facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Well-Trained Staff Will Avoid Ransomware

Well-Trained Staff Will Avoid Ransomware

Ransomware has been a real problem for the past several years. This is a result of a shift in the ways hackers approach their craft. Once known for breaching networks directly, the establishment of uncrackable encryption left hackers looking to change their strategies. Today, they use scams to get people to give them access to network resources. If they are successful, it can deliver more than headaches for a business. Let’s look at what makes ransomware so dangerous and how your company can combat the constant attacks that come your way. 

0 Comments
Continue reading

Ransomware Revisited

Ransomware Revisited

Ransom: a sum of money is demanded in order for the release of goods.
Software: the programs and other operating information used by a computer.

What do you get when you combine the two? Ransomware. 

0 Comments
Continue reading

Hackers Target Municipalities and Why That’s a Problem for Your Business

Hackers Target Municipalities and Why That’s a Problem for Your Business

On March 22, 2018, a remote-triggered ransomware called “SamSam” demanded a one-time payment of $51,000 be made to restore the city of Atlanta, Georgia’s, data. Despite an operating budget somewhere in the neighborhood of $625 million, Atlanta’s municipal leaders refused to pay the fine. The “hostage situation” has cost the city over $2 million already with an expected $9.5 million more likely to be spent restoring and re-enforcing the municipality’s network and infrastructure. This doesn’t take into account downtime and the significant amount of data lost in the hack. Whether or not you think it’s a good idea to not pay the ransom, if a whole city - especially one as large as Atlanta - can effectively be crippled by a single hack, you better believe that your business has to get serious about its cybersecurity efforts.

0 Comments
Continue reading

Could Your Business Be a Victim of Targeted Ransomware?

Could Your Business Be a Victim of Targeted Ransomware?

If you were a cybercriminal, what would be your preferred method of launching a ransomware attack? Would you rather create a catch-all threat that could capture as many potential victims as possible, or a calculated approach to land a big one? Despite the proven results of larger ransomware initiatives, most cybercriminals have made the shift to smaller, more targeted attacks against specific companies, and in some cases, individuals.

0 Comments
Continue reading

Bad Rabbit Ransomware Strikes Targets in Eastern Europe

Bad Rabbit Ransomware Strikes Targets in Eastern Europe

In yet another widespread ransomware attack, Eastern European countries saw an assortment of their critical establishments and infrastructures struck by an infection known as Bad Rabbit. Government buildings, media establishments, and transportation centers were among the targets of this attack.

0 Comments
Continue reading

Tip of the Week: 5 Reminders To Protect You Against Ransomware

Tip of the Week: 5 Reminders To Protect You Against Ransomware

The Internet is a vast place filled to the brim with threats, especially for businesses that need to preserve the integrity of their infrastructure and keep critical data safe. The Cisco 2017 Annual Cybersecurity Report states that ransomware is growing at a yearly rate of 350%, which is a considerable number to say the least. Here are five tips that can help you keep your business safe from ransomware infections.

0 Comments
Continue reading

LeakerLocker Takes Exposure to New Heights By Sharing Your Mobile Browser History

ransomware_leakerlocker_400

Ransomware, the malware that locks down its victim’s files until they pay up, has always been a frustrating issue to deal with. However, a recent mobile ransomware will make the issue a little more personal… by sharing the victim’s mobile browsing history.

0 Comments
Continue reading

Sadly, the WannaCry Ransomware Disaster Could Have Been Easily Prevented

Sadly, the WannaCry Ransomware Disaster Could Have Been Easily Prevented

On May 11, 2017, the WannaCry ransomware spread around the globe like wildfire and disabled computing infrastructures belonging to organizations of all shapes and sizes. As the world watched the news unfold, it seemed as if practically no business was immune to this ultra-powerful ransomware. Yet, many quick-thinking organizations were. All because they had the foresight to follow IT best practices.

0 Comments
Continue reading

Lowlife Ransomware Hackers Now Asking for More Than $1k Per Attack

Lowlife Ransomware Hackers Now Asking for More Than $1k Per Attack

Ransomware remains a very real threat, and is arguably only getting worse. Attacks are now able to come more frequently, and there are opportunities for even relative amateurs to level an attack against some unfortunate victim. However, this is not to say that there is nothing you can do to keep your business from becoming another cautionary tale.

