Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Security Is a Big Component of Windows 10

Security Is a Big Component of Windows 10

With Microsoft betting on Windows 10 to be their #1 OS for the foreseeable future, it is important for them to be able to sufficiently protect their users from the growing threats looking to make life difficult for businesses from all over the world. Today, we will take a look at Windows 10 Enterprise Security, and how it works to protect businesses from harm.

0 Comments
Continue reading

Are the Messaging Apps You Use Secure?

Are the Messaging Apps You Use Secure?

Messaging applications are critical to the success of the modern business, but it’s important that they don’t compromise security in the pursuit of convenience. There is a specific set of criteria involved with ensuring that your chosen messaging applications are secure.

0 Comments
Continue reading

500 Million Users Exposed by Marriott

500 Million Users Exposed by Marriott

2018 has been the year of the hack. The problem, so was 2017, 2016, and so on… Marriott International has announced that they have had what could be the second largest data leak in history. They are saying that they are responsible for a data breach that leaked some 500 million records over a five-year span.

0 Comments
Continue reading

Powerful Physical Security Options

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?

0 Comments
Continue reading

Spreading Botnet has Years-Old Flaw to Thank

Spreading Botnet has Years-Old Flaw to Thank

When asked how one can prevent threats from attacking a business’ infrastructure, one of the first answers that we’d give is to ensure that all patches have been applied. Doing so will help to stop an attack from infecting your systems, if a patch has been successfully developed. Unfortunately, the recent spread of the BCMUPnP_Hunter botnet is evidence that not enough people are appropriately patching their systems.

0 Comments
Continue reading

An MSP’s Services Protect More than Digital Assets

An MSP’s Services Protect More than Digital Assets

When you think about your data security, what kind of solutions pop into mind? If you’re like many, you probably start thinking about passwords, firewalls, and antivirus, right? While these are all good things to have, you also have to consider the possibility that someone could break into your office and bypass all of these defenses, simply by picking up your server and walking out.

0 Comments
Continue reading

One Phish, Two Phish, The Grinch Who Didn’t Phish

One Phish, Two Phish, The Grinch Who Didn’t Phish

An email’s important, that much is clear fact - but you need to stay safe from an email attack.

0 Comments
Continue reading

Securing Your Google Account: The Unofficial Guide

Securing Your Google Account: The Unofficial Guide

If you use a computer today, there’s a fair chance that you have a Google account. The practicality that if offers with its comprehensive service offerings simply can’t be ignored. However, it is also important that a user’s, whether they utilize it for business or personal use, security isn’t ignored either.

0 Comments
Continue reading

How to Keep Your Android Device Secure

How to Keep Your Android Device Secure

Mobile devices - like smartphones, tablets, and the like - are expected to be used by 2.87 billion people by 2020. That’s a lot of devices, with a good portion of them contributing to business operations. Unfortunately, that’s also a lot of potential security issues if the right preparations aren’t taken in advance.

0 Comments
Continue reading

Solid Network Security Requires Vigilance

Solid Network Security Requires Vigilance

When all is said and done, your business’ success relies in no small part on how secure you keep it, and in order to be secure, you need to know what threats are apt to target your business. Below are four of the biggest concerns that you need to be sure that your security implementations address.

0 Comments
Continue reading

How to Keep Your Kids Safe from Devices (and Vice Versa)

How to Keep Your Kids Safe from Devices (and Vice Versa)

It is no secret that kids these days have more access to technology than any generation before them. While this access can truly help to enrich their lives if leveraged properly, it can also have serious ramifications if it isn’t checked.

0 Comments
Continue reading

Be Mindful of These Security Issues

Be Mindful of These Security Issues

With all the stories in the news about data breach after data breach, it’s easy to get the idea that the only threats to your organization are those that are trying to break in. This can be a dangerous oversight--one that could cost your business’ future. If you ignore the possibilities, you could very well be putting your organization in jeopardy. We’ll discuss some of the major internal dangers that your business could face.

0 Comments
Continue reading

Fileless Ransomware Uses Windows Tools Against You

Fileless Ransomware Uses Windows Tools Against You

By now everyone knows about ransomware, the dastardly strand of malware that encrypts data (or the drives it’s stored on) and sends the user a message demanding payment in a certain amount of time before the data is deleted forever. To add a little more menace to an already stressful situation, the message includes a countdown clock. If it sounds like a bad situation, rest assured it is. How could it get worse you ask? Simple, make it more difficult to stop.

0 Comments
Continue reading

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

0 Comments
Continue reading

Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

0 Comments
Continue reading

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

0 Comments
Continue reading

FREE Printout: IT Security End-User Checklist

FREE Printout: IT Security End-User Checklist

This guide was created so that business owners, office managers, and IT departments can provide it as an educational resource to showcase some of the most basic IT security practices that can be implemented in your workplace. We recommend printing this out and handing it out to your staff for maximum results.

0 Comments
Continue reading

Tech Term: Opening the Spam Folder

Tech Term: Opening the Spam Folder

Spam is a tricky subject to talk about, as it seems everyone has a different definition for it. Yet, most have come to the conclusion that spam is a bad thing. For today’s Tech Term, we want to delve deep into the different kinds of spam out there, as well as theorize where the term even came from.

0 Comments
Continue reading

Where There’s Data Loss, There’s Trouble

Where There’s Data Loss, There’s Trouble

Data loss can have lasting effects upon your business, usually measured in lost productivity and capital. In other words, data loss is often measured by the cost required to retrieve, restore, and/or repair its effects. Of course, this is only the beginning of how data loss can impact your operations.

