Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

500 Million Users Exposed by Marriott

500 Million Users Exposed by Marriott

2018 has been the year of the hack. The problem, so was 2017, 2016, and so on… Marriott International has announced that they have had what could be the second largest data leak in history. They are saying that they are responsible for a data breach that leaked some 500 million records over a five-year span.

0 Comments
Continue reading

Powerful Physical Security Options

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?

0 Comments
Continue reading

Spreading Botnet has Years-Old Flaw to Thank

Spreading Botnet has Years-Old Flaw to Thank

When asked how one can prevent threats from attacking a business’ infrastructure, one of the first answers that we’d give is to ensure that all patches have been applied. Doing so will help to stop an attack from infecting your systems, if a patch has been successfully developed. Unfortunately, the recent spread of the BCMUPnP_Hunter botnet is evidence that not enough people are appropriately patching their systems.

0 Comments
Continue reading

An MSP’s Services Protect More than Digital Assets

An MSP’s Services Protect More than Digital Assets

When you think about your data security, what kind of solutions pop into mind? If you’re like many, you probably start thinking about passwords, firewalls, and antivirus, right? While these are all good things to have, you also have to consider the possibility that someone could break into your office and bypass all of these defenses, simply by picking up your server and walking out.

0 Comments
Continue reading

One Phish, Two Phish, The Grinch Who Didn’t Phish

One Phish, Two Phish, The Grinch Who Didn’t Phish

An email’s important, that much is clear fact - but you need to stay safe from an email attack.

0 Comments
Continue reading

Securing Your Google Account: The Unofficial Guide

Securing Your Google Account: The Unofficial Guide

If you use a computer today, there’s a fair chance that you have a Google account. The practicality that if offers with its comprehensive service offerings simply can’t be ignored. However, it is also important that a user’s, whether they utilize it for business or personal use, security isn’t ignored either.

0 Comments
Continue reading

How to Keep Your Android Device Secure

How to Keep Your Android Device Secure

Mobile devices - like smartphones, tablets, and the like - are expected to be used by 2.87 billion people by 2020. That’s a lot of devices, with a good portion of them contributing to business operations. Unfortunately, that’s also a lot of potential security issues if the right preparations aren’t taken in advance.

0 Comments
Continue reading

Solid Network Security Requires Vigilance

Solid Network Security Requires Vigilance

When all is said and done, your business’ success relies in no small part on how secure you keep it, and in order to be secure, you need to know what threats are apt to target your business. Below are four of the biggest concerns that you need to be sure that your security implementations address.

0 Comments
Continue reading

How to Keep Your Kids Safe from Devices (and Vice Versa)

How to Keep Your Kids Safe from Devices (and Vice Versa)

It is no secret that kids these days have more access to technology than any generation before them. While this access can truly help to enrich their lives if leveraged properly, it can also have serious ramifications if it isn’t checked.

0 Comments
Continue reading

Be Mindful of These Security Issues

Be Mindful of These Security Issues

With all the stories in the news about data breach after data breach, it’s easy to get the idea that the only threats to your organization are those that are trying to break in. This can be a dangerous oversight--one that could cost your business’ future. If you ignore the possibilities, you could very well be putting your organization in jeopardy. We’ll discuss some of the major internal dangers that your business could face.

0 Comments
Continue reading

Fileless Ransomware Uses Windows Tools Against You

Fileless Ransomware Uses Windows Tools Against You

By now everyone knows about ransomware, the dastardly strand of malware that encrypts data (or the drives it’s stored on) and sends the user a message demanding payment in a certain amount of time before the data is deleted forever. To add a little more menace to an already stressful situation, the message includes a countdown clock. If it sounds like a bad situation, rest assured it is. How could it get worse you ask? Simple, make it more difficult to stop.

0 Comments
Continue reading

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

0 Comments
Continue reading

Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

0 Comments
Continue reading

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

0 Comments
Continue reading

FREE Printout: IT Security End-User Checklist

FREE Printout: IT Security End-User Checklist

This guide was created so that business owners, office managers, and IT departments can provide it as an educational resource to showcase some of the most basic IT security practices that can be implemented in your workplace. We recommend printing this out and handing it out to your staff for maximum results.

0 Comments
Continue reading

Tech Term: Opening the Spam Folder

Tech Term: Opening the Spam Folder

Spam is a tricky subject to talk about, as it seems everyone has a different definition for it. Yet, most have come to the conclusion that spam is a bad thing. For today’s Tech Term, we want to delve deep into the different kinds of spam out there, as well as theorize where the term even came from.

0 Comments
Continue reading

Where There’s Data Loss, There’s Trouble

Where There’s Data Loss, There’s Trouble

Data loss can have lasting effects upon your business, usually measured in lost productivity and capital. In other words, data loss is often measured by the cost required to retrieve, restore, and/or repair its effects. Of course, this is only the beginning of how data loss can impact your operations.

0 Comments
Continue reading

BYOD is Only Helpful If the Devices Are Secure

BYOD is Only Helpful If the Devices Are Secure

Mobile devices are so common nowadays that you’ll likely encounter your employees bringing multiple devices to the office on a regular basis. Little do they know that everything they bring with them, from their Fitbit to their laptop, poses a security threat. Of course, the threat level from each individual device will depend on what it is exactly, but the point stands that the less you do about mobile device security now, the more danger your organization will be in down the road.

