This website uses cookies in order to offer you the most relevant information. Please accept cookies for the most optimal performance. 

80

Blog

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3 Tips to Get the Most Out of Your IT Infrastructure

b2ap3_thumbnail_rethink_your_organizations_it_400.jpg
Every business wants to be equipped with the latest and greatest IT equipment and software. Yet, due to realities like budget shortcomings, time constraints, and the lack of knowledge about IT trends, it can be difficult for the average SMB to attain that dream technological setup on their own. However, by being smart about how you approach IT, your company can still have a network that exceeds your expectations.

0 Comments
Continue reading

How to Leverage Cloud Computing For Your Company’s Success

b2ap3_thumbnail_computing_in_the_cloud_400.jpg
The cloud grows more important for modern technology infrastructures by the day, and due to this, implementing the cloud isn’t simply a matter of when, but how. Some organizations still haven’t made the move to the cloud, but this is probably because they don’t understand the vast benefits that cloud computing can bring to the table.

0 Comments
Continue reading

3 Ways That Working From Home is a Win-Win For Employers and Employees

b2ap3_thumbnail_work_from_home_today_400.jpg
With so much technology available to the modern worker, it’s easier than ever to work remotely. If your company takes advantage of remote technology, it has the potential to dramatically change things around the office for the better, thanks to its many benefits. Here are just a few benefits that every productivity-minded business will want to consider.

0 Comments
Continue reading

If Time Warner Cable and Comcast Can Get Hacked, Then We All Can

b2ap3_thumbnail_twc_data_compromised_400.jpg
The number of high-profile hacks that have occurred over the past several years continues to climb, and it won’t let up anytime soon. Now, another incident involving Time Warner Cable, a large ISP in the United States, shows that even large companies that deal with sensitive information aren’t invincible from data breaches.

0 Comments
Continue reading

Public Cloud? Private Cloud? Why Not Both!

b2ap3_thumbnail_hybrid_cloud_computing_400.jpg
In a world where technology is continuously being improved upon to suit the needs of the modern business, your organization’s needs can quickly (and drastically) change. The need for cloud services grows more apparent with each passing day, primarily because it has so much to offer for a small business. Granted, talking about the cloud and implementing it are two entirely different things. So, it's important that business owners ask, "What can the cloud do for my organization?"

0 Comments
Continue reading

4 Considerations You Must Make Before Migrating to the Cloud

b2ap3_thumbnail_move_to_the_cloud_400.jpg
Cloud computing has reached a point where the majority of businesses are utilizing the technology to some extent. According to a 2014 survey, about 70 percent of enterprises either have infrastructure or applications in the cloud. As more companies migrate more of their operations to the cloud, we’re getting more questions about what it takes to make such a transition possible.

0 Comments
Continue reading

The Vital Difference Between Cloud Services and Virtualization

b2ap3_thumbnail_cloud_vs_virtualization_400.jpg
Many businesses go about their daily duties without understanding the difference between a cloud computing solution and virtualization services. Contrary to popular belief, they are, in fact, NOT the same thing. Rather, virtualization itself is an important part of integrating a cloud solution.

0 Comments
Continue reading

2 Conflicting Views of the Cloud

b2ap3_thumbnail_cloud_gears_400.jpg
Cloud computing is here to stay. Yet, there are still companies hesitant to adopt the cloud. While every business that hesitates migrating to the cloud has its own reasons, one common source of conflict that we’ve seen is the opposing view between the business owner and their IT department.

0 Comments
Continue reading

Why Your Team Should Have A Basic Understanding of Technology

b2ap3_thumbnail_troubleshoot_your_own_pc_issues_400.jpg
What separates the average PC user from the IT technician who routinely takes care of your technology issues? In essence, the only difference is the amount of technical training. Our years of technical expertise have given us the ability to diagnose and resolve varieties of problems, but we don’t hold our knowledge close to the chest. Rather, we want to share it with you.

