facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Two Lessons Businesses Can Learn from the Spotify Data Discovery

Two Lessons Businesses Can Learn from the Spotify Data Discovery

Every so often, we come across a bit of news that helps to teach not one, but two cybersecurity best practices at the same time. With the recent news of a cache of hacked Spotify accounts, we find just such an opportunity. Let’s review the two lessons to be learned.

0 Comments
Continue reading

Update Google Chrome, Says Homeland Security

Update Google Chrome, Says Homeland Security

Look, we get it… it’s one thing to hear it from “those IT guys” about how important software updates are. We’re into this stuff, after all, so we worry about things like that more. However, we’re hoping that a warning from Homeland Security to update Google Chrome will have a little more weight.

0 Comments
Continue reading

How to Ensure Your Remote Workforce Isn’t Making You Vulnerable

How to Ensure Your Remote Workforce Isn’t Making You Vulnerable

Considering the current popularity of remote operations, the security of your business’ resources should be one of your greatest concerns. While this process isn’t necessarily easy, it isn’t something you can afford to neglect. Let’s take a few moments and walk through some of the most critical considerations to your office and its data security.

0 Comments
Continue reading

Is Remote Work a Bigger Risk with Certain Employees?

Is Remote Work a Bigger Risk with Certain Employees?

Despite all that has gone on, many businesses have managed to stay open by embracing the remote capabilities of today’s technology. This is undeniably fortunate… however, it is crucial that we also acknowledge the importance of cybersecurity as these actions are taken.

0 Comments
Continue reading

When Your Contacts Aren’t Your Contacts - Display Name Spoofing

When Your Contacts Aren’t Your Contacts - Display Name Spoofing

Business success is often tied to the quality of your business relationships. There are a lot of people you need to trust: your vendors to get you whatever supplies you need, your team to complete their responsibilities without letting in threats, and your customers to turn to you for what they need. Unfortunately, cybercriminals are willing to take advantage of such trust to accomplish their own ends.

0 Comments
Continue reading

Tip of the Week: 6 Data Security Practices You Can Take

Tip of the Week: 6 Data Security Practices You Can Take

Data is one of the most valuable assets there is today, which is why any business should consider its security a prerogative. This can admittedly be a lot, which is why we’ve taken the liberty of preparing a few tips to help you get started on the right path. These may also help those in the middle of the process who need a little reminder.

0 Comments
Continue reading

Keep Your Business Safe with These Best Practices

Keep Your Business Safe with These Best Practices

Security has to be a priority for your business. Oftentimes there is a disconnect between those aims and the practices used by businesses. This gap in vigilance can be just the place that hackers and other scammers look to as they attempt to steal what you have. This month, we thought it was important to provide you a few best practices to follow to keep your data and infrastructure safe. 

0 Comments
Continue reading

Microsoft Thwarts Major Hacking Attempt

Microsoft Thwarts Major Hacking Attempt

With the 2020 U.S. Election under a month away, there has been a lot of concern that outside interests would try to influence the results. Microsoft has recently disrupted a huge coordinated hacking effort that had designs of altering the election infrastructure needed for a fair and secure election. Let’s take a look at the effort and Microsoft’s response in today’s blog.

0 Comments
Continue reading

Harden Your Security with a 2FA Authentication App

Harden Your Security with a 2FA Authentication App

Weak passwords are a huge problem, one that almost everyone is guilty of. Even if you think of yourself as being a diligent, security-minded person, you probably have at least one or two passwords that are common words, followed by a digit or two, followed by an exclamation point.

I’d be willing to bet that the digits in your password represent either your birthday, your anniversary, or your favorite football player’s jersey. With a little time, anyone could gain access to your account. That’s where two-factor authentication comes in.

0 Comments
Continue reading

Tip of the Week: 5 Warning Signs of a Phishing Attack

Tip of the Week: 5 Warning Signs of a Phishing Attack

Phishing attacks are a very common threat nowadays. Between the classic message from a supposed Nigerian Prince to a sudden and urgent email from the bank with attachment in tow, we’ve all seen our share of them. That’s the trick to stopping them—being able to spot them. Let’s go over five signals that a message may be a phishing attempt.

