facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Let Employee Access Doom Your Company

Don’t Let Employee Access Doom Your Company

When it comes to protecting your business, cybersecurity is a huge consideration that must be kept in mind. However, it isn’t the only consideration. Some of the biggest threats to your business can actually come from your own team. Let’s go over the three kinds of insider threats that you need to be on your guard against, and how to avoid them.

0 Comments
Continue reading

Useful Tips for Speaking Tech to the Technology Layman

Useful Tips for Speaking Tech to the Technology Layman

With so many different technologies being used in business, it can sometimes be too much for the people out there who aren’t as tech savvy as others. In fact, some of the people you will work alongside will not be able to grasp some of the simplest technology concepts. Unfortunately, these people don’t know a fraction of what they need to about the technology they use, and it could put your organization at a disadvantage. This month, we thought we’d give you a few pointers on how to talk to your less-technology-inclined co-workers.

0 Comments
Continue reading

Train your Staff on These 4 Security Strategies

Train your Staff on These 4 Security Strategies

Millions of people find themselves sitting in front of a computer moving files around and corresponding with people over the phone, through email, or updating info in the company’s line of business app. What many of them don’t know, however, is that, at any time, they are only a couple of clicks away from causing major problems for their company. Therefore, it is extremely important to train your staff on what to look for and how to address those situations when they do arise.

0 Comments
Continue reading

Tip of the Week: Lock Your Network Down with These Tips

Tip of the Week: Lock Your Network Down with These Tips

There are a lot of security threats directed toward businesses today, with plenty of immoral opportunists seeking to profit at your expense. This makes it critical to secure your network and its data, which sounds like an expensive and time-consuming process. However, it doesn’t have to be, as we’ll show you by highlighting a few ways to protect your business and its assets.

0 Comments
Continue reading

Windows 7 Still Causing Issues

Windows 7 Still Causing Issues

Millions of people are still using the Microsoft Windows 7 operating system despite it being completely unsupported. When Microsoft pulled the plug on support for the OS in January, most industry professionals expected there to be some exploits found pretty rapidly. It turns out that the very first exploit was actually Microsoft’s fault, and that Windows 7 support had a little life in it after all. 

0 Comments
Continue reading

Securing Where IT and OT Meet

Securing Where IT and OT Meet

Over the past two decades, business technology was largely separated between information technology (IT)--that is, the business’ computers, networking equipment, and peripherals--and operational technology (OT): all other technology. As IT advanced, so has OT, which today presents many of the same risks that IT always has. Today, we will take a look at how to secure your business by focusing on where your IT meets your OT.

0 Comments
Continue reading

CES Introduced New Surveillance Technology

CES Introduced New Surveillance Technology

The 2020 Consumer Electronics Show is always a good place to see the most innovative consumer technology. CES features products of all types from companies of all sizes. This year, there was a strong contingent of companies bringing products to market in the physical security space. This isn’t all that uncommon, but the reaction to many of these devices is noteworthy.

0 Comments
Continue reading

Don’t Be Dumb About Smart Technology

Don’t Be Dumb About Smart Technology

A few years ago, there was a decision made to make a concerted effort by manufacturers to create their products, but to also create those same products with “smart” technology inside. Basically, because of the rampant innovation of Internet-connected systems, devices, appliances, and knick-knacks of all types we have to ask the question: Are we being dumb for using all these smart devices? 

0 Comments
Continue reading

Properly Assigning Access Control Measures Doesn’t Have to Be Difficult

Properly Assigning Access Control Measures Doesn’t Have to Be Difficult

Unless you run a business in which each and every employee is responsible for identical tasks, you are going to encounter the need for variable permissions among your staff so that your data can be better protected. One effective means of enforcing these permissions is through an access management policy. Let’s review a few components you should include in such a policy.

0 Comments
Continue reading

Tip of the Week: 3 Key Factors to Securing Your Data

Tip of the Week: 3 Key Factors to Securing Your Data

With data being such a valuable asset today (especially personally identifiable data), you can’t afford to let any of the information your company has access to fall into the wrong hands. The same goes for all of your data, especially that which concerns your employees or your clients. Let’s go over a few tips that should help you keep this data safe, step by step.

0 Comments
Continue reading

Best Practices to Control Your Access Control

Best Practices to Control Your Access Control

Over time, your business will accumulate a lot of data, including some that certain employees or departments will have no need to see (or perhaps shouldn’t see). An effective way of keeping eyes from wandering is through an access management policy. Let’s go over a few elements you ought to prioritize in your approach to controlling internal access.

0 Comments
Continue reading

Start Off 2020 by Auditing Your Online Accounts and Passwords

Start Off 2020 by Auditing Your Online Accounts and Passwords

Let’s take a look at a real-world scenario that I ran into a few weeks ago with a family friend. For the sake of this story, let’s call him Bob. Bob lost access to a pretty important online account.

