This website uses cookies in order to offer you the most relevant information. Please accept cookies for the most optimal performance. 

Blog

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Password Has Been Stolen. Period.

Your Password Has Been Stolen. Period.

That’s not hyperbole. This isn’t some click-bait title to try to get you to care about cybersecurity. A password you use has certainly been stolen, and statistically, more than one of your passwords has likely been compromised.

How this affects you depends on a number of factors, so let’s get into that, and talk about how you can protect your identity, your business data, your customers, and prevent a whole lot of problems.

0 Comments
Continue reading

What You Can Do About Today’s Most Pressing Cybersecurity Threats

What You Can Do About Today’s Most Pressing Cybersecurity Threats

As cyberthreats become more advanced, businesses must take proactive steps to address them. Cyberattacks can have devastating effects, making it crucial to enhance employees’ awareness of online threats. This month, we examine the top three IT security challenges businesses face and how to combat them effectively.

0 Comments
Continue reading

Identifying and Combating Potential Phishing Attacks

Identifying and Combating Potential Phishing Attacks

Phishing scams are one of the most common (and insidious) problems you and your team may encounter. While it may seem simple to avoid a phishing attack, the truth is that many of these schemes are highly sophisticated and are constantly evolving to become more so.

0 Comments
Continue reading

Scammers Can Really Be a Hindrance to Your Business’ Health

Scammers Can Really Be a Hindrance to Your Business’ Health

Imagine this scenario: amidst your daily routine, an email arrives in your inbox, seemingly from a cybersecurity company. The alarming assertion is that you've become the target of a hacking attack. Despite lacking IT expertise and being unfamiliar with your security agency's procedures, you trust the message and respond promptly. Unbeknownst to you, the email is a shrewdly disguised cyberthreat, ensnaring you in their trap.

0 Comments
Continue reading

How Do Hackers Get Around Multi-Factor Authentication?

How Do Hackers Get Around Multi-Factor Authentication?

Data security is one of those things that you have to stay out in front of. Hackers and scammers are changing tactics and getting a little more sophisticated as time goes on and it creates a pretty difficult situation for most IT administrators. Utilizing multi-factor authentication (MFA), two-factor authentication, or whatever it is called by the application you are using has become a great way to add an extra layer of security to organizational data protection efforts. Today, we will discuss the benefits of this strategy and why it isn’t a be-all, end-all to your overall security.

0 Comments
Continue reading

Black Friday and Cyber Monday Are Treasure Troves for Hackers

Black Friday and Cyber Monday Are Treasure Troves for Hackers

It should come as no surprise that one of the biggest online retail days of the year also incites a lot of scams and threats targeting not just consumers, but online businesses as well. Let’s go over some of the major statistics surrounding online retail scams and what you should know as you navigate the post-holiday chaos.

0 Comments
Continue reading

Hacked Social Media Accounts Are Bad for Your Business

Hacked Social Media Accounts Are Bad for Your Business

Social media has become deeply ingrained in today’s culture, from business to personal connection. Businesses stake their reputation on the platforms, and individuals and families use them to connect with one another in ways they never were able to before. This is why it’s so scary to think about what would happen if an account were hacked or taken over.

Let’s look at how social media hacks are disruptive and potentially catastrophic to a business owner.

0 Comments
Continue reading

Recent Data Shows Surprising Trends in Cybercrime Victimization

Recent Data Shows Surprising Trends in Cybercrime Victimization

When it comes to who is victimized in cybercriminal efforts, there may be a few stereotypes and presumptions that a lot of people may hold. A recent report, Oh, Behave!, released by the National Cybersecurity Alliance and Cybsafe, shows that the real victims of many forms of cybercrime aren’t who many would expect.

0 Comments
Continue reading

You Need These 4 Cybersecurity Solutions for Your Business

You Need These 4 Cybersecurity Solutions for Your Business

Modern businesses depend on cybersecurity to help keep operations from being targeted by hackers and other cybercriminals. Businesses need to be both resilient and agile in how they protect their infrastructure from these threats. Let’s discuss four of the most important ways your business can protect itself from the growing threats of malware, ransomware, phishing attacks, and other cybersecurity threats.

0 Comments
Continue reading

World Password Day Presents an Opportunity to Improve Your Security

World Password Day Presents an Opportunity to Improve Your Security

World Password Day is indeed a thing, and it’s a thing to celebrate in the world of business technology, as it celebrates password awareness and advocates account security in a time when cybersecurity has never been more important. To help you observe World Password Day, we want to go over why passwords are important and why you need to take password security seriously.