0 Comments
Continue reading

Tip of the Week: Simple Steps to Safer Email Practices

Tip of the Week: Simple Steps to Safer Email Practices

Security is always a business priority, and with so many business needs now fulfilled digitally, it is critical that cybersecurity has a strong presence in organizations big and small. Nowadays, collaboration solutions have also had even greater importance in the workplace, making tools like email completely essential. Unfortunately, this gives cybercriminals an increased opportunity to use it as a means of attack.

0 Comments
Continue reading

Improving Organizational Cybersecurity

Improving Organizational Cybersecurity

The nature of many of today’s businesses is building one product over and over and over. When you have that level of repetitiveness, it helps people find their niche, yes, but it can also result in the attention given to the task to suffer. While a disengaged employee is nothing new, they can cause some operational problems. By and large, a couple of staff hiccups won’t have a huge impact on your business, unless that lack of engagement impacts your cybersecurity. That’s because there are some threats out there that could absolutely cripple your business’ ability to sustain operations. Today, we’ll talk about how to get your staff to care about malware, hackers, and the like. 

0 Comments
Continue reading

Blockchain Is Changing the World, One Node at a Time

Blockchain Is Changing the World, One Node at a Time

Blockchain was all the rage for five years. You couldn’t talk about technology without someone bringing it up. At that point, it was listed as the remedy for all the world’s problems. Five years later, it’s not being mentioned quite as much, but it has been used to create some very useful products. Let’s take a look at what is going on with blockchain technology in 2020. 

0 Comments
Continue reading

Is Blockchain Still a Big Deal? (It Sure Is)

Is Blockchain Still a Big Deal? (It Sure Is)

It seemed that, not so long ago, everything was going to be associated in some way to blockchain and blockchain technology. All online transactions and data were going to use the blockchain for security. However, as 2020 has provided some very effective distractions from the thought of blockchain, it seems to have slipped from the public consciousness. Let’s look at how blockchain is still being used today to drive innovation as a quick reminder.

0 Comments
Continue reading

Employees Can Be Your Business’ Best Defense Policy

Employees Can Be Your Business’ Best Defense Policy

A business’ employees are perhaps its greatest weakness in terms of its cybersecurity, although they also have the potential to be one of its greatest advantages if trained properly. To demonstrate this, let’s consider a few examples that exemplify either case.

0 Comments
Continue reading

Many Businesses are Still Using Windows 7...

Many Businesses are Still Using Windows 7...

So many organizations continue to use a decade-old operating system, and they really, really shouldn’t.

Here’s the thing: Windows 7 is dead and gone… and yet, as of July, it still had a market share of about 23 percent, making it the second-most-popular operating system. Here, we’ll be going over just why it is—if your company is still using Windows 7—that you need to update to Windows 10 immediately (if not sooner).

0 Comments
Continue reading

Is My Smartphone Tracking COVID-19 Exposures Without My Consent?

Is My Smartphone Tracking COVID-19 Exposures Without My Consent?

Remember a few months ago when Google and Apple joined forces to come up with a system to help state and local governments establish a COVID-19 Exposure Notification system? If you didn’t, you aren’t alone. A lot has been going on lately. Just to catch you up, the two tech giants recently pushed out an update across nearly all modern smartphones so state and local governments can deploy apps to notify people when they may have been exposed to COVID-19. Let’s do a deep dive on what this means for your privacy.

0 Comments
Continue reading

Exploring the Risk in Business VPNs

Exploring the Risk in Business VPNs

Small business owners are always looking for a way to improve their companies. It has been difficult to do so in 2020 as the COVID-19 shutdown has everyone playing defense. One way businesses have forged ahead is by allowing their staff to work from home. Many businesses use a VPN to facilitate this remote productivity, but there are business risks in doing so.

