Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft SQL Server 2008 and 2008 R2 Approaching End of Life

Microsoft SQL Server 2008 and 2008 R2 Approaching End of Life

A decade-old version of Microsoft’s popular database software SQL Server 2008 and SQL Server 2008 R2 is losing support on July 9,2019. If your business hasn’t moved away from the software, you are looking at a few real pressing problems. Let’s take a look at the software and what options businesses that haven’t moved on from SQL Server 2008 or SQL Server R2 have going forward.

0 Comments
Continue reading

Prioritizing Network Security is a Must

Prioritizing Network Security is a Must

Every business has their version of risk management. Nowadays, with all the technology organizations use for productivity, collaboration, and communications, managing risk can often be difficult. There are numerous threats that come from the Internet that could put a damper on productivity, create inefficiencies, or shut down production entirely. Regardless of how large or small your business is, you need to prioritize the security of your computing network.

0 Comments
Continue reading

Unpatched Windows is Like Leaving Your Car Door Open in a Sketchy Parking Garage at Night with Wads of Cash in the Driver’s Seat

Unpatched Windows is Like Leaving Your Car Door Open in a Sketchy Parking Garage at Night with Wads of Cash in the Driver’s Seat

I recently read a statement from the National Security Agency (NSA) expressing concerns over the risks and vulnerabilities that come with running unpatched versions of older Windows operating systems. First, you know it’s serious if the NSA, an entity in the US who depends on the collection and processing of information, is worried that your personal information is at risk. Second, it’s another in a long line of reasons to not allow your network to fall into such disarray that you can no longer protect it.

0 Comments
Continue reading

“Paying the Ransom” Isn’t a Ransomware Defense

“Paying the Ransom” Isn’t a Ransomware Defense

Ransomware has become a favorite attack vector for hackers - after all, for them, it’s pretty much a no loss game. They either get paid, or they move on to their next target. Unfortunately, cyberattackers that dispatch ransomware often do get paid, and these payments can sometimes come from a surprising source: cybersecurity firms.

0 Comments
Continue reading

NSA-Developed Malware Used in Third-Party Hack

NSA-Developed Malware Used in Third-Party Hack

Have you ever wondered what happens when hackers gain access to state-developed malware tools? Well, now you don’t have to; a type of malware called Double Pulsar, that has been utilized in the past by the NSA, was bundled with a Chinese hacking tool and used to carry out attacks on Hong Kong and Belgium in 2016. Needless to say, this threat is unnerving.

0 Comments
Continue reading

Even Cities Aren’t Immune to Ransomware

Even Cities Aren’t Immune to Ransomware

Ransomware hasn’t let up. It is important to understand that any organization, of any kind, is a potential target of a ransomware attack - and yes, this includes municipalities. In fact, since 2013, over 170 government systems at the county, city, or state levels have been attacked.

0 Comments
Continue reading

Protect Your Data Using These Three Methods

Protect Your Data Using These Three Methods

With so much on the line for businesses that deal with sensitive information, security needs to be considered a top priority. Unfortunately, one solution that works for every threat out there doesn’t exist. The right combination of enterprise-level security solutions can help your business secure its important data.

0 Comments
Continue reading

Looking Back at 2019 Data Breaches

Looking Back at 2019 Data Breaches

Data is more of a commodity than it has ever been, and more often than not, companies spend a considerable sum on data security. Unfortunately, even the most well-defended organizations still have trouble keeping data safe. 2018 saw 446.5 million records exposed due to data breaches, even though the overall number of breaches dropped by 23 percent to 1,244 total. We’ll discuss some of the most notable breaches that have happened over the first four months of 2019.

0 Comments
Continue reading

Would One of These Social Media Scams Bamboozle You?

Would One of These Social Media Scams Bamboozle You?

Social media plays an increasing role in both the professional and personal sides of our lives. Unfortunately, this means that we all experience an increase in exposure to the many scam attempts that will appear on our screens. Like any kind of scam, the best defense against those that appear on social media is good, old-fashioned awareness and vigilance.