0 Comments
Continue reading

Addressing 2 Primary Objections to Cloud Computing that Businesses May Have

b2ap3_thumbnail_cloud_computing_objections_400.jpg
Despite cloud computing being commonplace, there are still some businesses holding out when it comes to migrating their data to the cloud. In most scenarios like this, a company has objections to the cloud that are preventing them from taking advantage of its many benefits. Are these objections valid? Let’s find out by addressing two of the most common objections to the cloud.

0 Comments
Continue reading

Backsourcing Your Outsourced IT

b2ap3_thumbnail_backsourcing_it_400.jpg
Outsourcing your company’s IT services is an easy way to cut back on IT costs. For years, outsourced IT has been a growing trend with more companies making the switch, but just because your businesses has outsourced its technology services, doesn’t mean that backsourcing isn’t a valid option.

0 Comments
Continue reading

Microsoft Fixes Dangerous POODLE SSL Vulnerability

b2ap3_thumbnail_Poodles_400.jpg
A while back we discussed the POODLE vulnerability found in SSL 3.0 SSL encryption technology. This vulnerability is found in all operating systems, as it is found within the web browser’s abilities to process SSL encryption. Thankfully, major companies are stepping up to tackle the issue, and Microsoft has released a basic solution to fix the vulnerability in Internet Explorer.

The POODLE vulnerability itself is used to obtain information encrypted with SSL technology by analyzing web traffic. This technique is used to steal information such as credit card numbers, Social Security numbers or other private information. In non-tech speak, SSL (Secure Socket Layers) is an encryption protocol used to keep data safe on the web through security certificates. This method of encryption has long since been replaced by the more secure protocol TLS (Transport Layer Security), but several systems will revert back to their old SSL certificates in the event something has gone wrong with their TLS. TLS isn’t vulnerable to this issue, so in theory, a hacker could force their way into a network, exploiting the traffic coming in and out of the network for any worthwhile information.

According to the Microsoft security advisory, hackers exploit a man-in-the-middle attack to take advantage of this vulnerability:

In a man-in-the-middle (MiTM) attack, an attacker could downgrade an encrypted TLS session forcing clients to use SSL 3.0 and then force the browser to execute malicious code. This code sends several requests to a target HTTPS website, where cookies are sent automatically if a previous authenticated session exists. This is a required condition in order to exploit this vulnerability. The attacker could then intercept this HTTPS traffic, and by exploiting a weakness in the CBC block cipher in SSL 3.0, could decrypt portions of the encrypted traffic (e.g. authentication cookies).

Due to the nature of POODLE as a design flaw, it’s not something that can easily be patched. Therefore, most experts are saying that you’re better off disabling SSL 3.0 for their web browsers. Most servers don’t rely on SSL 3.0 anymore, which makes it obsolete. In fact, most major browsers are looking to disable SSL 3.0 completely within the next few months. Firefox is fixing the issue with the November upgrade, while Google is working to disable SSL 3.0 on all of its products. This makes the vulnerability obsolete for two of the biggest browsers, but what about Internet Explorer?

Turns out Microsoft has a way to fix that one, too. Microsoft has released a Fix It tool, which can help users disable SSL 3.0 without navigating through their Control Panel. Just click here for the tool on their official website. Otherwise, you must disable SSL 3.0 and enable TLS 1.0, 1.1, and 1.2. Follow these steps to do so:

poodle in blog 1

In the Internet Explorer Tools menu (or your PC’s Control Panel), click Internet Options.

poodle in blog 2

In the Internet Options window, click the Advanced tab.

poodle in blog 3

Scroll down to the Security section. Notice there are checkboxes next to the available SSL and TLS options. Uncheck Use SSL 3.0, and check the following: TLS 1.0, TLS 1.1, and TLS 1.2. Be sure to check all of the TLS versions. Failing to do so could result in connection errors.

Finally, click OK, exit, and restart Internet Explorer. This allows Internet Explorer to refuse a connection with any servers which only support SSL, which ensures that the web traffic isn’t vulnerable to the POODLE vulnerability.

Computerware believes that quality security is key to a minimal-risk online environment. This fix isn’t a viable replacement for the latest security updates and patches, so you will want to ensure that you are always running the most up-to-date versions of your software, applications, and especially your operating system.

