facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Most Wonderful Time of the Year...for Thieves

The Most Wonderful Time of the Year...for Thieves

In terms of data loss and theft, the holiday season is one of the riskiest times to travel. When it comes to protecting your personal information, thieves and cybercriminals are counting on either your irreverence to the issue as a whole, or to be so distracted that you make careless mistakes. In 2016, the number of fraud attempts went up by 31% during the holiday season. In addition, credit cards, mobile devices, and open Wi-Fi are common targets during the holiday.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Software Cloud Business Management Hackers Data Hardware Microsoft Workplace Tips Network Security Backup Managed Service Provider Business Hosted Solutions Productivity Email Malware IT Services Saving Money Efficiency Computer Productivity Google User Tips IT Support Smartphones Innovation Small Business Mobile Devices Data Backup Quick Tips VoIP IT Support Collaboration Business Continuity Gadgets Network Microsoft Office communications Social Media Android Data Recovery Upgrade Server Disaster Recovery Cybersecurity Mobile Office Communication Virtualization Smartphone Mobile Device Management Miscellaneous Phishing Holiday Ransomware Operating System Tech Term Vendor Management Windows 10 Passwords Windows Outsourced IT Internet of Things Unified Threat Management Remote Monitoring Managed IT Services Apps Facebook BDR Mobile Device Automation BYOD Remote Computing Apple Mobile Computing Managed IT services Data Management Analytics Users WiFi Windows 10 Artificial Intelligence The Internet of Things Marketing History Browser Save Money Cloud Computing Firewall Alert App Big data Help Desk Training Bandwidth IT Consultant Business Technology Spam Encryption Office 365 Two-factor Authentication Government Office Access Control Health Cybercrime Content Filtering Managed IT Information Technology Going Green Hard Drives Bring Your Own Device Maintenance Antivirus Printer Gmail Healthcare Recovery Employer-Employee Relationship Windows 7 Retail Managed Service Lithium-ion Battery Best Practice Cost Management Outlook Windows 8 Hiring/Firing Budget Information Wireless Technology Saving Time Computers VPN Virus Tech Support Search Travel Education Update iPhone It Management Phone System Blockchain Hacking Data Loss IBM Money Document Management Networking Project Management Humor Customer Service Twitter Intranet SaaS Computing Website Avoiding Downtime File Sharing Applications Risk Management Hard Drive Law Enforcement Current Events Compliance Value Mobility Patch Management Solid State Drive Password Conferencing Save Time Data storage Hacker Downtime Customer Relationship Management Augmented Reality Data Breach PowerPoint Proactive IT Running Cable Legal Regulations Administration Wireless Sports Cooperation Software as a Service DDoS Storage Vendor Disaster End of Support Hosted Solution Robot Word Data Security Securty Google Maps Business Intelligence Cortana Excel Social Engineering Digital Payment Flexibility Router Scam Black Market Voice over Internet Protocol Cryptocurrency Laptop Fax Server Comparison Tablet Monitoring Private Cloud Company Culture Business Growth Digital User Computer Repair Wi-Fi Virtual Desktop Telephony Social Networking Websites Management Social Machine Learning Paperless Office Vulnerabilities Telephone Systems Teamwork Heating/Cooling Unified Communications Settings Entertainment Public Cloud Licensing Uninterrupted Power Supply Processor Streaming Media Vulnerability Inbound Marketing Bitcoin Identity Theft IT service Data Protection Net Neutrality Distribution Pain Points eWaste Chrome Downloads User Error Politics Professional Services Co-managed IT Virtual Reality Emails Bluetooth Automobile Chromebook Computer Accessories Redundancy Smart Devices Processors Computing Infrastructure Hack Lifestyle Google Docs USB Meetings Memory How To Download Managed Services Provider Trending Evernote Presentation Gaming Console Experience Mouse Monitors Virtual Assistant Cleaning Office Tips Multi-factor Authentication Webcam Specifications Safety Text Messaging Microchip Taxes Statistics Telephone Start Menu Programming Tech Terms Managed IT Service Mobile Technology YouTube Network Congestion Documents Distributed Denial of Service Computer Care Get More Done Micrsooft Device security MSP Thin CLient Employer Employee Relationship Cyber security Microsoft Excel 3D G Suite Ebay Bookmark Desktop Finance Smart Phones Hacks Physical Security Google Play Telephone Service Google Drive Windows Server 2008 Printer Server Nanotechnology Social Network Employer/Employee Relationships Drones Turn Key Managing Costs Recycling Spyware Mobile Payment Trojan Startup Asset Tracking Relocation Tablets Microsoft 365 Analytic Electronic Health Records PDF Business Cards Service Level Agreement Banking Botnet Electricity Printing Best Available Keyboard Username Leadership Medical IT Trend Micro Product Reviews Permissions Organize Language Memes Unified Threat Management Backup and Disaster Recovery Adminstration Sync Pirating Information Browsers Gamification Notifications CCTV Security Cameras Threats Domains Screen Reader Customer Resource management User Tip Proactive Maintenance Read Business Metrics Computer Malfunction Navigation Virtual Machine cache Television switches Writing Public Speaking Smart Tech Reliable Computing Solutions Music Piracy Upload Data Analysis Employees Device Management WannaCry Upgrades Shortcut HTML eCommerce IT Fiber-Optic Database In Internet of Things Entrepreneur Mobile Security GDPR Managing Risk Business Managemenet Time Management Freedom of Information LiFi Webinar Troubleshooting Telephone System SQL Server Content Management Corporate Profile Motion Sickness Tech Hypervisor Assessment SharePoint HIPAA Multi-Factor Security Cost Upselling Scalability Integration Environment Software License Trends Fileless Malware Hybrid Cloud online Currency Google Calendar Deep Learning Competition Devices Messenger Tracking Holidays Tip of the week Work/Life Balance Electronic Payment Fraud Tactics Video Surveillance UTM Content Rental Service Saving ZTime Modem Strategy Touchscreen News Visible Light Communication Business Owner Proxy Server Azure VoIP IT Plan Enterprise Resource Planning Web Server Term LinkedIn Consultation IT consulting IP Address Legislation Error Cabling Electronic Medical Records Transportation Knowledge Directions Display Technology Tips Best Practives Application Accountants A.I. Harddrive Books Workers Recording Optimization Communitications email scam Human Resources Addiction Administrator Debate CIO Supercomputer SSID How To Skype Fake News Advertising Flash GPS Dark Web Free Resource Archive Audit Migration Connected Devices External Harddrive Processing Managed Services Data Warehousing Windows XP Wireless Headphones Worker Health IT Employee/Employer Relationship Staffing Google Wallet Microserver Wasting Time Access Displays Digital Signature Equifax Fleet Tracking Reading Samsung Logistics Virtual Machines Point of Contact Emergency Hard Drive Disposal Society IT Assessment Network Management Productuvuty Personal Information Financial Surveillance Managing Stress Printers CrashOverride Regulation 3D Printing Capital

toner1