This website uses cookies in order to offer you the most relevant information. Please accept cookies for the most optimal performance. 

80

Blog

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What It Means To Disinfect Your Computer

What It Means To Disinfect Your Computer

We have no problem going on the record as saying that there are more than enough strains of malware to go around. As such, it’s important that you know what to do if your workstation is struck by an infection.

0 Comments
Continue reading

Lowlife Ransomware Hackers Now Asking for More Than $1k Per Attack

Lowlife Ransomware Hackers Now Asking for More Than $1k Per Attack

Ransomware remains a very real threat, and is arguably only getting worse. Attacks are now able to come more frequently, and there are opportunities for even relative amateurs to level an attack against some unfortunate victim. However, this is not to say that there is nothing you can do to keep your business from becoming another cautionary tale.

0 Comments
Continue reading

Don’t Assume Your New Device is Free of Malware

Don’t Assume Your New Device is Free of Malware

Imagine that, despite the extreme care you took to avoid threats from infecting your devices, they turned out to be infected anyway. However, what if the device had been infected before you had even gotten your hands on it?

0 Comments
Continue reading

This Malware Only Needs 2 Minutes to Turn a Security Camera Into a Zombie

This Malware Only Needs 2 Minutes to Turn a Security Camera Into a Zombie

There are billions of devices that now connect to the Internet, even devices that may seem to not have any practical reason to do so. However, there is a new type of malware that uses these devices to perform attacks on the networks of all types of organizations: Mirai.

0 Comments
Continue reading

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

A previously known malware called Ghost Push now has a component that has caused countless problems for over a million Android users. This component, called Gooligan, is the source of the trouble, and it adds to this chaos by infecting over 13,000 new devices every day.

0 Comments
Continue reading

Don’t Overlook Internal Threats as You Safeguard Your Network From External Ones

Don’t Overlook Internal Threats as You Safeguard Your Network From External Ones

Doing business on the Internet is a dangerous gambit, and not one which should be taken lightly. Every small business uses some kind of sensitive information that is valuable to hackers. Most think that preventative measures are enough to ensure their security, but the fact remains that only through threat detection and elimination can you guarantee that all issues are promptly handled.


The threats to your organization’s infrastructure are numerous and plentiful, and while some will make themselves known immediately, others will hide in plain sight. These threats are designed to either leak information or provide new outlets for hacking attacks. Regardless, it’s important to identify attacks that have weaseled their way through your defenses before they have been around long enough to cause damage.

Breaches are Inevitable
To truly understand how threat detection is just as important as threat prevention, you need to come to grips with the worst-case scenario. It’s not an uncertainty that you’ll be hacked at some point--in fact, it’s very likely, and as such, you need to make sure that you’re prepared for any and all situations, including a data breach. Even large organizations and enterprises that pride themselves on security can experience data breaches. Consider the high-profile hacks of Sony and the United States Office of Personnel, as well as the health care provider Excellus BlueCross BlueShield. If these organizations had anticipated data breaches, perhaps they may have been able to prevent them--or at least mitigate the damage.

This is why you absolutely need to expect the worst in order to keep it from happening. While preventative solutions can help, it’s also imperative that you implement ways to detect intrusions, as well as ways to eliminate threats. Only then can you be ready to tackle any and all threats that want to hurt your business.

What You Can Do
CIO recommends what they call a preventative “triad” of sorts. This includes protection, detection, and reaction. You’ll need both security solutions like a firewall, and monitoring tools that allow you to check (and eject) threats from your network.

Computerware can get your business started with solutions designed to mitigate threats and prevent infections in the first place. A Unified Threat Management (UTM) solution provides a firewall, antivirus, spam blocker, and content filter, which is a great way to keep threats from accessing your network. Furthermore, we also offer a Remote Monitoring and maintenance (RMM) tool that can help our technicians keep an eye on your network for any discrepancies or inefficiencies.

To learn more, reach out to us at (703) 821-8200.