0 Comments
Continue reading

USB Killer Caused $58,000 in Damage to The College of Saint Rose

USB Killer Caused $58,000 in Damage to The College of Saint Rose

For the modern business a lot of time is spent focusing on network security. The theory behind this action is that there are all types of threats that could be trying to get into your computer network. At a college, you’d expect that, since so much sensitive data, including personal, medical, and financial information--as well as intellectual property--is stored on college computers/servers, that the diligence of IT administrators would be even more conspicuous.

0 Comments
Continue reading

Security Is a Big Component of Windows 10

Security Is a Big Component of Windows 10

With Microsoft betting on Windows 10 to be their #1 OS for the foreseeable future, it is important for them to be able to sufficiently protect their users from the growing threats looking to make life difficult for businesses from all over the world. Today, we will take a look at Windows 10 Enterprise Security, and how it works to protect businesses from harm.

0 Comments
Continue reading

Are the Messaging Apps You Use Secure?

Are the Messaging Apps You Use Secure?

Messaging applications are critical to the success of the modern business, but it’s important that they don’t compromise security in the pursuit of convenience. There is a specific set of criteria involved with ensuring that your chosen messaging applications are secure.

0 Comments
Continue reading

500 Million Users Exposed by Marriott

500 Million Users Exposed by Marriott

2018 has been the year of the hack. The problem, so was 2017, 2016, and so on… Marriott International has announced that they have had what could be the second largest data leak in history. They are saying that they are responsible for a data breach that leaked some 500 million records over a five-year span.

0 Comments
Continue reading

Powerful Physical Security Options

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?

0 Comments
Continue reading

Spreading Botnet has Years-Old Flaw to Thank

Spreading Botnet has Years-Old Flaw to Thank

When asked how one can prevent threats from attacking a business’ infrastructure, one of the first answers that we’d give is to ensure that all patches have been applied. Doing so will help to stop an attack from infecting your systems, if a patch has been successfully developed. Unfortunately, the recent spread of the BCMUPnP_Hunter botnet is evidence that not enough people are appropriately patching their systems.

0 Comments
Continue reading

An MSP’s Services Protect More than Digital Assets

An MSP’s Services Protect More than Digital Assets

When you think about your data security, what kind of solutions pop into mind? If you’re like many, you probably start thinking about passwords, firewalls, and antivirus, right? While these are all good things to have, you also have to consider the possibility that someone could break into your office and bypass all of these defenses, simply by picking up your server and walking out.

0 Comments
Continue reading

One Phish, Two Phish, The Grinch Who Didn’t Phish

One Phish, Two Phish, The Grinch Who Didn’t Phish

An email’s important, that much is clear fact - but you need to stay safe from an email attack.

0 Comments
Continue reading

Securing Your Google Account: The Unofficial Guide

Securing Your Google Account: The Unofficial Guide

If you use a computer today, there’s a fair chance that you have a Google account. The practicality that if offers with its comprehensive service offerings simply can’t be ignored. However, it is also important that a user’s, whether they utilize it for business or personal use, security isn’t ignored either.

0 Comments
Continue reading

How to Keep Your Android Device Secure

How to Keep Your Android Device Secure

Mobile devices - like smartphones, tablets, and the like - are expected to be used by 2.87 billion people by 2020. That’s a lot of devices, with a good portion of them contributing to business operations. Unfortunately, that’s also a lot of potential security issues if the right preparations aren’t taken in advance.

