facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Recent Data Theft Shows Us What to Watch Out For

A Recent Data Theft Shows Us What to Watch Out For

Trend Micro, the developer of the popular antivirus program, has attracted some unwanted attention after a former employee managed to steal customer data and sell it to scammers. These scammers then use this data to call Trend Micro customers. If you use Trend Micro’s antivirus solutions, you’re going to want to pay close attention to any calls you get.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Data Hackers Hardware Microsoft Network Security Workplace Tips Backup Managed Service Provider Hosted Solutions Business Productivity Email Productivity Malware IT Services Saving Money Efficiency Google Computer User Tips Small Business Innovation IT Support Collaboration Smartphones VoIP IT Support Data Backup Quick Tips Mobile Devices Network Business Continuity communications Microsoft Office Gadgets Data Recovery Android Social Media Upgrade Disaster Recovery Cybersecurity Communication Mobile Office Server Smartphone Virtualization Miscellaneous Phishing Mobile Device Management Vendor Management Holiday Ransomware Windows Passwords Windows 10 Tech Term Outsourced IT Operating System Managed IT Services Mobile Device Apps Remote Monitoring Facebook Users Internet of Things Unified Threat Management BDR Automation Managed IT services Mobile Computing Analytics Data Management BYOD Remote Computing Apple Windows 10 WiFi Cloud Computing Artificial Intelligence Marketing The Internet of Things History Browser Save Money Firewall Training Alert Encryption Big data Help Desk App IT Consultant Information Technology Office Business Technology Spam Office 365 Bandwidth Two-factor Authentication Health Managed IT Gmail Content Filtering Access Control Government Going Green Windows 7 Cybercrime Bring Your Own Device Antivirus Maintenance Printer Hard Drives Budget VPN Information Best Practice Lithium-ion Battery Healthcare Recovery Employer-Employee Relationship Retail Outlook Windows 8 Cost Management Wireless Technology Managed Service Search Hiring/Firing Virus Tech Support Computers Saving Time Travel Phone System Education IBM It Management Update Augmented Reality Networking Blockchain Data Loss Hacking Money Humor Document Management Computing Project Management iPhone Customer Service Wireless Compliance Mobility Solid State Drive Data storage Intranet Twitter Flexibility Storage Website Current Events Customer Relationship Management Data Security Risk Management Legal PowerPoint Patch Management Value Applications Covid-19 Password Save Time Regulations Downtime Hacker Administration Data Breach Conferencing SaaS Computer Repair Running Cable Proactive IT File Sharing Avoiding Downtime Law Enforcement Hard Drive Management Software as a Service Social Engineering DDoS Black Market Excel Vulnerabilities Cryptocurrency Laptop Meetings Business Growth Word Remote Work Private Cloud Wi-Fi Cooperation Net Neutrality Business Intelligence Cortana Fax Server Telephony Vendor Digital Payment Scam Machine Learning Paperless Office Router Telephone Systems Sports Disaster Comparison Tablet Hosted Solution Digital Company Culture End of Support Monitoring Robot User Websites Securty Virtual Desktop Social Networking Social Voice over Internet Protocol Google Maps Documents Network Congestion Virtual Reality Politics Pain Points Multi-factor Authentication Automobile Telephone Managed Services Provider Teamwork Heating/Cooling Emails Bluetooth Uninterrupted Power Supply Entertainment Chromebook Vulnerability Streaming Media Computing Infrastructure User Error Hack Bitcoin Co-managed IT How To Managed Services Google Docs Employee/Employer Relationship Memory Data Protection Managed IT Service Experience Download Cleaning eWaste Downloads Monitors Gaming Console Lifestyle Office Tips Chrome Processor Microchip Webcam Taxes Text Messaging Distribution Distributed Denial of Service YouTube Redundancy Processors Computer Accessories Unified Communications Settings USB Evernote Public Cloud Licensing Professional Services Presentation Trending Virtual Assistant Identity Theft Inbound Marketing Smart Devices Mouse Integration IT service Start Menu Specifications Tech Terms Safety Mobile Technology Programming Statistics Point of Contact Computer Care In Internet of Things Modem Strategy Upgrades Communitications Digital Signature Microsoft Excel Organize Proxy Server Azure Wireless Headphones Term Google Drive Windows Server 2008 Migration Connected Devices Electronic Medical Records Transportation LiFi Supply Chain Management Directions Display Spyware Mobile Payment Motion Sickness Network Management Recording Optimization Internet Service Provider Scalability Equifax Fleet Tracking Free Resource Work/Life Balance Electricity PDF Printing Analytic SSID How To Deep Learning IT Assessment Recycling Messenger Upselling Device security Tracking MSP Dark Web Nanotechnology Video Surveillance Social Network Processing Best Available Keyboard Rental Service Webinar Desktop Finance Health IT Visible Light Communication Remote Working Product Reviews Wasting Time cache Television Read Business Cards Web Server Saving ZTime Service Level Agreement Logistics IT consulting Virtual Machines Domains Startup Cabling Asset Tracking Bookmark WannaCry Unified Threat Management Administrator Backup and Disaster Recovery Cyber security Electronic Health Records Public Speaking Books Workers Username Screen Reader Debate Customer Resource management Google Play CIO Telephone Service Memes Device Management Time Management Shortcut Freedom of Information Harddrive Supercomputer Gamification Employer/Employee Relationships Advertising Flash Corporate Profile Staffing Managing Costs Google Wallet Assessment Entrepreneur Content Management SharePoint Piracy Upload Microsoft 365 Windows XP Managing IT Services Troubleshooting Business Managemenet GPS Smart Tech Worker Browsers Society Environment Google Calendar Best Practives External Harddrive Fiber-Optic Database Medical IT Trend Micro Displays Surveillance HIPAA Tip of the week Reading HTML Samsung VoIP Electronic Payment G Suite Telephone System Security Cameras Threats Micrsooft IT Touchscreen Competition online Currency News Mobile Security Employer Employee Relationship User Tip Proactive Maintenance Remote Workers Navigation Virtual Machine Drones Consultation Hacks Software License Physical Security Thin CLient Trends Solutions Virtual Private Network Business Owner Knowledge Microserver 3D Multi-Factor Security Ebay Cost Data Analysis Employees Technology Tips Banking Smart Phones Fraud Botnet Tactics eCommerce Development IP Address LinkedIn Relocation Devices Tablets Audit Human Resources Get More Done Sync GDPR Managing Risk Application Fake News UTM Content SQL Server Permissions Language Pirating Information Error Tech Hypervisor Archive Data Warehousing Notifications Printer Server IT Plan CCTV Leadership Enterprise Resource Planning Procurement Skype Turn Key Adminstration Legislation Fileless Malware Hybrid Cloud Music Access Business Metrics Trojan email scam Computer Malfunction Addiction switches Holidays Writing Video Conferencing Emergency Hard Drive Disposal Reliable Computing Accountants A.I. Productuvuty 3D Printing Personal Information Financial CrashOverride Managing Stress Regulation Capital Printers