0 Comments
Continue reading

Year in Review: 2016’s Biggest Breaches

Year in Review: 2016’s Biggest Breaches

2016 was quite the year for cybersecurity and the assorted issues, threats, and concerns associated with it. As 2017 rolls along, we may be able to anticipate what this year might bring by reflecting on the events of the last.

0 Comments
Continue reading

5 Steps Every Business Can Take to Avoid Ransomware

5 Steps Every Business Can Take to Avoid Ransomware

Ransomware is a dangerous online entity that continues to cause problems for businesses of all sizes. Thanks to its ability to encrypt workstations and even entire networks, ransomware has made its way to the top of the threat food chain, and it’s your responsibility to protect your business from it. Since infections are (more or less) impossible to remove, your best option is to prevent infections from happening in the first place.


Here are five of the best practices you need to keep in mind to protect your business from ransomware.

Have a Data Backup and Disaster Recovery Solution
If your business is struck with ransomware, the only reliable way to resolve the problem is to restore a data backup. The reasoning is simple; while you could pay for the decryption key, you would only be further funding their ransomware campaigns, and there’s no guarantee that the decryption key will work in the first place. You’re better off not taking the risk and just restoring a backup… assuming you have one.

Set a Routine for Scheduled Backups
You’ll want your backup and disaster recovery solution to be able to restore your data as close as possible to the point of incident. Computerware has a BDR solution available that can create backups of your data as often as every fifteen minutes. This is crucial if you want to ensure that your data recovery process is sound.

Educate Your Employees About Phishing Scams
Keeping your team in-the-know of how to avoid phishing scams and identify threats is a good step to take for any and all security risks. Teach them not to download unsolicited attachments or click on suspicious links. It also helps to remind them to look for signs of phony email domains, spelling errors, and other irregularities.

Regularly Update Your Software Solutions
The latest patches and security updates can go a long way toward keeping your organization from experiencing hacking attacks. As such, ransomware works the same way. Keep comprehensive security solutions on-hand that can keep phishing attacks from hitting your email inbox in the first place.

Keep Corporate Data Separate From Personal Data
If you have corporate data that’s stored on your in-house workstations, you’ll want to keep it separate from data that’s stored on employee mobile devices. If you use laptops or smartphones to work remotely, this can be challenging. You should stress that employees keep these two types of information as separate as possible. One way to do this is by storing corporate data in a cloud environment, so that employees don’t have to store it on their mobile devices at all.

The best way to guarantee your business’s assets aren’t being put at risk is to keep ransomware from happening in the first place. Take the time to reinforce your infrastructure and educate your team, and you might be surprised by the results. To learn more about how to do this, reach out to us at (703) 821-8200.

0 Comments
Continue reading

Did You Know Early Ransomware Spread via Floppy Disk?

Did You Know Early Ransomware Spread via Floppy Disk?

Ransomware might be a relatively new player in the battle for the Internet, but its short history shouldn’t belittle the damage that it can do to both businesses and users of personal computers. Perhaps you’ve had the misfortune to encounter it for yourself, and your files were locked down because of it. Regardless, ransomware is now a prevalent part of the online crime scene, and people are using it to extort money from innocent users, making it a considerable threat.

0 Comments
Continue reading

When Pyramid Scheme Meets Ransomware

When Pyramid Scheme Meets Ransomware

First hackers created a formidable ransomware. Then, when word got out about how to avoid this ransomware, they began to bundle a second ransomware to create an encryption catch-22. Now, the developers of the Petya and Mischa ransomware have adopted a Ransomware-as-a-Service model and have opened their nefarious malware up to distribution.

0 Comments
Continue reading

New Maktub Locker Ransomware Knows Where You Live

b2ap3_thumbnail_ransomware_maktub_400.jpgRansomware is so common in the world of online threats that even the FBI has labeled it a massive threat to businesses of all kinds. Unlike other types of malware, ransomware has a unique return on investment that’s measurable and highly lucrative for hackers. A new variant of ransomware called Maktub Locker lures victims into a false sense of security by tailoring phishing emails to match their street address.

