Windows Passwords Holiday Facebook Remote Monitoring Operating System Apps Cybersecurity BYOD Mobile Computing Remote Computing Managed IT services Phishing Vendor Management Automation Users BDR WiFi Analytics Marketing The Internet of Things Data Management Mobile Device Firewall Outsourced IT History Apple Alert Artificial Intelligence Internet of Things Browser Save Money Managed IT Services App Big data Encryption IT Consultant Gmail Bring Your Own Device Office Antivirus Bandwidth Maintenance Printer Cloud Computing Spam Content Filtering Office 365 Going Green Health Two-factor Authentication Help Desk Training Wireless Technology Outlook Business Technology Windows 8 Search Cybercrime Managed IT Virus Cost Management Windows 10 Tech Support Hiring/Firing Lithium-ion Battery Best Practice Information Technology Hard Drives Budget Saving Time VPN Travel Update Blockchain Recovery Employer-Employee Relationship Hacking Money Document Management IBM Phone System Computers Access Control Healthcare PowerPoint Customer Service Intranet Twitter Education It Management SaaS Applications Government Administration Website File Sharing Law Enforcement Hard Drive Managed Service Risk Management Humor Compliance Mobility Data storage Save Time Information Networking Proactive IT Legal Running Cable Regulations Augmented Reality Social Telephone Systems Paperless Office Sports Wireless DDoS Computing Data Security Disaster End of Support Hosted Solution Fax Server Robot Patch Management Data Loss Securty Google Maps Word Scam Avoiding Downtime Solid State Drive Business Intelligence Password Cortana Digital Payment Value Social Engineering Data Breach iPhone Flexibility Black Market Router Downtime Digital Project Management Cryptocurrency Hacker Laptop Websites Comparison Tablet Excel Management Business Growth Company Culture Computer Repair Customer Relationship Management Social Networking User Machine Learning Current Events User Error YouTube Distributed Denial of Service Gaming Console Co-managed IT Network Congestion Documents Cooperation Bitcoin Unified Communications Settings Entertainment Public Cloud Webcam Vendor Heating/Cooling Text Messaging Data Protection Streaming Media Storage Lifestyle Identity Theft IT service Net Neutrality Conferencing Retail Chrome eWaste Virtual Reality Redundancy Politics Inbound Marketing Automobile Bluetooth Emails Evernote Chromebook Monitoring Computer Accessories Computing Infrastructure Hack Pain Points Google Docs Processors How To Private Cloud Trending USB Download Start Menu Tech Terms Experience Mobile Technology Monitors Mouse Cleaning Presentation Vulnerabilities Office Tips Software as a Service Telephony Programming Specifications Safety Statistics Virtual Desktop Microchip Taxes Uninterrupted Power Supply Spyware Mobile Payment Desktop Finance Displays Vulnerability Nanotechnology Social Network Society Point of Contact Managed IT Service Reading Samsung Electricity Printing Business Cards Service Level Agreement Micrsooft G Suite Harddrive Webinar Startup Asset Tracking Digital Signature Bookmark Employer Employee Relationship Debate Google Play Licensing Windows 7 Username Teamwork Hacks Physical Security GPS Unified Threat Management Backup and Disaster Recovery Drones Relocation Tablets External Harddrive cache Television Gamification Recycling Banking Botnet Screen Reader Customer Resource management Analytic Processor WannaCry Downloads Piracy Upload PDF Medical IT Sync Smart Tech Distribution Permissions Language Product Reviews Browsers Read Security Cameras Thin CLient Time Management Freedom of Information HTML Best Available User Tip Keyboard Notifications CCTV 3D Ebay Corporate Profile Fiber-Optic Database Reliable Computing Smart Phones Assessment SharePoint Best Practives Mobile Security switches Writing Business Metrics Computer Malfunction Telephone System Music Navigation Domains Google Calendar Software License Trends Upgrades Device Management Professional Services In Internet of Things Tip of the week Multi-Factor Security Cost Data Analysis Public Speaking Content Management GDPR Leadership Touchscreen News Devices LiFi Business Managemenet Shortcut Adminstration Pirating Information VoIP Fraud Microserver Tactics Scalability Consultation UTM Content Entrepreneur Motion Sickness Knowledge Troubleshooting Tech Technology Tips Get More Done IT Plan Enterprise Resource Planning Deep Learning online Currency Environment Voice over Internet Protocol Virtual Assistant Legislation Error Work/Life Balance HIPAA Fileless Malware Messenger Tracking Electronic Payment Modem Fake News Printer Server Accountants A.I. Visible Light Communication Memory Proxy Server Competition Rental Service Meetings Audit email scam Turn Key Addiction Business Owner Term Cabling Data Warehousing Trojan Multi-factor Authentication IT consulting LinkedIn Electronic Medical Records Web Server Access Migration Connected Devices Recording Wi-Fi Administrator Upselling Emergency Hard Drive Disposal Organize Wireless Headphones Telephone Directions IP Address Books Workers Network Management CIO Archive SSID Human Resources Microsoft Excel Equifax Fleet Tracking Advertising Flash Skype Dark Web Application Supercomputer Video Surveillance Computer Care Processing Worker Saving ZTime Google Drive Windows Server 2008 Device security MSP Windows XP Health IT Staffing Google Wallet Managing Stress CrashOverride Regulation Printers Capital 3D Printing Productuvuty

toner1