0 Comments
Continue reading

BYOD is Only Helpful If the Devices Are Secure

BYOD is Only Helpful If the Devices Are Secure

Mobile devices are so common nowadays that you’ll likely encounter your employees bringing multiple devices to the office on a regular basis. Little do they know that everything they bring with them, from their Fitbit to their laptop, poses a security threat. Of course, the threat level from each individual device will depend on what it is exactly, but the point stands that the less you do about mobile device security now, the more danger your organization will be in down the road.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Hackers User Tips Malware Microsoft Computer Business Computing Productivity Google Hosted Solutions Internet Network Security Software Tech Term Communication Mobile Devices Efficiency IT Services Data Small Business Backup Hardware Smartphone Workplace Tips Windows 10 Ransomware Android IT Support Productivity Microsoft Office Saving Money Browser Managed IT Services Business Continuity Data Recovery Data Management Cloud Computing Gmail Office 365 Innovation Internet of Things Facebook Managed IT Services Server Users Upgrade Windows Word Data Backup Passwords Disaster Recovery Smartphones Outsourced IT Windows 10 App Phishing Social Media communications Remote Monitoring Managed Service Provider VoIP Business Management Mobile Device Encryption Network Artificial Intelligence Vulnerability Chrome Cybersecurity Employer-Employee Relationship Money Content Filtering Big Data Managed Service Miscellaneous Infrastructure Information Save Money Spam Apple Government Website Analytics Office Tips BYOD IT Support Tip of the week Applications Hacker Firewall Robot Bandwidth Printing Virtual Reality Employee-Employer Relationship YouTube Automation WiFi Avoiding Downtime Paperless Office Education Risk Management The Internet of Things Wireless Virtualization IT Management Access Control Maintenance Customer Service Data storage Router Display Tablet Settings Antivirus Two-factor Authentication Hosted Solution Hard Disk Drive VPN Operating System Data Security Company Culture Data loss Business Technology End of Support Presentation Computing Virtual Private Network Search IBM SaaS Google Drive Office Password Gadgets Server Management Mouse Vendor Management Wireless Technology Touchscreen Recovery Development Mobile Device Management Administration Customer Relationship Management Unified Threat Management LiFi Holiday Telephone Systems Wi-Fi Computers Laptop HIPAA Storage Chromebook Augmented Reality Quick Tips Retail Scam Safety Apps Solid State Drive Outlook Document Management Mobile Security Hacking Downtime Networking Monitors Business Intelligence Online IoT IT service Heating/Cooling Analysis Employee-Employer Relationships Scary Stories Samsung Downloads IT Technicians WannaCry Typing Competition Optimization Streaming FinTech iOS IP Address Cybercrime Cooperation Deep Learning Humor Troubleshooting Websites Identity Theft Break Fix Cookies Time Management Hotspot Professional Services Cabling Training Black Friday Regulations Firefox Hacks Security Cameras Automobile Microsoft Excel Star Wars BDR Servers Budget Students Sports G Suite Multi-Factor Security Mirgation Cryptocurrency Recycling Human Error Knowledge Network Management How To MSP Scalability Mobile Office Staff Bring Your Own Device sip Undo Dark Web Nanotechnology Language USB Marketing Managed IT PowerPoint Cyber Monday Social Networking Techology Managing Stress Managed Services Unified Communications Blockchain Cost Management Google Maps Application Google Calendar Chatbots Digital Bitcoin Lenovo Network Congestion eWaste Device Experience Information Technology Migration Running Cable Remote Computing Printer Wearable Technology Best Practice Mail Merge telephony LED Net Neutrality Screen Reader Update Computing Infrastructure Dongle Disaster Shortcut Google Docs Onboarding Virtual Desktop Smart Technology Motherboard Unified Threat Management Writing Cables Laptops Permissions Assessment Statistics Slack Buisness Legislation Identity Spyware Windows 8 Superfish Continuity Mobility Google Wallet Charging Lithium-ion battery Business Growth Address Smart Office Co-Managed IT IT solutions Digital Payment FCC Smart Tech Software as a Service Alerts Service Level Agreement Uninterrupted Power Supply Patch Management Hard Drives Digital Signage Politics Distributed Denial of Service Current Events User Error Wires Collaboration Fraud Internet Exlporer Bluetooth Legal Monitoring 5G Comparison Solar Print Toner Drones Messaging Halloween SharePoint Corporate Profile Alt Codes Dark Data Work Content Cortana Title II Connectivity Voice over Internet Protocol Entertainment Licensing Refrigeration Desktop Fun Tech Support Managed IT Service Modem VoIP Going Green User Social Engineering File Sharing Value Spying Computer Care Specifications Compliance How To Social Public Speaking Shortcuts Unsupported Software Emergency Error Black Market Point of Sale Travel Law Enforcement Mobile Data Notifications Twitter Printers Botnet Supercomputer Motion Sickness Gadget Staffing Personal Information Administrator Crowdsourcing Taxes Web Server Machine Learning IT Budget GPS Mobile Computing Computer Repair Physical Security IT Consultant Upgrades Windows 7 Processors Cameras Relocation Meetings Tracking Health Cleaning CrashOverride Domains 3D Printing Regulation Alert CCTV Private Cloud Emoji Webcam Electronic Medical Records Work/Life Balance