0 Comments
Continue reading

Security Has to Be a Priority in 2020

Security Has to Be a Priority in 2020

Cybercriminals aren’t exactly holding back when it comes to attacking businesses, which means that businesses can’t rest on their haunches as the new year rolls in. Let’s take a few moments to look toward the near future, and the issues that cybersecurity professionals are warning us about.

0 Comments
Continue reading

Training Has to Be a Big Part of a Cybersecurity Strategy

Training Has to Be a Big Part of a Cybersecurity Strategy

Do you know those horror stories you catch every so often where a huge business has their network hacked and millions of their customers and employees have their personal and financial information leaked onto the dark web? Your organization isn't likely as big as theirs, but regardless of how much money, people, and diverse revenue streams an organization has, having its network breached and its customers’, or its employees’, information strewn about over the dark web is not an ideal scenario. 

0 Comments
Continue reading

How to Shop Securely This Holiday Season

How to Shop Securely This Holiday Season

While the major holiday shopping days have passed us by, many people are still looking for that perfect gift often using the Internet to find it. While online shopping is certainly more convenient, it can also be dangerous. To help keep you safe this season and beyond, we’re reviewing a few practices to protect your identity while shopping online.

0 Comments
Continue reading

A Recent Data Theft Shows Us What to Watch Out For

A Recent Data Theft Shows Us What to Watch Out For

Trend Micro, the developer of the popular antivirus program, has attracted some unwanted attention after a former employee managed to steal customer data and sell it to scammers. These scammers then use this data to call Trend Micro customers. If you use Trend Micro’s antivirus solutions, you’re going to want to pay close attention to any calls you get.

0 Comments
Continue reading

Start Using Two-Factor Authentication Everywhere, Today

Start Using Two-Factor Authentication Everywhere, Today

It can be easy to slack off when it comes to good password practices. Many users still use the same password across multiple sites and often don’t use secure passwords. Password managers make this a lot easier, but it’s really two-factor authentication (2FA) that can make all the difference. Strong, unique passwords are still important (not all accounts offer two-factor authentication) but let’s talk about why you should always enable two-factor or multifactor on all of your accounts when possible.

0 Comments
Continue reading

Who Can You Trust to Keep Your Data Safe?

Who Can You Trust to Keep Your Data Safe?

As business owners, with so much talk about cybersecurity and all of the threats that face us, we tend to put a lot of faith in the security investments we make. I say we, because an IT company has to be as protected, if not more, than their most demanding client. I’m going to talk shop a little bit about security, and some major concerns that I have in regard to all of our businesses.

0 Comments
Continue reading

4 Key Steps to Better Cybersecurity

4 Key Steps to Better Cybersecurity

In many ways, explaining why sufficient cybersecurity is important for your business has become redundant - especially when it is much more important to understand how this cybersecurity needs to protect you. The threats to data and privacy are known, but no less potent. In order to counter them, you need to make sure you have what you need to protect your business - starting with a few key considerations.