0 Comments
Continue reading

Ransomware Hit PC Users for $325 Million in 2015 Alone

b2ap3_thumbnail_randomware_issues_400.jpgOf the many types of malware in the online environment, few are as dangerous as the notorious ransomware. As a threat that’s capable of instantaneously locking down your files and preventing you from accessing them, hackers will add insult to injury by demanding a ransom for the safe return of your files. How can your business prevent this growing threat from setting its sights on your assets?

0 Comments
Continue reading

Alert: Apple OS X Now at Risk of Ransomware

b2ap3_thumbnail_ransomware_now_affecting_apple_400.jpgRansomware is a major problem in both the personal and private sectors of computing, but up until very recently, Apple users had little to fear from potential ransomware hacks. Security researchers at Palo Alto Networks have discovered what’s known to be the first completed ransomware on an Apple device. The threat, called KeRanger, is officially “in the wild,” and is a danger to any Mac user.

0 Comments
Continue reading

New CryptoJoker Ransomware is No Laughing Matter

b2ap3_thumbnail_problems_with_ransomware_400.jpgToday’s various versions of ransomware are dangerous. By forcibly locking down important files on a victim’s computer, threats like CryptoLocker and CryptoWall are posing significant threats to both businesses and ordinary computer users. However, a new type of ransomware has appeared called CryptoJoker; and we assure you, there’s nothing funny at all about this one.

0 Comments
Continue reading

Warning: CryptoWall Targets Businesses and It’s Just as Nasty as Its Cousin, CryptoLocker

b2ap3_thumbnail_cryptowall_400.jpgIn the wake of a ransomware takeover, it seems like the world can’t go a few months without some sort of data loss disaster occurring. The antics of hackers grow more dangerous and difficult to dodge, and IT departments have their hands full dealing with the fallout. What’s keeping you from contracting this ransomware, and how can you keep your business from suffering its consequences?

