facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Need to Pay Attention to What USB Devices Connect to Your Network

You Need to Pay Attention to What USB Devices Connect to Your Network

USB technology is common in the workplace, and we bet that you’d have a hard time finding an office that doesn’t use it to some extent. However, if you’re not careful, these devices could become open gateways for threats to infiltrate your network, putting your entire data infrastructure at risk. This makes it exceedingly important to know where your USB devices have been, and what they might contain.

0 Comments
Continue reading

The Threat Level for BadUSB Malware has Increased

b2ap3_thumbnail_badusb_is_dangerous_400.jpgThis past August, we reported on a new vulnerability with USB firmware called BadUSB. This vulnerability was discovered by Karsten Nohl of SR Labs. The BadUSB vulnerability was presented at the Black Hat security conference as a theoretical risk, but now, the code has leaked and this risk has become a reality. Oops.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Software Internet Cloud Data Hackers Business Management Workplace Tips Hardware Network Security Microsoft Productivity Backup Business Hosted Solutions Email Managed Service Provider Productivity IT Services Efficiency Saving Money Malware Innovation Google Small Business User Tips Computer Collaboration IT Support VoIP Data Backup Quick Tips Smartphones Network IT Support Data Recovery Mobile Devices communications Microsoft Office Android Business Continuity Gadgets Disaster Recovery Smartphone Cybersecurity Phishing Communication Social Media Upgrade Mobile Office Server Mobile Device Virtualization Miscellaneous Ransomware Users Managed IT Services Mobile Device Management Passwords Windows Holiday BDR Operating System Vendor Management Apps Internet of Things Tech Term Windows 10 Outsourced IT Remote Monitoring Facebook Unified Threat Management Automation BYOD Mobile Computing Analytics Managed IT services WiFi Data Management Remote Computing Covid-19 Apple Windows 10 Marketing Training Browser Spam Help Desk The Internet of Things Save Money Managed Service History Cloud Computing Artificial Intelligence Firewall Business Technology Bandwidth Big data Encryption Health App Alert Office 365 IT Consultant Office Budget Information Technology Two-factor Authentication Gmail Government Managed IT Cybercrime Bring Your Own Device Maintenance Antivirus Printer Hard Drives Access Control Networking VPN Windows 7 Blockchain Content Filtering Wi-Fi Information Going Green Windows 8 Healthcare Outlook Recovery Employer-Employee Relationship Retail Wireless Technology Document Management Hiring/Firing Virus Tech Support Search Cost Management Saving Time Remote Work Computers Lithium-ion Battery Best Practice Risk Management IBM Storage Augmented Reality Project Management Money Humor Vendor Hacking Conferencing Avoiding Downtime It Management Data Security iPhone Travel Phone System Patch Management Education Computing Data Loss Customer Service Update Wireless Remote Customer Relationship Management Data Breach Law Enforcement Website PowerPoint Solid State Drive Save Time Compliance Router Downtime Data storage Flexibility File Sharing Applications Administration Hard Drive Password Laptop Value Proactive IT Mobility Computer Repair Running Cable Hacker Legal Regulations Meetings Twitter Intranet Current Events SaaS Voice over Internet Protocol End of Support Machine Learning Vulnerabilities Robot Net Neutrality DDoS Securty Telephone Systems Business Intelligence Fax Server Chrome Digital Payment Employee/Employer Relationship Digital Websites Cooperation Black Market Word Comparison Tablet Cryptocurrency Software as a Service Cortana Google Maps Company Culture Business Growth Social Engineering Social Networking Monitoring Employees Paperless Office Private Cloud Sports User Management Disaster Virtual Desktop Excel Telephony Scam Hosted Solution Social Managed Services Provider Microchip Taxes Redundancy Documents Distributed Denial of