0 Comments
Continue reading

Solid Network Security Requires Vigilance

Solid Network Security Requires Vigilance

When all is said and done, your business’ success relies in no small part on how secure you keep it, and in order to be secure, you need to know what threats are apt to target your business. Below are four of the biggest concerns that you need to be sure that your security implementations address.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Hackers Business Email User Tips Microsoft Business Computing Malware Hosted Solutions Computer Network Security Software Google Productivity Internet Tech Term Communication Data Small Business Ransomware Backup Mobile Devices Efficiency IT Services Workplace Tips Hardware Windows 10 Cloud Computing Smartphone IT Support Microsoft Office Saving Money Android Data Recovery Upgrade Office 365 Productivity Windows Facebook Information Users Browser Business Continuity Social Media Managed IT Services Gmail Data Management Server Managed IT Services Mobile Device Phishing Word Data Backup Internet of Things Innovation App Outsourced IT Windows 10 Miscellaneous Disaster Recovery Smartphones Passwords Encryption Network Business Management Remote Monitoring Chrome Artificial Intelligence communications Employer-Employee Relationship Vulnerability Cybersecurity Managed Service Provider VoIP Apple Office Tips Managed Service Analytics Gadgets Government Infrastructure Hacker IT Support Spam Content Filtering BYOD Website Big Data Money Apps Tip of the week Virtual Reality Applications Save Money Avoiding Downtime Customer Service Augmented Reality Employee-Employer Relationship Unified Threat Management The Internet of Things Data storage Settings Display Virtualization Two-factor Authentication IT Management Bandwidth Development Robot YouTube Maintenance Printing Automation Education Tablet Risk Management Access Control Router Wireless Firewall Antivirus Paperless Office VPN WiFi Data loss Business Technology Computers Storage Office Company Culture Holiday Virtual Private Network Safety Retail Wireless Technology Recovery Server Management Chromebook Touchscreen Downtime Hosted Solution Collaboration Outlook Monitors Telephone Systems OneNote Document Management Quick Tips Operating System Scam Search IBM End of Support HIPAA Bring Your Own Device Hacking Computing Solid State Drive Google Drive Networking Mobile Device Management Password Administration Customer Relationship Management Mouse Vendor Management SaaS Wi-Fi Business Intelligence Hard Disk Drive LiFi Data Security Laptop Mobile Security Presentation Remote Computing Troubleshooting Online IoT Windows 8 BDR Undo Servers FinTech iOS Downloads IT Technicians Update National Security Break Fix Cookies Business Growth Marketing Network Management 5G Security Cameras Cooperation Google Wallet Students Black Friday Regulations Application Techology Halloween Recycling Human Error Hotspot Professional Services Current Events Managed IT Cortana Mirgation Legal Digital Lenovo Microsoft Excel Star Wars Google Maps Fun MSP Scalability Digital Payment Multi-Factor Security PowerPoint Updates Dark Web Nanotechnology Alt Codes Dark Data Managing Stress Politics Managed Services Staff Drones Mail Merge Mixed Reality Cyber Monday Social Networking Unified Threat Management Scary Stories eWaste Device Language USB Going Green Social Engineering Disaster Shortcut Google Calendar Chatbots Spyware Superfish IP Address Cybercrime LED Blockchain Cost Management Social Statistics Private Cloud Migration Onboarding Net Neutrality Screen Reader Typing Hard Drives Cables Tech Support Laptops Printer Wearable Technology Address Knowledge Slack File Sharing Data Breach Smart Technology Motherboard Deep Learning Humor User Error Sports Continuity Mobility Computer Care Computing Infrastructure Dongle Uninterrupted Power Supply Patch Management Legislation Identity Mobile Office Smart Office Samsung Co-Managed IT Permissions Assessment Hacks Bluetooth Charging Digital Signage GDPR FCC Smart Tech Cryptocurrency Refrigeration Wires Websites Software as a Service Identity Theft Budget User Corporate Profile Experience Unified Communications Monitoring Hard Disk Drives Distributed Denial of Service sip VoIP Solar Print Toner Training Alerts Service Level Agreement How To Public Speaking Comparison How To Running Cable Work Content G Suite Fraud Internet Exlporer Competition Automobile Messaging WannaCry Desktop Title II Connectivity Bitcoin Network Congestion IT service Heating/Cooling Virtual Desktop Voice over Internet Protocol Entertainment SharePoint Spying Solid State Drives Managed IT Service Modem Best Practice telephony Time Management Buisness Shortcuts Licensing Information Technology Employee-Employer Relationships Specifications Compliance Google Docs Firefox Lithium-ion battery Optimization Streaming Value Writing Cabling IT solutions Analysis Physical Security Web Server Machine Learning IT Budget GPS Upgrades Computer Repair IT Consultant Processors Printers Cameras Relocation Meetings Tracking 3D Printing Health Cleaning Alert CCTV Emoji Webcam Unsupported Software Electronic Medical Records Work/Life Balance Domains CrashOverride Error Windows 7 Black Market Point of Sale Business Analysis Mobile Data Travel Law Enforcement Notifications Regulation Emergency Twitter Data Warehouse Botnet Supercomputer Motion Sickness Gadget Staffing Administrator Crowdsourcing Taxes Mobile Computing Personal Information