facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Good, the Bad and the Risky: Current State of IT Security for SMBs


Technology has revolutionized business. However, along with all the advantages and benefits technology affords us, it comes with a few risks and vulnerabilities that some businesses are still struggling to come to terms with. For example, storing records electronically makes them easier to organize and locate when they’re needed. It also makes them vulnerable to hacker and cyber-attacks. Still, most SMBs are working toward mitigating risks as opposed to abandoning the use of technology in their business operations - and a current assessment of the situation does show improvement over past years.

Continue reading

Unified Threat Management Keeps Your Network Safer


Network security is equally important for businesses of all sizes. Ensuring that your infrastructure remains firm is one of the most crucial tasks in managing a business. You don’t have to do it alone, though. There are enterprise-level tools available that can give small businesses the same security standards as larger organizations, and it all starts with a Unified Threat Management (UTM) solution.

Continue reading

Alert: A New Android Threat Spreads Malicious Adware

b2ap3_thumbnail_cybersecurity_400.jpgMalware and viruses are so common nowadays in the technology world that it’s no surprise when new ones are created. Thus, it should come as no surprise that hackers are looking to spread smartphone malware to unsuspecting users around the world. Kemoge, a new malicious adware for the Android mobile operating system, has spread to 20 countries, and is taking the mobile device world by storm.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Email Saving Money Hosted Solutions Malware IT Services Efficiency IT Support Google Small Business User Tips Computer Smartphones Mobile Devices Innovation Quick Tips Business Continuity Gadgets Disaster Recovery VoIP Microsoft Office Network Social Media Android Productivity Data Backup Collaboration Communication Mobile Office Virtualization Server Smartphone communications Data Recovery Mobile Device Management Miscellaneous Upgrade Cybersecurity IT Support Ransomware Windows 10 Tech Term Phishing Unified Threat Management Windows Operating System Vendor Management Passwords Holiday Facebook Remote Monitoring BYOD Managed IT services Remote Computing Automation Apps Analytics Mobile Computing BDR WiFi Users The Internet of Things Apple Mobile Device Marketing Outsourced IT Internet of Things Data Management History Firewall Artificial Intelligence App Managed IT Services Browser Alert Save Money Encryption IT Consultant Cloud Computing Big data Office 365 Spam Health Two-factor Authentication Gmail Content Filtering Going Green Office Windows 10 Bring Your Own Device Maintenance Bandwidth Printer Antivirus Managed IT Virus Training Tech Support Search Budget Hiring/Firing Hard Drives Business Technology Lithium-ion Battery Best Practice Information Technology Saving Time Cybercrime Outlook Windows 8 Help Desk Cost Management Wireless Technology Access Control Money Document Management It Management Phone System Blockchain Computers VPN Recovery Employer-Employee Relationship IBM Travel Education Healthcare Update Hacking Save Time Compliance Data storage Managed Service File Sharing Customer Service Hard Drive iPhone Running Cable Proactive IT Legal Mobility Networking Government Website Information Regulations Intranet Twitter Augmented Reality SaaS PowerPoint Risk Management Law Enforcement Humor Applications Administration Solid State Drive Digital Payment Router Downtime Black Market User Flexibility Cryptocurrency Avoiding Downtime Comparison Tablet Data Security Company Culture Social Laptop Computer Repair Wireless Business Growth Google Maps DDoS Current Events Patch Management Social Networking Data Loss Social Engineering Scam Excel Management Paperless Office Vulnerabilities Data Breach Customer Relationship Management Word Sports Retail Disaster Computing Fax Server Password Cortana Hosted Solution Digital Value End of Support Project Management Telephony Robot Websites Securty Machine Learning Hacker Business Intelligence Telephone Systems USB Distribution Software as a Service Vendor Uninterrupted Power Supply Presentation Public Cloud Bluetooth Computer Accessories Conferencing Vulnerability Safety Virtual Desktop Bitcoin Inbound Marketing Identity Theft Specifications Data Protection Google Docs Windows 7 Trending Documents Experience Mouse Monitoring Entertainment Cleaning Pain Points Politics Heating/Cooling Monitors Virtual Reality User Error Programming Emails Office Tips Co-managed IT Statistics Storage Automobile Network Congestion Chromebook Voice over Internet Protocol Computing Infrastructure Hack YouTube Redundancy Unified Communications Settings How To Streaming Media Download eWaste Evernote Private Cloud Lifestyle Gaming Console Virtual Assistant Start Menu Tech Terms Webcam Microchip Taxes Text Messaging Net Neutrality IT service Distributed Denial of Service Processors Mobile Technology Chrome Cooperation Piracy Upload Computer Care Content Management Employer Employee Relationship Google Play Smart Tech Upgrades Microsoft Excel Business Managemenet Business Owner G Suite Thin CLient Hacks Physical Security Processor HTML Google Drive Windows Server 2008 3D Ebay IP Address Licensing Microsoft 365 Fiber-Optic LiFi Database Get More Done Smart Phones Banking Botnet Browsers Human Resources Mobile Security Printer Server Spyware Mobile Payment online Currency Relocation Application Tablets Medical IT Telephone System Turn Key User Tip Software License Trends Work/Life Balance Trojan Electricity Printing Security Cameras Multi-Factor Security Deep Learning Cost Sync Leadership Notifications CCTV Navigation Devices Organize Adminstration Pirating Information LinkedIn Solutions Fraud Visible Light Communication Tactics Memory Business Metrics Computer Malfunction Data Analysis UTM Content cache Television Digital Signature Reliable Computing Professional Services IT consulting In Internet of Things IT Plan Enterprise Resource Planning WannaCry Downloads Archive Teamwork GDPR Legislation Error Skype Addiction Flash Corporate Profile Tech CIO Accountants A.I. Time Management Freedom of Information Integration email scam Advertising Point of Contact PDF Motion Sickness Fileless Malware Staffing Multi-factor Authentication Google Wallet Webinar Assessment SharePoint Scalability Windows XP Proxy Server Migration Society Connected Devices Google Calendar Upselling Best Available Messenger Keyboard Tracking Modem Wireless Headphones Displays Telephone Tip of the week Network Management VoIP Rental Service Meetings Term Equifax Micrsooft Fleet Tracking Touchscreen News Video Surveillance Electronic Medical Records Domains Knowledge Saving ZTime Analytic Web Server Directions Device security Drones MSP Consultation Recycling Public Speaking Cabling Recording Product Reviews Wi-Fi Administrator Dark Web Desktop Finance Technology Tips Books Shortcut Workers SSID Nanotechnology Social Network Business Cards Permissions Service Level Agreement Language Best Practives Audit Harddrive Read Entrepreneur Supercomputer Processing Startup Asset Tracking Fake News Debate Troubleshooting Health IT Environment Managed IT Service Username Data Warehousing GPS HIPAA Worker Logistics Unified Threat Management Backup and Disaster Recovery Electronic Payment Bookmark Music Gamification Access Device Management Reading Competition Samsung switches Screen Reader Writing Customer Resource management Microserver Emergency Hard Drive Disposal External Harddrive Productuvuty Managing Stress Regulation 3D Printing Printers CrashOverride Capital