Service Entertainment IT service Teamwork Heating/Cooling Display Smart Devices How To Lifestyle Evernote Managed Services Virtual Assistant Gaming Console Public Cloud Licensing Video Conferencing Bluetooth Managed IT Service Webcam Start Menu Tech Terms Text Messaging Identity Theft Computer Accessories Notifications Distribution eWaste Mobile Technology Trending Memory Google Docs Processor Mouse Politics Uninterrupted Power Supply Experience Virtual Reality Monitors Emails Cost Vulnerability Cleaning Automobile Chromebook Statistics Bitcoin Processors Solutions Programming Office Tips Inbound Marketing Professional Services eCommerce Data Protection Network Congestion USB Computing Infrastructure Hack YouTube Presentation How To Download Unified Communications Settings Pain Points Integration Downloads Time Management Specifications Safety Holidays Co-managed IT Streaming Media User Error Multi-factor Authentication Telephone Term Equifax Fleet Tracking Tip of the week Virtual Private Network Permissions Language Upselling Electronic Medical Records Transportation Worker Network Management Google Calendar Read Digital Signature Device security MSP Touchscreen News Development Recording Optimization Reading Samsung VoIP FinTech Directions Video Surveillance switches Writing Saving ZTime SSID Employer Employee Relationship Nanotechnology Social Network Knowledge Data Storage Music Dark Web Free Resource G Suite Desktop Finance Device Management Consultation Processing Hacks Physical Security Startup Asset Tracking Business Managemenet Procurement PDF Health IT Business Cards Service Level Agreement Content Management Technology Tips Reviews Upgrades Banking Best Practives Botnet Username Fake News LiFi Harddrive Logistics Virtual Machines Relocation Unified Threat Management Tablets Backup and Disaster Recovery Audit Organization Best Available Keyboard Debate Wasting Time online Currency Data Warehousing Communitications Domains Cyber security Screen Reader Customer Resource management PCI DSS GPS Bookmark Sync Gamification Public Speaking External Harddrive Google Play Telephone Service CCTV Smart Tech Emergency Hard Drive Disposal Supply Chain Management Work/Life Balance Employer/Employee Relationships Piracy Microserver Upload Access Shopping Deep Learning Business Metrics Computer Malfunction HTML LinkedIn Microsoft Excel Internet Service Provider Visible Light Communication Microsoft 365 Reliable Computing Fiber-Optic Database Computer Care AI Shortcut Managing Costs Google Drive Windows Server 2008 IT Assessment IT consulting Troubleshooting Thin CLient Medical IT Trend Micro Telephone System Regulations Compliance Entrepreneur 3D Browsers Ebay Get More Done In Internet of Things Mobile Security HIPAA Smart Phones Security Cameras Threats Printer Server Multi-Factor Security Skype Remote Working Environment User Tip Proactive Maintenance Software License Turn Key Trends Spyware Archive Mobile Payment Gig Economy Trojan Motion Sickness Devices Advertising Electronic Payment Flash Scalability Fraud Tactics Electricity Printing Supply Chains CIO Competition Navigation Virtual Machine Electronic Health Records Windows XP Business Owner Leadership Messenger Organize Tracking Point of Contact Financial Data Staffing Google Wallet Adminstration Data Analysis Pirating Information UTM Content Displays IP Address GDPR Managing Risk Rental Service Legislation Error Society Printers SQL Server IT Plan Enterprise Resource Planning cache Television Memes Smartwatch Hypervisor Web Server Accountants A.I. Managing IT Services Human Resources email scam Cabling Addiction WannaCry 2FA Micrsooft Application Tech Recycling Freedom of Information Surveillance Books Workers Corporate Profile Analytic Telework Drones Fileless Malware Hybrid Cloud Administrator Modem Strategy Webinar Supercomputer Wireless Headphones Product Reviews Remote Workers Proxy Server Azure Migration Connected Devices Assessment SharePoint IT CrashOverride Capital Personal Information Productuvuty 3D Printing Financial Managing Stress Regulation CES

toner1