0 Comments
Continue reading

Cybersecurity is a Shortcoming for the DHS

Cybersecurity is a Shortcoming for the DHS

Every IT administrator today needs to be concerned about cybersecurity, as does every private business when it comes to its network. However, the same can’t really be said for the computing resources of the government and other public entities… simply due to the lack of talent available.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Software Cloud Business Management Hackers Data Hardware Microsoft Workplace Tips Network Security Backup Managed Service Provider Hosted Solutions Business Productivity Email Malware IT Services Saving Money Efficiency Productivity Google Computer User Tips Innovation IT Support Smartphones Small Business IT Support Mobile Devices Data Backup VoIP Quick Tips communications Collaboration Network Business Continuity Gadgets Android Microsoft Office Social Media Data Recovery Upgrade Cybersecurity Mobile Office Server Disaster Recovery Communication Smartphone Virtualization Mobile Device Management Miscellaneous Phishing Holiday Ransomware Operating System Tech Term Vendor Management Outsourced IT Windows Passwords Windows 10 Unified Threat Management Remote Monitoring Internet of Things Managed IT Services Apps Facebook Automation BDR Mobile Device Data Management BYOD Remote Computing Apple Mobile Computing Analytics Managed IT services Users WiFi Windows 10 Artificial Intelligence The Internet of Things Marketing History Training Firewall Browser Cloud Computing Save Money Alert App Big data Help Desk Office 365 IT Consultant Two-factor Authentication Information Technology Business Technology Bandwidth Spam Encryption Access Control Office Health Content Filtering Windows 7 Gmail Going Green Government Managed IT Cybercrime Bring Your Own Device Hard Drives Antivirus Maintenance Printer VPN Tech Support Virus Budget Managed Service Best Practice Lithium-ion Battery Recovery Windows 8 Outlook Employer-Employee Relationship Information Retail Hiring/Firing Wireless Technology Cost Management Healthcare Saving Time Search Computers Networking Travel Education iPhone Update Phone System Computing Customer Service It Management Blockchain IBM Data Loss Augmented Reality Money Document Management Project Management Humor Hacking Legal Twitter Intranet Avoiding Downtime Applications Regulations File Sharing Risk Management SaaS Hard Drive Conferencing Current Events Wireless Mobility Patch Management Law Enforcement Storage Website Save Time Downtime Customer Relationship Management Compliance Solid State Drive Data storage Data Breach PowerPoint Proactive IT Value Computer Repair Running Cable Password Administration Hacker Telephone Systems Software as a Service Voice over Internet Protocol User Paperless Office Sports Virtual Desktop Social Data Security Disaster End of Support Google Maps Hosted Solution Robot Business Intelligence Excel DDoS Securty Social Engineering Digital Payment Monitoring Cooperation Router Scam Vendor Meetings Word Comparison Tablet Fax Server Management Flexibility Private Cloud Company Culture Black Market Digital Cryptocurrency Wi-Fi Cortana Vulnerabilities Laptop Telephony Social Networking Websites Machine Learning Business Growth Monitors Mobile Technology Network Congestion Cleaning Distributed Denial of Service Processors Office Tips USB Integration Uninterrupted Power Supply Inbound Marketing Public Cloud Presentation Licensing YouTube Distribution Streaming Media Vulnerability Managed Services Provider Unified Communications Settings Identity Theft Specifications Safety Bitcoin Pain Points Data Protection Net Neutrality Documents Co-managed IT Politics Teamwork Heating/Cooling Downloads Managed Services User Error Virtual Reality Entertainment Chrome Emails Managed IT Service IT service Automobile Chromebook Computing Infrastructure Hack Redundancy Computer Accessories Gaming Console Processor Multi-factor Authentication Lifestyle Bluetooth How To eWaste Trending Evernote Telephone Download Smart Devices Text Messaging Webcam Virtual Assistant Mouse Google Docs Memory Microchip Taxes Start Menu Tech Terms Statistics Professional Services Programming Experience Service Level Agreement Communitications 3D Reading Ebay Samsung Access Competition GDPR Startup Managing Risk Asset Tracking Point of Contact Thin CLient Electronic Payment Emergency Hard Drive Disposal Business Cards SQL Server CIO Employer Employee Relationship Computer Care Tech Hypervisor Username Get More Done Advertising Flash Smart Phones G Suite Business Owner Microsoft Excel Unified Threat Management Backup and Disaster Recovery Hacks Physical Security Fileless Malware Hybrid Cloud Gamification Turn Key Windows XP Google Drive IP Address Windows Server 2008 Screen Reader Holidays Customer Resource management Printer Server Staffing Google Wallet Proxy Server Piracy Azure Upload Recycling Displays IT Assessment Adminstration Relocation Pirating Information Tablets Spyware Application Mobile Payment Modem Smart Tech Strategy Analytic Trojan Society Banking Leadership Botnet Human Resources Micrsooft Electricity Printing Term HTML Product Reviews Sync Electronic Medical Records Fiber-Optic Transportation Database Organize Drones Notifications CCTV Directions Mobile Security Display Recording Optimization Telephone System Read Dark Web Software License Free Resource Trends Electronic Health Records Reliable Computing Digital Signature cache Television SSID Multi-Factor Security How To Cost Business Metrics Computer Malfunction Memes WannaCry Processing Devices Permissions Language In Internet of Things Health IT Fraud Employee/Employer Relationship Tactics Device Management Upselling Corporate Profile UTM Wasting Time Content Business Managemenet Time Management Freedom of Information Logistics Virtual Machines Content Management Webinar Bookmark IT Plan Enterprise Resource Planning switches Writing Surveillance Scalability Video Surveillance Assessment SharePoint Legislation Cyber security Error Music Motion Sickness PDF Upgrades IT Messenger Best Available Tracking Keyboard Google Calendar Google Play Accountants Telephone Service A.I. Saving ZTime Tip of the week email scam Employer/Employee Relationships Addiction online Currency Rental Service VoIP Managing Costs LiFi Touchscreen Domains News Microsoft 365 Knowledge Browsers Migration Connected Devices LinkedIn Development Debate Cabling Consultation Public Speaking Medical IT Wireless Headphones Trend Micro Harddrive Web Server Deep Learning GPS Books Workers Shortcut Technology Tips Security Cameras Equifax Threats Fleet Tracking Best Practives Work/Life Balance Administrator User Tip Proactive Maintenance Network Management Supercomputer Entrepreneur Audit Navigation Device security Virtual Machine MSP Skype Visible Light Communication External Harddrive Troubleshooting Fake News Solutions Archive Environment Data Analysis Desktop Employees Finance Microserver IT consulting Video Conferencing HIPAA Worker Data Warehousing Nanotechnology eCommerce Social Network Printers Productuvuty Managing Stress Regulation Personal Information CrashOverride Financial Capital 3D Printing

toner1