0 Comments
Continue reading

Avoiding Cybersecurity Placebos in Your Business

Avoiding Cybersecurity Placebos in Your Business

When it comes to your business, especially its technology, some of the buzzwords you hear floating around can be pretty convincing, almost intoxicating. Unfortunately, like most buzzwords, many of these are aggrandized beyond their worth to the average small-to-medium-sized business. Let’s take a look at how this can impact a business’ perception of its cybersecurity, as well as dig into the reality behind these terms.

0 Comments
Continue reading

Cybersecurity Training Must Be a Priority

Cybersecurity Training Must Be a Priority

The nature of many of today’s businesses is building one product over and over and over. When you have that level of repetitiveness, it helps people find their niche, yes, but it can also result in the attention given to the task to suffer. While a disengaged employee is nothing new, they can cause some operational problems. By and large, a couple of staff hiccups won’t have a huge impact on your business, unless that lack of engagement impacts your cybersecurity. That’s because there are some threats out there that could absolutely cripple your business’ ability to sustain operations. Today, we’ll talk about how to get your staff to care about malware, hackers, and the like. 

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Software Internet Cloud Data Hackers Business Management Hardware Workplace Tips Microsoft Network Security Productivity Backup Business Email Managed Service Provider Hosted Solutions Productivity Malware Saving Money IT Services Google Efficiency Innovation Small Business Computer Collaboration User Tips IT Support VoIP Quick Tips Smartphones Data Backup Network IT Support communications Mobile Devices Business Continuity Data Recovery Microsoft Office Gadgets Disaster Recovery Android Cybersecurity Social Media Phishing Upgrade Smartphone Communication Mobile Office Server Virtualization Miscellaneous Mobile Device Management Windows Mobile Device Passwords Ransomware Users Vendor Management Holiday Managed IT Services Operating System BDR Outsourced IT Apps Internet of Things Tech Term Windows 10 Unified Threat Management Facebook Remote Monitoring Automation BYOD WiFi Apple Data Management Analytics Managed IT services Remote Computing Mobile Computing Windows 10 The Internet of Things Training Marketing Help Desk Artificial Intelligence History Browser Cloud Computing Save Money Managed Service Firewall Business Technology Covid-19 Health Spam Alert Encryption Big data App IT Consultant Information Technology Office 365 Budget Two-factor Authentication Bandwidth Office Content Filtering Going Green Information Hard Drives Access Control VPN Bring Your Own Device Gmail Windows 7 Government Antivirus Blockchain Managed IT Maintenance Printer Cybercrime Cost Management Networking Wi-Fi Best Practice Lithium-ion Battery Document Management Hiring/Firing Outlook Saving Time Windows 8 Computers Healthcare Remote Work Wireless Technology Search Recovery Employer-Employee Relationship Virus Retail Tech Support iPhone Hacking Project Management Phone System Money IBM Computing Augmented Reality Customer Service It Management Data Security Travel Storage Education Humor Data Loss Update Conferencing Voice over Internet Protocol Legal Save Time Hacker Downtime Regulations Current Events Proactive IT SaaS Computer Repair Customer Relationship Management Running Cable End of Support PowerPoint File Sharing Law Enforcement Hard Drive Wireless Vendor Twitter Intranet Compliance Mobility Website Patch Management Solid State Drive Administration Data storage Applications Flexibility Risk Management Data Breach Laptop Avoiding Downtime Value Password Digital Digital Payment Telephony Websites Router Monitoring Machine Learning Telephone Systems Excel Comparison Tablet Paperless Office Sports Software as a Service Company Culture Management User Employee/Employer Relationship Disaster Vulnerabilities Virtual Desktop Social Networking Hosted Solution Robot Cooperation Social Securty Fax Server Google Maps DDoS Social Engineering Scam Black Market Word Cryptocurrency Net Neutrality Meetings Remote