0 Comments
Continue reading

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

0 Comments
Continue reading

Tech Term: What Does “Encryption” Mean?

Tech Term: What Does “Encryption” Mean?

Email is a solution that needs to be protected, lest you expose important information to any onlookers while messages are in transit. Encryption is one of the key ways you can make sure that your messages are safe, but email hasn’t always used this method to secure messages. In fact, it wasn’t until relatively recently that encryption became a staple of the major email providers.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business Malware User Tips Computer Business Computing Internet Network Security Tech Term Microsoft Software Productivity Google Hosted Solutions Mobile Devices Efficiency IT Services Small Business Communication Windows 10 Hardware Ransomware Backup Android Smartphone Data Workplace Tips Productivity IT Support Saving Money Data Management Managed IT Services Microsoft Office Browser Cloud Computing Internet of Things Gmail Data Recovery Windows Facebook Server Managed IT Services Upgrade Business Continuity Word Disaster Recovery Data Backup Passwords App Innovation Phishing Office 365 Mobile Device Windows 10 Business Management Smartphones Employer-Employee Relationship Managed Service Provider VoIP Cybersecurity Artificial Intelligence Encryption Remote Monitoring Users Outsourced IT communications Social Media Miscellaneous Government Information Applications Tip of the week Vulnerability Analytics BYOD IT Support Office Tips Money Network Infrastructure Chrome Spam Content Filtering Website Big Data Access Control Maintenance Save Money Router Apple Risk Management Tablet Wireless Data storage Firewall Antivirus Display WiFi Avoiding Downtime Customer Service The Internet of Things Robot Virtual Reality Printing Hacker Settings Automation Paperless Office Two-factor Authentication Bandwidth IT Management Employee-Employer Relationship Managed Service YouTube HIPAA Unified Threat Management Holiday Search Education LiFi Quick Tips Apps IBM Scam Computers Storage Hacking Development Administration Mobile Device Management Retail Customer Relationship Management Networking Mobile Security Wi-Fi Document Management VPN Outlook Laptop Presentation Augmented Reality Data Security Monitors Data loss Business Technology Office Virtual Private Network Gadgets Safety Wireless Technology Operating System Recovery Business Intelligence Virtualization End of Support Server Management Downtime SaaS Hosted Solution Touchscreen Computing Google Drive Company Culture Password Mouse Vendor Management Telephone Systems Update Knowledge Address Best Practice telephony MSP FCC Smart Tech Sports Information Technology Uninterrupted Power Supply Patch Management Google Docs Managing Stress Managed Services Distributed Denial of Service Mobile Office User Error Writing PowerPoint Alerts Service Level Agreement Digital Payment User eWaste Device Comparison Windows 8 Refrigeration Fraud Internet Exlporer Bluetooth SharePoint Corporate Profile Chromebook Experience Unified Communications Business Growth Title II Connectivity Politics Google Wallet Public Speaking LED Solid State Drive Collaboration Cables Laptops Managed IT Service Modem VoIP Running Cable Current Events Competition Onboarding Licensing Virtual Desktop Legal Continuity Mobility Specifications Compliance How To Slack Value Co-Managed IT Downloads IT Technicians WannaCry Alt Codes Dark Data Charging Online IoT IT service Heating/Cooling Tech Support Buisness Drones Smart Office Cooperation Hard Disk Drive File Sharing IT solutions Wires Software as a Service Break Fix Cookies Lithium-ion battery Time Management Computer Care Going Green Social Engineering Digital Signage Cabling Solar Print Toner Black Friday Regulations Firefox Samsung Social Undo Monitoring Hotspot Professional Services Work Content Multi-Factor Security Mirgation Typing Marketing Microsoft Excel Star Wars BDR 5G Servers Websites Identity Theft Staff Cortana Deep Learning Humor Application Voice over Internet Protocol Dark Web Nanotechnology Network Management Halloween Training Desktop Fun Managed IT Automobile Shortcuts Cyber Monday Social Networking Techology G Suite Hacks Spying Language USB Optimization Streaming Google Calendar Chatbots Digital Lenovo Cryptocurrency Analysis Blockchain Cost Management Google Maps Budget Printer Wearable Technology Mail Merge Bring Your Own Device sip FinTech Net Neutrality Screen Reader Scary Stories How To Troubleshooting Disaster Shortcut Security Cameras Smart Technology Motherboard IP Address Cybercrime Unified Threat Management Computing Infrastructure Dongle Recycling Human Error Legislation Identity Spyware Remote Computing Superfish Bitcoin Network Congestion Hard Drives Permissions Assessment Statistics GPS Domains Printers Computer Repair IT Consultant Mobile Computing Physical Security CrashOverride Processors Cameras Relocation Meetings Tracking Upgrades Health Cleaning Private Cloud Alert CCTV Emoji Emergency Webcam 3D Printing Electronic Medical Records Work/Life Balance Error Black Market Point of Sale Regulation Unsupported Software Travel Entertainment Law Enforcement Notifications Mobile Data Twitter Botnet Supercomputer Motion Sickness Gadget Staffing Personal Information Administrator Crowdsourcing Taxes Web Server Machine Learning IT Budget