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Data Business Management Hackers Hardware Microsoft Workplace Tips Network Security Backup Productivity Hosted Solutions Business Managed Service Provider Productivity Email Malware IT Services Saving Money Google Efficiency Innovation Small Business Computer User Tips Collaboration VoIP Quick Tips IT Support Data Backup IT Support Network Smartphones Mobile Devices Business Continuity communications Disaster Recovery Gadgets Microsoft Office Data Recovery Android Social Media Cybersecurity Smartphone Upgrade Communication Mobile Office Server Phishing Virtualization Miscellaneous Mobile Device Management Ransomware Operating System Holiday Users Windows Vendor Management Mobile Device Passwords Outsourced IT Windows 10 Tech Term Apps Managed IT Services Facebook Unified Threat Management Internet of Things Remote Monitoring BDR BYOD Automation Remote Computing Apple Mobile Computing Managed IT services Analytics Data Management Windows 10 WiFi Cloud Computing History Artificial Intelligence Browser Training The Internet of Things Marketing Save Money Firewall Business Technology Alert App Health Big data Spam Encryption Help Desk Budget Two-factor Authentication Office Covid-19 Bandwidth Information Technology IT Consultant Managed Service Office 365 VPN Maintenance Printer Gmail Content Filtering Government Going Green Cybercrime Access Control Managed IT Windows 7 Hard Drives Bring Your Own Device Blockchain Antivirus Saving Time Computers Search Remote Work Tech Support Wi-Fi Information Virus Recovery Healthcare Lithium-ion Battery Best Practice Employer-Employee Relationship Retail Cost Management Hiring/Firing Wireless Technology Windows 8 Outlook Networking Travel Humor Customer Service Education Computing Project Management iPhone Update IBM Phone System Money Augmented Reality Data Security Hacking It Management Document Management Conferencing Data Loss Regulations Data Breach Twitter Intranet Avoiding Downtime SaaS Wireless Voice over Internet Protocol Storage Website Risk Management Law Enforcement Compliance Solid State Drive Save Time Customer Relationship Management Current Events Downtime Data storage Flexibility Password Applications File Sharing Value Hard Drive PowerPoint Hacker Laptop Proactive IT Vendor Computer Repair Running Cable Patch Management Mobility Administration Legal Scam Monitoring User Paperless Office Meetings Virtual Desktop Sports Private Cloud Social Management Digital Disaster End of Support DDoS Websites Hosted Solution Telephony Robot Machine Learning Vulnerabilities Net Neutrality Telephone Systems Securty Chrome Excel Business Intelligence Software as a Service Digital Payment Word Router Employee/Employer Relationship Cortana Black Market Comparison Tablet Cryptocurrency Google Maps Company Culture Cooperation Business Growth Social Networking Fax Server Social Engineering Office Tips Presentation Statistics Chromebook Programming Computing Infrastructure Hack Network Congestion Redundancy Solutions YouTube How To Specifications Safety Evernote Employees Unified Communications Download Settings Inbound Marketing Professional Services Documents Streaming Media Multi-factor Authentication Virtual Assistant Telephone Integration Entertainment Teamwork Heating/Cooling Tech Terms Pain Points Microchip Taxes Start Menu Mobile Technology IT service Distributed Denial of Service Managed Services Provider Uninterrupted Power Supply Public Cloud Licensing Smart Devices Bluetooth eWaste Vulnerability How To Computer Accessories Co-managed IT Identity Theft Video Conferencing Bitcoin Managed Services User Error Data Protection Gaming Console Managed IT Service Notifications Distribution Google Docs Trending Memory Mouse Webcam Downloads Virtual Reality Processors Text Messaging Experience Politics Monitors Automobile Processor Lifestyle Cleaning USB Emails Cost CIO Scalability IP Address Fraud Tactics Assessment Browsers SharePoint Advertising Flash Motion Sickness Devices Remote Working Medical IT Trend Micro Thin CLient Supply Chains User Tip Google Calendar Proactive Maintenance Windows XP Human Resources Point of Contact UTM Content 3D Ebay Security Cameras Tip of the week Threats Best Practives Staffing Google Wallet Messenger Tracking Application Financial Data VoIP Displays IT Plan Enterprise Resource Planning Electronic Health Records Touchscreen Navigation News Virtual Machine Society Rental Service Legislation Error Smart Phones eCommerce Micrsooft Cabling email scam Addiction Memes Consultation Data Analysis Microserver Web Server Accountants A.I. Knowledge Recycling Leadership Printers Technology Tips SQL Server Administrator Analytic Adminstration Pirating Information Managing IT Services GDPR Managing Risk Drones Books Digital Signature Workers Wireless Headphones Telework Audit Migration Product Reviews Connected Devices Surveillance Tech Fake News Hypervisor Get More Done Supercomputer Holidays Printer Server Worker Network Management IT Fileless Malware Data Warehousing Hybrid Cloud Turn Key Permissions Language Equifax Read Fleet Tracking Remote Workers Access Proxy Server Azure PDF Device security MSP Virtual Private Network Emergency Modem Hard Drive Disposal Strategy Trojan Reading Samsung Device Management Nanotechnology Social Network FinTech Electronic Medical Records Computer Care Transportation Organize switches Writing G Suite Desktop Finance Development Term Microsoft Excel Music Best Available Employer Employee Relationship Keyboard Data Storage Recording Optimization Upgrades Domains Business Cards Business Managemenet Service Level Agreement Upselling Google Drive Directions Windows Server 2008 Display Hacks Physical Security Content Management Startup Asset Tracking Relocation Tablets Public Speaking Unified Threat Management Backup and Disaster Recovery Spyware Dark Web Mobile Payment Free Resource LiFi Banking Botnet Username Video Surveillance Procurement SSID online Currency Screen Reader Customer Resource management Saving ZTime Organization Electricity Health IT Printing Sync Gamification Processing Shortcut PCI DSS Logistics Virtual Machines Webinar Deep Learning Troubleshooting Piracy Upload Communitications Wasting Time Work/Life Balance CCTV Entrepreneur Smart Tech Reliable Computing HIPAA Fiber-Optic LinkedIn Database Harddrive cache Bookmark Television Visible Light Communication Business Metrics Computer Malfunction Environment HTML Debate Supply Chain Management Cyber security Telephone System AI WannaCry Employer/Employee Relationships IT consulting In Internet of Things Electronic Payment Mobile Security GPS Internet Service Provider Google Play Telephone Service Competition Regulations Compliance Corporate Profile Microsoft 365 Business Owner Software License Skype Trends IT Assessment Time Management Freedom of Information Managing Costs Archive Multi-Factor Security External Harddrive Financial Regulation CrashOverride Capital Productuvuty Personal Information 3D Printing Managing Stress

toner1