0 Comments
Continue reading

5 Steps Every Business Can Take to Avoid Ransomware

5 Steps Every Business Can Take to Avoid Ransomware

Ransomware is a dangerous online entity that continues to cause problems for businesses of all sizes. Thanks to its ability to encrypt workstations and even entire networks, ransomware has made its way to the top of the threat food chain, and it’s your responsibility to protect your business from it. Since infections are (more or less) impossible to remove, your best option is to prevent infections from happening in the first place.


Here are five of the best practices you need to keep in mind to protect your business from ransomware.

Have a Data Backup and Disaster Recovery Solution
If your business is struck with ransomware, the only reliable way to resolve the problem is to restore a data backup. The reasoning is simple; while you could pay for the decryption key, you would only be further funding their ransomware campaigns, and there’s no guarantee that the decryption key will work in the first place. You’re better off not taking the risk and just restoring a backup… assuming you have one.

Set a Routine for Scheduled Backups
You’ll want your backup and disaster recovery solution to be able to restore your data as close as possible to the point of incident. Computerware has a BDR solution available that can create backups of your data as often as every fifteen minutes. This is crucial if you want to ensure that your data recovery process is sound.

Educate Your Employees About Phishing Scams
Keeping your team in-the-know of how to avoid phishing scams and identify threats is a good step to take for any and all security risks. Teach them not to download unsolicited attachments or click on suspicious links. It also helps to remind them to look for signs of phony email domains, spelling errors, and other irregularities.

Regularly Update Your Software Solutions
The latest patches and security updates can go a long way toward keeping your organization from experiencing hacking attacks. As such, ransomware works the same way. Keep comprehensive security solutions on-hand that can keep phishing attacks from hitting your email inbox in the first place.

Keep Corporate Data Separate From Personal Data
If you have corporate data that’s stored on your in-house workstations, you’ll want to keep it separate from data that’s stored on employee mobile devices. If you use laptops or smartphones to work remotely, this can be challenging. You should stress that employees keep these two types of information as separate as possible. One way to do this is by storing corporate data in a cloud environment, so that employees don’t have to store it on their mobile devices at all.

The best way to guarantee your business’s assets aren’t being put at risk is to keep ransomware from happening in the first place. Take the time to reinforce your infrastructure and educate your team, and you might be surprised by the results. To learn more about how to do this, reach out to us at (703) 821-8200.

0 Comments
Continue reading

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

There are countless threats out there that can mean danger for your business, but one of the most innovative to date utilizes a malicious Twitter account to administer commands to a botnet made up of infected Android devices. In fact, this is widely considered the first threat to actively use a social network in this manner, making it a wake-up call for security professionals and social media users alike.

0 Comments
Continue reading

Did You Know Early Ransomware Spread via Floppy Disk?

Did You Know Early Ransomware Spread via Floppy Disk?

Ransomware might be a relatively new player in the battle for the Internet, but its short history shouldn’t belittle the damage that it can do to both businesses and users of personal computers. Perhaps you’ve had the misfortune to encounter it for yourself, and your files were locked down because of it. Regardless, ransomware is now a prevalent part of the online crime scene, and people are using it to extort money from innocent users, making it a considerable threat.

0 Comments
Continue reading

When Pyramid Scheme Meets Ransomware

When Pyramid Scheme Meets Ransomware

First hackers created a formidable ransomware. Then, when word got out about how to avoid this ransomware, they began to bundle a second ransomware to create an encryption catch-22. Now, the developers of the Petya and Mischa ransomware have adopted a Ransomware-as-a-Service model and have opened their nefarious malware up to distribution.

0 Comments
Continue reading

A Classic Example of Why You Should Only Allow Trusted Apps to Access Your Data

A Classic Example of Why You Should Only Allow Trusted Apps to Access Your Data

If your employees are given an Android device to use for work, or if they bring in their own as a part of a Bring Your Own Device strategy, you may want to pay special attention to what follows.

0 Comments
Continue reading

Scammers Use Whaling Attack Emails to Pose as “Big Fish”

  Authentication required.

This is a password protected blog, please kindly enter the password into the password field below to view the blog.