0 Comments
Continue reading

Are You a Cybercrime Target?

Are You a Cybercrime Target?

We focus a lot of our attention on securing our clients’ computing infrastructures from the large amount of threats that are out there. We look to legitimately protect the entire network and infrastructure with our tools and expertise. The hackers, on the other hand, understand that they are more apt to be successful if they target certain users of your organization. Let’s look at a potential profile of someone that a savvy hacker would like to target.

0 Comments
Continue reading

How Can T-Mobile’s Security Woes Help Your Efforts?

How Can T-Mobile’s Security Woes Help Your Efforts?

Bad news for T-Mobile users, they’ve suffered another data breach. Hackers have gained access to customer data for nearly 37 million individuals, including both pre-paid and subscription-based accounts. Let’s look at what has happened and what knowledge you might apply to your own network security practices.

0 Comments
Continue reading

Different Scams Impact Different Audiences, Which Means You Need to Prepare for All of Them

Different Scams Impact Different Audiences, Which Means You Need to Prepare for All of Them

Back during the holiday season, the Federal Trade Commission shared some data that showed that members of Generation X, Millennials, and Generation Z are all more likely to fall for online shopping scams than those over the age of 60…and not by a little, either. Those under that age are apparently 86 percent more likely to fall for these scams. 

0 Comments
Continue reading

While Crucial to Your Business, Cybersecurity Can Be Tiresome for Some

While Crucial to Your Business, Cybersecurity Can Be Tiresome for Some

Cybersecurity definitely needs to be a point of emphasis for any business who relies on technology, after all if you suffer a data breach, it can have a direct impact on the way your business is viewed by potential customers or it can even have an effect on the way that you are able to operate. In order to keep your business secure online you need to depend on your staff. Like it or not, they are a major part of your business’ cybersecurity system and if they aren’t trained properly and understand their role, your business is low-hanging fruit for hackers. 

0 Comments
Continue reading

Make Sure You Avoid this Malware-Spreading Version of WhatsApp

Make Sure You Avoid this Malware-Spreading Version of WhatsApp

As one of the world’s most popular messaging applications, WhatsApp is a well-known tool, even in the business world. More notable is that WhatsApp—a platform known for its end-to-end encryption and security—now has a modified and unofficial version called YoWhatsApp, which has been deploying malware to unsuspecting users.

0 Comments
Continue reading

What Happens When a Raven Goes Phishing?

ravenPHish

What if Edgar Allan Poe wrote “The Raven” during the information age?

0 Comments
Continue reading

USB Drives Carry a Lot of Business Risk in a Tiny Package

USBdrive

There’s nothing more intriguing than finding a random USB drive while cleaning up your office or while out and about. You might feel the urge to plug it in and discover its contents, but we are here to tell you that this is often a bad idea—particularly if the drive is unfamiliar to you. Unlike cloud storage, which is quite transparent, you don’t know what’s on a USB drive until you plug it in, and it’s often too late by the time this happens.

0 Comments
Continue reading

The Zeppelin Group is Making Us Ramble On About Ransomware

ransomware

We apologize for the pun, but we couldn’t help ourselves.

When you go about your business and attempt to onboard a new client or implement a new tool for your company, you spend time getting to know what your business is doing and why. Well, a newly formed ransomware group will spend up to two weeks mapping your network before launching its attacks, making it a potent threat actor that you should keep an eye out for on your business network.

0 Comments
Continue reading

4 Cybersecurity Tactics that Smart Businesses Have Adopted

4 Cybersecurity Tactics that Smart Businesses Have Adopted

In today’s world of cyberattacks and cybercriminals, it’s more important than ever that you are taking the appropriate steps to protect your organization from all manners of threats. We have a list of cybersecurity best practices that you should consider following for your organization’s computing infrastructure. Let’s take a look.

0 Comments
Continue reading

Best Buy’s Geek Squad Scam is Touring Inboxes

Best Buy’s Geek Squad Scam is Touring Inboxes

Phishing scams are a topic we frequently discuss on this blog. In their simplest form, they are emails or messages sent that are designed to steal from you or gain access to computers or networks. One such scam uses the moniker of the popular IT support company Geek Squad, a subsidiary of Best Buy, to steal from its victims. Here’s how you can avoid falling for these tricks.

0 Comments
Continue reading

News & Updates

Computerware is proud to announce the launch of our new website at ww.cwit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what Computerware can do for your business.

Computerware, Inc.
8480 Tyco Road Suite I
Vienna, Virginia 22182

Copyright Computerware. All Rights Reserved.