Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

One Of Your Biggest Security Risks: Your Employees

One Of Your Biggest Security Risks: Your Employees

You might be surprised by how many of your organization’s security issues originate from within. A major contributor is user error, which can lead to some pretty severe problems reaching from your data security, to your workflow, all the way to the continuation of your business itself.

0 Comments
Continue reading

Tip of the Week: Closed a Tab Accidentally? Here’s How to Restore It

Tip of the Week: Closed a Tab Accidentally? Here’s How to Restore It

Everyone has accidentally closed an important web browser tab before they were finished with it. What can you really do about it, though? You might expect that you have to search for the page again, but there’s a much easier way to do it. In your Google Chrome browser on a PC or smartphone, you can reopen closed tabs relatively easily.

0 Comments
Continue reading

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

0 Comments
Continue reading

Data Security Has to Be A Priority For Your Organization

Data Security Has to Be A Priority For Your Organization

Considering that since January 1st of this year, there has been upwards of 10 million personal information records lost or stolen each day, odds are that you, or someone you know, has had their records compromised by a data breach. With such a high incident rate, individuals and businesses that have never received any kind of notification that their records were included in a breach, generally consider themselves lucky and assume that they are not at risk of identity theft or unauthorized account usage. Unfortunately for them, that is not always the case.

0 Comments
Continue reading

Tip of the Week: 3 More Useful Microsoft Word Features

Tip of the Week: 3 More Useful Microsoft Word Features

Microsoft Word has long since established itself as the primary word processing software in the business world, but even some power users don’t necessarily know about all of the hidden features that exist in it. Here are three of the best Word capabilities that you’ll be sure to use next time you’re in a pinch.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Hackers Privacy Email Malware Technology Business Hosted Solutions Computer Internet Microsoft Windows 10 Business Computing Backup Software Ransomware IT Services User Tips Productivity Network Security Windows Hardware Smartphone Google Data Management Data Small Business App Phishing Android Facebook Upgrade Saving Money Mobile Devices Gmail Business Continuity Internet of Things Browser Microsoft Office Big Data Word Tip of the week Efficiency Smartphones Office Tips Workplace Tips IT Support Cloud Computing Cybersecurity WiFi Disaster Recovery Data Recovery Managed Service Provider Spam Miscellaneous Social Media Apple Settings Content Filtering Customer Service Managed IT Services Robot Server Office 365 Remote Monitoring Innovation Data storage Artificial Intelligence Antivirus Safety Search Money The Internet of Things Outsourced IT Administration VoIP Mobile Device Password IBM Encryption Wireless Apps Network Windows 10 Customer Relationship Management Hacking Firewall Hosted Solution Passwords YouTube Presentation communications Hacker Avoiding Downtime Office Printing End of Support Risk Management Wireless Technology Recovery Productivity Virtual Private Network IT Support Google Drive Save Money Managed IT Services IT Management LiFi SaaS Telephone Systems Chrome Analytics Employer-Employee Relationship Unified Threat Management Monitors Outlook Social Sports Fun Undo WannaCry Automation Education Time Management Deep Learning Humor Application Gadgets Hacks Cabling Virtualization Computer Care Business Technology Budget Data loss Communication Network Management Vendor Management Bring Your Own Device sip Users Managed IT Infrastructure Buisness Training Lenovo Mouse Digital Writing IT solutions Touchscreen Best Practice Automobile telephony Shortcut Disaster Cortana Superfish Spyware Retail Business Growth User Storage Patch Management Current Events Uninterrupted Power Supply Downtime Wi-Fi Competition Scam Legal Social Engineering Alt Codes Tablet Cybercrime Dark Data Vulnerability Going Green Solid State Drive 5G Knowledge Networking Politics How To Heating/Cooling Typing IT service Collaboration Marketing VPN Hard Disk Drive Two-factor Authentication Experience Data Security Operating System Firefox How To Unified Communications Servers Cryptocurrency BDR Running Cable IP Address File Sharing Samsung Computing Network Congestion Virtual Desktop Website Techology Websites Server Management Virtual Reality Bitcoin Google Maps Laptop Mobile Office Hard Drives Mail Merge Information Technology Computers Unified Threat Management Google Docs Statistics Windows 8 Halloween Mobile Device Management Refrigeration Address Google Wallet Maintenance Display Public Speaking User Error Quick Tips Bluetooth Scary Stories Lithium-ion battery Data Backup Drones Corporate Profile Bandwidth Augmented Reality VoIP Digital Payment Meetings Chromebook Cleaning Emergency BYOD Mobile Data Access Control Private Cloud Webcam Emoji Work/Life Balance Error Point of Sale Black Market Law Enforcement Physical Security Paperless Office Twitter Mobile Computing Staffing Gadget Personal Information Administrator Web Server Remote Computing GPS Holiday CrashOverride Computer Repair Business Management Cameras Processors Tracking Health CCTV Alert Document Management Tech Support Electronic Medical Records Identity Theft Travel G Suite Notifications Domains Supercomputer Botnet Upgrades Motion Sickness Taxes Crowdsourcing 3D Printing IT Budget Machine Learning Update IT Consultant Government Unsupported Software Printer Relocation