Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

If You Aren’t Patching Your Systems, Any Breaches are On You

If You Aren’t Patching Your Systems, Any Breaches are On You

Everyone in a business has set responsibilities that they need to fulfill, one major one being proper security maintenance. A failure to uphold this responsibility could have serious consequences, including the very real potential of a security breach. It could be argued, in fact, that if you aren’t patching your systems, you’re inviting cybercriminals in.

0 Comments
Continue reading

Tip of the Week: The Best Data Warehouse for Your Business

Tip of the Week: The Best Data Warehouse for Your Business

The importance of effective data management cannot be overstated in today’s business environment. After all, the data you collect is of little use if you fail to leverage it properly, and successful data leverage starts with choosing where to house it. This week’s tip is dedicated to how and why to utilize a data warehouse for your organization’s needs.

0 Comments
Continue reading

Businesses Can Expect These 5 Benefits from Conferencing Solutions

Businesses Can Expect These 5 Benefits from Conferencing Solutions

Many businesses have begun to take advantage of the benefits that come with having remote workers. One tool that has seen an increase in utilization as a result is a conferencing solution. Communications are extremely important for the growing business, and with a full-featured conferencing tool at your disposal, you can expect to see the following benefits. 

0 Comments
Continue reading

Deepfakes Make It Hard to Believe Your Eyes or Ears

Deepfakes Make It Hard to Believe Your Eyes or Ears

How would you feel if a video of you appeared online, saying things that you never actually said? While you may not be the one targeted by this kind of action, this situation is very real, thanks to a relatively recent development in machine learning and artificial intelligence. Known as “deepfakes,” these videos have made it crucial to examine media from a place of skepticism.

0 Comments
Continue reading

Tip of the Week: How to Keep Control of Your Cloud

Tip of the Week: How to Keep Control of Your Cloud

We always recommend cloud platforms to our clients, especially those who need a central place to host important data and applications. However, it is possible to go too far when implementing cloud services. We’ll discuss how you can monitor your cloud computing costs, as well as how access to cloud solutions can be a detriment to your organization.

0 Comments
Continue reading

The Cloud Isn’t Necessarily Safe

The Cloud Isn’t Necessarily Safe

The Cloud. That big, vague entity where a lot of us our entrusting our information has lifted a huge burden off of businesses by alleviating the need for expensive onsite hardware. It makes user management a little more user friendly. It keeps us connected and in communication no matter where we are.

0 Comments
Continue reading

How the EU’s General Data Protection Regulation is Working After the First Year

How the EU’s General Data Protection Regulation is Working After the First Year

After years of talk about individual data privacy, and years enacting regional laws, the European Union’s flagship individual privacy law, the General Data Protection Regulation went into effect a year ago in May. Suddenly, if your organization does business inside EU member states, you will be under a stringent regulation concerning individual data privacy. Today, we will look at the GDPR and what has changed in the year it has been law.

0 Comments
Continue reading

OneNote 2016 is Dead, Long Live OneNote for Windows, Part II

OneNote 2016 is Dead, Long Live OneNote for Windows, Part II

Microsoft is saying goodbye to OneNote 2016. Although the handy note-taking app will still be supported until October 2020, with extended support for a few more years after, Microsoft has decided to no longer add features to it, and instead, they are focusing on the new version of OneNote that comes bundled with Windows 10.

0 Comments
Continue reading

OneNote 2016 is Dead, Long Live OneNote for Windows, Part I

OneNote 2016 is Dead, Long Live OneNote for Windows, Part I

Microsoft’s handy little note-taking app, OneNote, is gearing up to hit the old dusty trail and retire. At least, that’s the plan for OneNote 2016, whose end of life coincides with the rest of the Office 2016 suite in October, 2020. Fortunately, most of us already have OneNote 2016’s successor installed. Wait, what?

0 Comments
Continue reading

Microsoft SQL Server 2008 and 2008 R2 Approaching End of Life

Microsoft SQL Server 2008 and 2008 R2 Approaching End of Life

A decade-old version of Microsoft’s popular database software SQL Server 2008 and SQL Server 2008 R2 is losing support on July 9,2019. If your business hasn’t moved away from the software, you are looking at a few real pressing problems. Let’s take a look at the software and what options businesses that haven’t moved on from SQL Server 2008 or SQL Server R2 have going forward.

0 Comments
Continue reading

Tech Terminology: API

Tech Terminology: API

It is said that software runs the world, but it wouldn’t necessarily be so without the ability to integrate applications with others. What exactly makes these integrations possible? For this week’s tech term, we will briefly introduce you to the application programming interface, or API; and, why it's so crucial in software development today.

