facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Need to Pay Attention to What USB Devices Connect to Your Network

You Need to Pay Attention to What USB Devices Connect to Your Network

USB technology is common in the workplace, and we bet that you’d have a hard time finding an office that doesn’t use it to some extent. However, if you’re not careful, these devices could become open gateways for threats to infiltrate your network, putting your entire data infrastructure at risk. This makes it exceedingly important to know where your USB devices have been, and what they might contain.

0 Comments
Continue reading

The Threat Level for BadUSB Malware has Increased

b2ap3_thumbnail_badusb_is_dangerous_400.jpgThis past August, we reported on a new vulnerability with USB firmware called BadUSB. This vulnerability was discovered by Karsten Nohl of SR Labs. The BadUSB vulnerability was presented at the Black Hat security conference as a theoretical risk, but now, the code has leaked and this risk has become a reality. Oops.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Hackers Software Business Management Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Network Security Business Email Saving Money Malware Hosted Solutions IT Services IT Support Efficiency Google Small Business Computer Smartphones Quick Tips User Tips Mobile Devices Innovation Gadgets Business Continuity Disaster Recovery Microsoft Office VoIP Android Network Social Media Productivity Collaboration Mobile Office Virtualization Data Backup Server Mobile Device Management Smartphone Communication Data Recovery Miscellaneous Ransomware Windows 10 communications Upgrade Tech Term Unified Threat Management IT Support Windows Holiday Operating System Passwords Remote Monitoring Facebook Managed IT services Vendor Management BYOD Remote Computing Apps Mobile Computing Cybersecurity Phishing WiFi BDR Users Automation Apple Marketing Data Management The Internet of Things Mobile Device Analytics History Firewall Outsourced IT Alert Browser Artificial Intelligence Save Money App Internet of Things Managed IT Services Encryption IT Consultant Big data Antivirus Health Office Content Filtering Spam Going Green Office 365 Maintenance Bandwidth Printer Cloud Computing Bring Your Own Device Gmail Search Cybercrime Business Technology Training Outlook Cost Management Windows 8 Best Practice Information Technology Lithium-ion Battery Windows 10 Hiring/Firing Budget Hard Drives Virus Tech Support Two-factor Authentication Managed IT Help Desk Saving Time Wireless Technology VPN Access Control Travel Phone System Recovery Employer-Employee Relationship Update Blockchain Hacking IBM Money Document Management Healthcare Computers Administration Applications Website Intranet Government Twitter Education Managed Service It Management Networking Legal Risk Management Regulations iPhone Save Time File Sharing Hard Drive SaaS Information Humor Mobility Augmented Reality Law Enforcement Proactive IT PowerPoint Running Cable Customer Service Compliance Data storage Flexibility DDoS Black Market Cryptocurrency Laptop Business Growth Data Security Current Events Machine Learning Telephone Systems Word Avoiding Downtime Patch Management Password Cortana Value Data Loss Paperless Office Scam Business Intelligence Fax Server Digital Payment Sports Hacker Computing Excel Disaster Management Data Breach Router Downtime End of Support Hosted Solution Google Maps Project Management Comparison Tablet Customer Relationship Management Robot Digital Websites Social Engineering Securty User Company Culture Computer Repair Solid State Drive Social Social Networking Wireless Entertainment Download Uninterrupted Power Supply Heating/Cooling Network Congestion Private Cloud Storage Vulnerability Bitcoin Telephony Google Docs Microchip Taxes Experience Conferencing Data Protection Streaming Media Monitors Retail User Error Distributed Denial of Service Inbound Marketing Cleaning Co-managed IT eWaste Office Tips Public Cloud Net Neutrality Monitoring Pain Points YouTube Chrome Cooperation Vendor Lifestyle Identity Theft Unified Communications Settings Redundancy Processors Evernote Computer Accessories USB Presentation Virtual Reality Politics Vulnerabilities Automobile IT service Trending Emails Gaming Console Specifications Safety Mouse Chromebook Start Menu Tech Terms Virtual Desktop Mobile Technology Computing Infrastructure Hack Programming How To Text Messaging Bluetooth Software as a Service Documents Statistics Webcam Gamification Google Drive Windows Server 2008 Fileless Malware Trojan Web Server External Harddrive Screen Reader Customer Resource management Teamwork Point of Contact Voice over Internet Protocol Cabling Upload Deep Learning Spyware Mobile Payment Proxy Server Wi-Fi Administrator Smart Tech Distribution Work/Life Balance Modem Organize Books Workers Piracy Electronic Medical Records 3D Ebay HTML Visible Light Communication Memory PDF Term Supercomputer Thin CLient Fiber-Optic Database Electricity Printing Mobile Security IT consulting Windows 7 Recycling Directions Smart Phones Telephone System Best Available Keyboard Recording Analytic Worker Software License Trends cache Television Domains Dark Web Multi-Factor Security Cost SSID Product Reviews Reading Samsung Health IT Read G Suite Adminstration Pirating Information Devices Advertising Flash Processing Webinar Employer Employee Relationship Leadership Fraud CIO Tactics WannaCry Downloads Public Speaking Licensing UTM Windows XP Content Time Management Freedom of Information Managed IT Service Hacks Physical Security Staffing Google Wallet Corporate Profile Shortcut IT Plan Enterprise Resource Planning Displays Assessment Troubleshooting SharePoint Device Management Bookmark Banking Botnet Legislation Society Error Entrepreneur Relocation Tablets Content Management Sync Accountants A.I. Environment Tip of the week Google Play Business Managemenet email scam Addiction Micrsooft HIPAA Google Calendar Multi-factor Authentication Touchscreen Electronic Payment News Processor Notifications CCTV Drones VoIP Competition Upselling Migration Connected Devices Consultation Business Owner Browsers online Currency Best Practives Business Metrics Computer Malfunction Wireless Headphones Telephone Knowledge Medical IT Reliable Computing Technology Tips IP Address User Tip In Internet of Things Video Surveillance Equifax Permissions Fleet Tracking Language Virtual Assistant Security Cameras Network Management Microserver Device security MSP Fake News Human Resources Navigation LinkedIn Saving ZTime Audit Application Desktop switches Finance Writing Data Warehousing Data Analysis Motion Sickness Nanotechnology Music Social Network Professional Services Scalability Access Archive Get More Done Debate Startup Asset Tracking Emergency Hard Drive Disposal GDPR Skype Messenger Tracking Harddrive Business Cards Service Level Agreement Upgrades Turn Key GPS LiFi Username Microsoft Excel Tech Printer Server Rental Service Meetings Unified Threat Management Backup and Disaster Recovery Digital Signature Computer Care Managing Stress 3D Printing Regulation CrashOverride Capital Printers Productuvuty

toner1