0 Comments
Continue reading

Ransomware Hit PC Users for $325 Million in 2015 Alone

b2ap3_thumbnail_randomware_issues_400.jpg
Of the many types of malware in the online environment, few are as dangerous as the notorious ransomware. As a threat that’s capable of instantaneously locking down your files and preventing you from accessing them, hackers will add insult to injury by demanding a ransom for the safe return of your files. How can your business prevent this growing threat from setting its sights on your assets?

0 Comments
Continue reading

Alert: Apple OS X Now at Risk of Ransomware

b2ap3_thumbnail_ransomware_now_affecting_apple_400.jpg
Ransomware is a major problem in both the personal and private sectors of computing, but up until very recently, Apple users had little to fear from potential ransomware hacks. Security researchers at Palo Alto Networks have discovered what’s known to be the first completed ransomware on an Apple device. The threat, called KeRanger, is officially “in the wild,” and is a danger to any Mac user.

0 Comments
Continue reading

New CryptoJoker Ransomware is No Laughing Matter

b2ap3_thumbnail_problems_with_ransomware_400.jpg
Today’s various versions of ransomware are dangerous. By forcibly locking down important files on a victim’s computer, threats like CryptoLocker and CryptoWall are posing significant threats to both businesses and ordinary computer users. However, a new type of ransomware has appeared called CryptoJoker; and we assure you, there’s nothing funny at all about this one.

0 Comments
Continue reading

Study: 2015 Saw a 27.3% Increase In New Malware

b2ap3_thumbnail_malware_everywhere_400.jpg
Cyber security continues to be a major pain point for small and medium-sized businesses, even if they’re taking the fight to the latest threats with solutions like antivirus and firewalls. Significant progress has been made, yet new threats are born every day. In fact, you might be surprised to find out that a monstrous 27.3 percent of all malware in the world was created just last year. 

0 Comments
Continue reading

Malvertising: When Advertisements on Legitimate Sites Contain Malware

b2ap3_thumbnail_malvertised_content_400.jpg
Any business worth their gigabytes will practice extreme caution when surfing the Internet. Hackers tend to make users’ lives more difficult, even for those who are part of a small or medium-sized business. Teaching your employees security best practices in hopes that they’ll avoid suspicious websites isn’t a foolproof strategy, and thanks to malvertising, ensuring that your organization stays secure is more difficult.

0 Comments
Continue reading

Alert: Don’t Call Fake Technical Support Hotlines Provided By Malware

b2ap3_thumbnail_tech_support_bomb_400.jpg
Computer users, beware; there’s an intrusive malware spreading across the Internet that’s capable of locking users out of their web browsers and redirecting them to fake IT support phone numbers. The hacker’s goal is likely to steal sensitive information from users, so it’s especially important that you don’t call this fake phone number.

0 Comments
Continue reading

Alert: Hackers Targeting ATMs to Get At Your Cash

b2ap3_thumbnail_atm_malware_400.jpg
ATMs are probably everyone’s favorite kind of computer. You swipe your card, enter in your PIN, and withdraw cash immediately. Many people forget that an ATM is simply a computer in disguise, though; one that can be infected with malware just as easily as any old PC can. A new type of ATM malware, GreenDispenser, is making its rounds in Mexico, and could potentially make its way to other countries if left unchecked.

0 Comments
Continue reading

Forget Malware: Hackers Are Crafty Enough to Trick You Without It

b2ap3_thumbnail_do_not_get_hacked_400.jpg
Behind the safety of a firewall and antivirus solution, it’s easy to forget that the Internet, and the online community in general, can be a dangerous place. It’s not until you fall prey to a hacking attack, virus infection, or similar threat that you become aware of the dangers that lie in the virtual darkness. However, these threats are only part of a more dangerous problem; social engineering hacks.

0 Comments
Continue reading

News & Updates

Computerware is proud to announce the launch of our new website at ww.cwit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what Computerware can do for your business.

Computerware, Inc.
8480 Tyco Road Suite I
Vienna, Virginia 22182

Copyright 2025 Computerware. All Rights Reserved.

FPS
109 FPS (109-109)