Chrome Business Intelligence Private Cloud Cortana Business Growth Monitors Virtual Assistant Cleaning Smart Devices Office Tips Pain Points Computer Accessories Video Conferencing Microchip Taxes Managed Services Provider Processors Start Menu Tech Terms Distributed Denial of Service USB Mobile Technology Display YouTube User Error Trending Multi-factor Authentication Presentation How To Unified Communications Settings Co-managed IT Mouse Managed Services Public Cloud Licensing Telephone Uninterrupted Power Supply Managed IT Service Specifications Safety Vulnerability Statistics Bitcoin Gaming Console Programming Identity Theft Lifestyle Notifications IT service Network Congestion Documents Data Protection Teamwork Heating/Cooling Processor Webcam Entertainment Text Messaging Downloads Politics Virtual Reality Emails Bluetooth Streaming Media Automobile Chromebook Distribution Solutions Employees Redundancy Professional Services Computing Infrastructure Hack Google Docs Inbound Marketing Memory How To eWaste Download Evernote Cost Integration Experience Fraud Tactics Entrepreneur Technology Tips Fileless Malware Hybrid Cloud Trojan Business Managemenet Data Storage Books Workers Devices Troubleshooting Holidays Content Management Administrator Audit Proxy Server Azure CIO Procurement Supercomputer UTM Content HIPAA Fake News Modem Strategy Advertising Flash Organize Reviews Environment online Currency IT Plan Enterprise Resource Planning Competition Data Warehousing Term Windows XP Organization Worker Legislation Error Electronic Payment Electronic Medical Records Transportation Staffing Google Wallet email scam Addiction Access Directions Displays PCI DSS Reading Samsung Accountants A.I. Business Owner Emergency Hard Drive Disposal Recording Optimization Society Communitications Computer Care Dark Web Free Resource Micrsooft LinkedIn Supply Chain Management Employer Employee Relationship IP Address Microsoft Excel SSID Upselling G Suite Drones Video Surveillance Internet Service Provider Hacks Physical Security Migration Connected Devices Application Google Drive Windows Server 2008 Processing Webinar AI Wireless Headphones Human Resources Health IT Banking Botnet Network Management Spyware Mobile Payment Wasting Time Saving ZTime Skype Regulations Compliance Relocation Tablets Equifax Fleet Tracking Logistics Virtual Machines Archive IT Assessment Electricity Printing Bookmark Remote Working Device security MSP Cyber security Permissions Language Sync Employer/Employee Relationships Debate CCTV Desktop Finance Digital Signature Google Play Telephone Service Harddrive Point of Contact Supply Chains Nanotechnology Social Network Electronic Health Records Business Metrics Computer Malfunction Business Cards Service Level Agreement cache Television Managing Costs switches Writing Financial Data Reliable Computing Startup Asset Tracking Microsoft 365 Music GPS WannaCry Browsers Upgrades External Harddrive Best Practives Username Medical IT Trend Micro Memes In Internet of Things Unified Threat Management Backup and Disaster Recovery User Tip Proactive Maintenance Recycling Managing IT Services Gamification Time Management Freedom of Information Security Cameras Threats LiFi Analytic 2FA Screen Reader Customer Resource management PDF Corporate Profile Microserver Ebay Surveillance Motion Sickness Piracy Upload Best Available Keyboard Assessment SharePoint Navigation Virtual Machine Thin CLient Product Reviews Telework Scalability Smart Tech 3D Database Google Calendar Data Analysis Deep Learning Smart Phones Remote Workers Messenger Tracking HTML Domains Tip of the week eCommerce Work/Life Balance Read IT Fiber-Optic Printers SQL Server Get More Done Virtual Private Network Rental Service Mobile Security Public Speaking Touchscreen News GDPR Managing Risk Visible Light Communication Telephone System VoIP Device Management Adminstration Turn Key Pirating Information Development Web Server Software License Trends Shortcut Consultation Tech Hypervisor IT consulting Printer Server Leadership FinTech Cabling Multi-Factor Security Knowledge Regulation Capital Productuvuty Shopping Personal Information Gig Economy Financial CrashOverride Managing Stress 3D Printing

toner1