0 Comments
Continue reading

Prioritizing Network Security is a Must

Prioritizing Network Security is a Must

Every business has their version of risk management. Nowadays, with all the technology organizations use for productivity, collaboration, and communications, managing risk can often be difficult. There are numerous threats that come from the Internet that could put a damper on productivity, create inefficiencies, or shut down production entirely. Regardless of how large or small your business is, you need to prioritize the security of your computing network.

0 Comments
Continue reading

Unpatched Windows is Like Leaving Your Car Door Open in a Sketchy Parking Garage at Night with Wads of Cash in the Driver’s Seat

Unpatched Windows is Like Leaving Your Car Door Open in a Sketchy Parking Garage at Night with Wads of Cash in the Driver’s Seat

I recently read a statement from the National Security Agency (NSA) expressing concerns over the risks and vulnerabilities that come with running unpatched versions of older Windows operating systems. First, you know it’s serious if the NSA, an entity in the US who depends on the collection and processing of information, is worried that your personal information is at risk. Second, it’s another in a long line of reasons to not allow your network to fall into such disarray that you can no longer protect it.

0 Comments
Continue reading

How to Make Your Workday Simpler

How to Make Your Workday Simpler

Look, we get it… work isn’t always the most fun thing in the world. In fact, it can often be downright stressful - especially when distractions get in the way. Fortunately for our sanity, there are plenty of ways to help reduce - or even eliminate - this stress. We’ll go over a few of those ways here.

0 Comments
Continue reading

“Paying the Ransom” Isn’t a Ransomware Defense

“Paying the Ransom” Isn’t a Ransomware Defense

Ransomware has become a favorite attack vector for hackers - after all, for them, it’s pretty much a no loss game. They either get paid, or they move on to their next target. Unfortunately, cyberattackers that dispatch ransomware often do get paid, and these payments can sometimes come from a surprising source: cybersecurity firms.

0 Comments
Continue reading

NSA-Developed Malware Used in Third-Party Hack

NSA-Developed Malware Used in Third-Party Hack

Have you ever wondered what happens when hackers gain access to state-developed malware tools? Well, now you don’t have to; a type of malware called Double Pulsar, that has been utilized in the past by the NSA, was bundled with a Chinese hacking tool and used to carry out attacks on Hong Kong and Belgium in 2016. Needless to say, this threat is unnerving.

0 Comments
Continue reading

Tip of the Week: Simple Changes You Can Make to Make Work Easier

Tip of the Week: Simple Changes You Can Make to Make Work Easier

Waking up and going to work is the inevitable reality for billions of people, and sometimes people have a hard time acclimating to a new job. If that job is an office, there are some particular issues you will have to confront in order to get the most out of your time at work. Today, we look at five simple things you can do to make your life easier inside your office.

0 Comments
Continue reading

Google Docs Working on Office Support

Google Docs Working on Office Support

Businesses are expected to make a choice regarding which solutions they will utilize. Typically they choose between Google’s or Microsoft’s productivity solutions. The unfortunate side of the choice is that they are often used exclusively, meaning there was little interoperability between the two. Nowadays, however, Google is moving to allow users to edit Microsoft Office files in Google Docs.

0 Comments
Continue reading

Even Cities Aren’t Immune to Ransomware

Even Cities Aren’t Immune to Ransomware

Ransomware hasn’t let up. It is important to understand that any organization, of any kind, is a potential target of a ransomware attack - and yes, this includes municipalities. In fact, since 2013, over 170 government systems at the county, city, or state levels have been attacked.

