facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Most Wonderful Time of the Year...for Thieves

The Most Wonderful Time of the Year...for Thieves

In terms of data loss and theft, the holiday season is one of the riskiest times to travel. When it comes to protecting your personal information, thieves and cybercriminals are counting on either your irreverence to the issue as a whole, or to be so distracted that you make careless mistakes. In 2016, the number of fraud attempts went up by 31% during the holiday season. In addition, credit cards, mobile devices, and open Wi-Fi are common targets during the holiday.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Hackers Software Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Saving Money Email Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer User Tips Mobile Devices Quick Tips Smartphones Innovation Gadgets Business Continuity VoIP Microsoft Office Disaster Recovery Network Android Social Media Virtualization Collaboration Productivity Data Backup Mobile Office Server Mobile Device Management Communication Smartphone Miscellaneous Data Recovery Upgrade Ransomware Windows 10 Tech Term communications Unified Threat Management Windows IT Support Holiday Facebook Remote Monitoring Passwords Operating System Remote Computing Mobile Computing Vendor Management Managed IT services Cybersecurity Phishing Apps BYOD Users BDR WiFi Automation Apple Mobile Device The Internet of Things Analytics Data Management Marketing Outsourced IT History Firewall Alert Artificial Intelligence App Browser Internet of Things Save Money Managed IT Services Big data IT Consultant Encryption Office Gmail Maintenance Printer Content Filtering Going Green Bandwidth Spam Health Bring Your Own Device Office 365 Antivirus Cloud Computing Windows 10 Best Practice Information Technology Virus Cybercrime Lithium-ion Battery Tech Support Managed IT Training Cost Management Hiring/Firing Hard Drives Help Desk Wireless Technology Business Technology Saving Time Search Budget Outlook Windows 8 Two-factor Authentication Update Recovery Healthcare Employer-Employee Relationship IBM Access Control Hacking Money Document Management Phone System Computers Blockchain VPN Travel Education Information Humor Website iPhone Government SaaS Risk Management Law Enforcement Save Time Compliance Applications Augmented Reality Data storage PowerPoint Managed Service File Sharing Proactive IT Hard Drive Running Cable It Management Administration Legal Networking Mobility Customer Service Twitter Regulations Intranet Paperless Office Management Wireless Avoiding Downtime Data Breach DDoS Sports Disaster Computing Hosted Solution Digital End of Support Project Management Robot Websites Machine Learning Securty Business Intelligence Excel Word Digital Payment Telephone Systems Solid State Drive Password Cortana Router Downtime Customer Relationship Management Value Hacker Black Market Comparison Tablet Flexibility Cryptocurrency Company Culture Current Events Data Security Laptop Computer Repair Google Maps Business Growth Social Networking Patch Management User Data Loss Social Engineering Fax Server Social Scam Inbound Marketing Computing Infrastructure Documents Hack YouTube Redundancy Unified Communications Settings Entertainment How To Streaming Media Heating/Cooling Storage Private Cloud Evernote Vulnerabilities Download Cooperation Pain Points Net Neutrality Vendor Telephony Retail Microchip Taxes IT service Chrome Start Menu Tech Terms Mobile Technology eWaste Distributed Denial of Service Software as a Service Uninterrupted Power Supply Public Cloud Bluetooth Computer Accessories Gaming Console Vulnerability Trending Conferencing Identity Theft Processors Bitcoin Data Protection Text Messaging User Error Google Docs Webcam Co-managed IT USB Mouse Presentation Experience Cleaning Statistics Monitoring Virtual Reality Monitors Programming Politics Specifications Automobile Safety Office Tips Network Congestion Virtual Desktop Emails Lifestyle Chromebook Tracking SSID Society Google Calendar Dark Web Displays Tip of the week Multi-factor Authentication Digital Signature Messenger Recycling Adminstration VoIP Pirating Information Best Practives Wireless Headphones Telephone Health IT Micrsooft Analytic Leadership Touchscreen News Migration Connected Devices Teamwork Rental Service Meetings Processing Equifax Fleet Tracking Cabling Drones Product Reviews Consultation Network Management Web Server Managed IT Service Knowledge Books Workers Technology Tips Wi-Fi PDF Administrator Bookmark Read Virtual Assistant Device security Microserver MSP Google Play Permissions Language Audit Nanotechnology Social Network Fake News Desktop Finance Best Available Keyboard Supercomputer Get More Done Startup Asset Tracking Domains Worker Data Warehousing Business Cards Service Level Agreement Processor Device Management Reading Public Speaking Samsung Medical IT Music Business Managemenet Access Unified Threat Management Printer Server Backup and Disaster Recovery Browsers switches Writing Content Management Upselling Emergency Hard Drive Disposal Turn Key Username Security Cameras Video Surveillance Computer Care Trojan Screen Reader Customer Resource management G Suite User Tip Upgrades Microsoft Excel Gamification Shortcut Employer Employee Relationship Smart Tech Distribution Troubleshooting Licensing Saving ZTime Google Drive Windows Server 2008 Piracy Organize Upload Hacks Entrepreneur Physical Security Navigation LiFi online Currency HIPAA Relocation Tablets Professional Services Spyware Mobile Payment Fiber-Optic Database Banking Environment Botnet Data Analysis HTML GDPR Work/Life Balance LinkedIn Electricity Debate Printing Telephone System Electronic Payment Sync Deep Learning Harddrive Mobile Security Competition GPS Multi-Factor Security Cost Business Owner Windows 7 Software License Trends Notifications CCTV Tech Visible Light Communication Memory Reliable Computing IP Address Voice over Internet Protocol External Harddrive Skype cache Television Fraud Webinar Tactics Business Metrics Computer Malfunction Fileless Malware IT consulting Archive Devices Modem WannaCry Downloads In Internet of Things Human Resources Proxy Server UTM Content Application 3D Corporate Profile Ebay Legislation Error Electronic Medical Records CIO Point of Contact Thin CLient Time Management Freedom of Information IT Plan Enterprise Resource Planning Term Advertising Flash Accountants A.I. Scalability Recording Staffing Google Wallet Smart Phones Assessment SharePoint email scam Addiction Motion Sickness Directions Windows XP CrashOverride Capital Productuvuty Printers Managing Stress Regulation 3D Printing