Computerware can apply all of these patches for your business’s systems so you don’t have to. Call us today at (703) 821-8200 to learn more.

0 Comments
Continue reading

Sharpen Your Focus with an IT Roadmap and Reorganization

b2ap3_thumbnail_it_strategies_400.jpg
With so many new trends popping up in today's technology industry, it's only natural that a change of pace, or even a change in strategy, be considered by any business hoping to take advantage of what the world has to offer. Your company needs to adapt to change if it hopes to be successful in the future business world.

0 Comments
Continue reading

Has Your Business Moved to the Cloud Yet?

b2ap3_thumbnail_cloud_computing_questions_400.jpg
The cloud is becoming a very important part of the modern-day business, and for good reason. It frees companies from the restricting physical nature of servers, desktops, and other hardware. In fact, according to Joe McKendrick of Forbes magazine, four-out-of-five small businesses will soon operate on the cloud.

0 Comments
Continue reading

Do the Same Amount of Work for Less Money with a Virtual Desktop Infrastructure

b2ap3_thumbnail_virtualized_computing_infrastructure_400.jpg
One of the biggest expenses for any business is owning and maintaining an IT infrastructure. Computer equipment is expensive to purchase and it's costly to upgrade and repair. Fortunately, operating an IT infrastructure doesn't have to be as expensive as the price tag indicates. You can take advantage of desktop virtualization to handle your workload for much less money!

0 Comments
Continue reading

Use Technology Like a Real Business

b2ap3_thumbnail_are_you_efficient_400.jpg
There's a reason why business technology is categorized differently than consumer technology. For example, nobody in their right mind has a copy machine the size of a Smart Car sitting in the home office. More is demanded from business technology, which is why you need a professional partner to assist you with your professional technology!

0 Comments
Continue reading

The 4 Sides of Risk Management

b2ap3_thumbnail_we_are_soulution_providers_400.jpg
You can't run a business and make money without spending money on risky activities, like advertising campaigns where there's no guaranteed return on investment. Did you know that it's possible to make money by investing in risk management? For all of you Cautious Carls out there, this might be a more preferred way to grow your bottom line.

0 Comments
Continue reading

3 Useful Mobile Apps To Take Your Business on the Go

b2ap3_thumbnail_mobile_apps_400_20140501-132143_1.jpg
The world is changing as technology grows ever more mobile. Cell phones have gone from bulky, large pieces of hardware to smaller, more compact specimens. Fifteen years ago, if you were to tell someone that your cell phone could connect to the Internet, you would quickly be dismissed. If you look past the surface laden with Candy Crush Saga and Words with Friends game requests, you can get to the heart of what smartphones have revolutionized – the way we communicate with others.

0 Comments
Continue reading

3 Useful Mobile Apps To Take Your Business on the Go

b2ap3_thumbnail_mobile_apps_400.jpg
The world is changing as technology grows ever more mobile. Cell phones have gone from bulky, large pieces of hardware to smaller, more compact specimens. Fifteen years ago, if you were to tell someone that your cell phone could connect to the Internet, you would quickly be dismissed. If you look past the surface laden with Candy Crush Saga and Words with Friends game requests, you can get to the heart of what smartphones have revolutionized – the way we communicate with others.

0 Comments
Continue reading

Cover these 4 Important Bases When Server Shopping

b2ap3_thumbnail_which_server_works_best_400.jpg
Your company's most valuable assets are that which are irreplaceable, like your computer data. Data is stored in a server, which makes your server the most important piece of equipment in your office. Given the crucial role your server plays in your business, you will want to make sure to have the perfect server unit for your organization. Here's how to shop for the best server for you!

0 Comments
Continue reading

News & Updates

Computerware is proud to announce the launch of our new website at ww.cwit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what Computerware can do for your business.

Computerware, Inc.
8480 Tyco Road Suite I
Vienna, Virginia 22182

Copyright 2025 Computerware. All Rights Reserved.

FPS
FPS