0 Comments
Continue reading

Tip of the Week: Overcoming the Hurdles of New Solutions

Tip of the Week: Overcoming the Hurdles of New Solutions

As you have likely realized, the technology solutions that power your business today aren’t going to be effective forever. This means that you will at some point need to upgrade this technology - but this isn’t always as easy as it sounds. Here, we offer a few tips to help you make it over some of the hurdles that a change to your technology can bring.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business User Tips Microsoft Business Computing Malware Network Security Software Hosted Solutions Computer Productivity Google Internet Tech Term Communication Data Small Business Mobile Devices Efficiency IT Services Ransomware Backup Workplace Tips Hardware Smartphone Cloud Computing Windows 10 Data Recovery IT Support Microsoft Office Saving Money Android Productivity Upgrade Office 365 Managed IT Services Gmail Data Management Windows Facebook Information Browser Users Business Continuity Social Media Internet of Things Innovation Managed IT Services Server Phishing Mobile Device Word Data Backup Passwords App Outsourced IT Windows 10 Miscellaneous Disaster Recovery Smartphones Vulnerability Employer-Employee Relationship Cybersecurity Business Management Managed Service Provider VoIP Encryption Network Remote Monitoring Chrome communications Artificial Intelligence Government Money BYOD Office Tips Infrastructure Managed Service Gadgets Applications Hacker Save Money Spam Virtual Reality Content Filtering Website Apple Big Data Analytics IT Support Apps Tip of the week Unified Threat Management Wireless Antivirus Firewall Robot Printing VPN Automation WiFi Access Control Router Customer Service Avoiding Downtime Augmented Reality The Internet of Things Employee-Employer Relationship Virtualization Settings Two-factor Authentication IT Management Development Bandwidth Data storage Paperless Office Maintenance YouTube Display Education Risk Management Tablet Solid State Drive Monitors Holiday Hacking Mobile Device Management Networking Administration Customer Relationship Management Business Intelligence Chromebook Hard Disk Drive Wi-Fi Operating System Presentation End of Support Laptop Data Security HIPAA Collaboration Bring Your Own Device Data loss Business Technology Computing Company Culture Virtual Private Network Password Document Management Office Google Drive Wireless Technology Safety Mouse Vendor Management Server Management Recovery Mobile Security Downtime Touchscreen LiFi Hosted Solution Computers Telephone Systems Storage Retail OneNote SaaS Quick Tips Scam Search Outlook IBM Solar Update Print Toner Experience Unified Communications Public Speaking Social Blockchain Cost Management Monitoring Hard Disk Drives VoIP Google Calendar Chatbots Competition Typing Net Neutrality Screen Reader Messaging Running Cable How To Printer Wearable Technology Work Content Deep Learning Humor Smart Technology Motherboard Voice over Internet Protocol Entertainment WannaCry Computing Infrastructure Dongle Desktop Data Warehouse Digital Payment Virtual Desktop IT service Heating/Cooling Legislation Identity Shortcuts Hacks Permissions Assessment Spying Politics Solid State Drives Buisness Time Management IT solutions Cabling Cryptocurrency FCC Smart Tech Analysis Lithium-ion battery Employee-Employer Relationships Firefox Budget Optimization Streaming Undo sip Distributed Denial of Service FinTech iOS How To Alerts Service Level Agreement Troubleshooting Private Cloud BDR Servers Comparison Security Cameras Fraud Internet Exlporer Tech Support 5G National Security Network Management Marketing Business Analysis Human Error File Sharing Cortana Managed IT Bitcoin Network Congestion Title II Connectivity Students Computer Care Halloween Techology Application SharePoint Recycling Google Maps Best Practice telephony Managed IT Service Modem MSP Samsung Scalability Digital Lenovo Information Technology Licensing Fun Specifications Compliance Managing Stress Managed Services Mail Merge Writing Value PowerPoint Websites Updates Identity Theft Google Docs eWaste Device Disaster Shortcut Windows 8 Online IoT Mixed Reality Training Scary Stories Unified Threat Management Downloads IT Technicians Statistics Business Growth Break Fix Cookies IP Address Migration G Suite Cybercrime Spyware Superfish Google Wallet Cooperation LED Automobile Black Friday Regulations Cables Laptops Address Current Events Hotspot Professional Services Onboarding Hard Drives Continuity Mobility Knowledge Uninterrupted Power Supply Patch Management Microsoft Excel Star Wars Slack Data Breach Sports User Error Legal Multi-Factor Security Mirgation Bluetooth Alt Codes Dark Data Dark Web Nanotechnology Charging Mobile Office Drones Staff Smart Office Co-Managed IT Cyber Monday Social Networking Wires Remote Computing Software as a Service Corporate Profile User Going Green Social Engineering Language USB Digital Signage GDPR Refrigeration GPS Regulation IT Consultant Unsupported Software Computer Repair Processors Cameras Emergency Relocation Meetings Tracking Cleaning Mobile Data Health Alert CCTV Emoji Webcam Work/Life Balance Electronic Medical Records Printers Error Black Market Point of Sale Mobile Computing Travel Law Enforcement Physical Security Notifications Upgrades Twitter Botnet Supercomputer Motion Sickness Domains Gadget Staffing Crowdsourcing Windows 7 Taxes CrashOverride 3D Printing Personal Information Administrator Web Server Machine Learning IT Budget