Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Don’t Get Faced by FaceTime

Tip of the Week: Don’t Get Faced by FaceTime

Sometimes threats come from the most unlikely places. One such threat came in the form of Apple’s FaceTime app, which gives users the ability to spy on others without their consent through group FaceTime calls. Even though a patch has been issued that solves the problem, it’s still worth reflecting on.

0 Comments
Continue reading

Apple vs Samsung: Who Makes Better Tablets?

Apple vs Samsung: Who Makes Better Tablets?

In today’s mobile-centric world, portability is becoming more and more crucial to success in business affairs. This phenomenon can easily explain why tablets are commonplace in boardrooms and briefcases. With Apple and Samsung offering two heavy-hitting tablets (the Galaxy Tab S3 and the iPad Pro), we’ve decided to analyze their features head-to-head to find out which is the supreme option for your business needs.

0 Comments
Continue reading

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

0 Comments
Continue reading

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business User Tips Microsoft Business Computing Malware Network Security Hosted Solutions Computer Google Productivity Software Internet Tech Term Communication Data Small Business Backup Ransomware Mobile Devices Efficiency IT Services Workplace Tips Hardware Windows 10 Smartphone Cloud Computing Saving Money Data Recovery IT Support Android Microsoft Office Upgrade Office 365 Productivity Social Media Browser Business Continuity Information Gmail Data Management Managed IT Services Facebook Windows Users Phishing Word Managed IT Services Internet of Things Mobile Device Server Data Backup Innovation Miscellaneous Passwords Smartphones Disaster Recovery Outsourced IT Windows 10 App Cybersecurity Network Chrome Business Management Employer-Employee Relationship communications Remote Monitoring Artificial Intelligence Managed Service Provider VoIP Encryption Vulnerability Save Money Hacker Government Apple Managed Service Content Filtering Apps Analytics BYOD Big Data IT Support Infrastructure Applications Money Virtual Reality Gadgets Spam Tip of the week Office Tips Website Antivirus Unified Threat Management Settings Two-factor Authentication VPN Employee-Employer Relationship Bandwidth Data storage YouTube Access Control Display Firewall Router Development Education Risk Management Wireless WiFi IT Management Robot Printing Avoiding Downtime Maintenance The Internet of Things Automation Paperless Office Virtualization Augmented Reality Customer Service Tablet Holiday Networking Safety LiFi Company Culture Downtime Hard Disk Drive Computers Chromebook Hosted Solution Data Security Storage Retail Collaboration Data loss Business Technology Hacking Virtual Private Network HIPAA Document Management Search Outlook Server Management OneNote IBM Touchscreen Monitors Presentation Mobile Security Administration Mobile Device Management Telephone Systems Office Operating System Customer Relationship Management Wi-Fi Wireless Technology Quick Tips End of Support Computing SaaS Scam Bring Your Own Device Recovery Laptop Password Google Drive Business Intelligence Solid State Drive Mouse Vendor Management Halloween Information Technology Language USB Analysis Employee-Employer Relationships Cortana Update How To Best Practice telephony Cyber Monday Social Networking Optimization Streaming Writing Blockchain Cost Management FinTech iOS Fun Hard Drives WannaCry Google Docs Google Calendar Chatbots Troubleshooting IT service Heating/Cooling Net Neutrality Screen Reader Security Cameras Digital Payment Printer Wearable Technology National Security Time Management Windows 8 Scary Stories Politics Cabling Google Wallet Computing Infrastructure Dongle Students Firefox Business Growth Smart Technology Motherboard Recycling Human Error Current Events Permissions Assessment MSP Scalability Refrigeration Legislation Identity IP Address User Cybercrime BDR Servers FCC Smart Tech Managing Stress Managed Services Private Cloud Legal PowerPoint Updates Public Speaking Network Management Sports Tech Support Managed IT Drones Alerts Service Level Agreement Mixed Reality Knowledge Competition Techology Alt Codes Dark Data Distributed Denial of Service eWaste Device Going Green Social Engineering Fraud Internet Exlporer Migration File Sharing Digital Lenovo Comparison LED Mobile Office Computer Care Google Maps Title II Connectivity Cables Laptops Mail Merge SharePoint Onboarding Samsung Social Websites Identity Theft Disaster Shortcut Licensing Slack Data Breach Experience Unified Communications Unified Threat Management Typing Managed IT Service Modem Continuity Mobility Statistics Value Charging Undo Spyware Superfish Deep Learning Humor Specifications Compliance Smart Office Co-Managed IT Running Cable Training Online IoT Wires Software as a Service Marketing Virtual Desktop Automobile Address Downloads IT Technicians Digital Signage GDPR G Suite Hacks Print Toner Application Buisness Uninterrupted Power Supply Patch Management Budget Cooperation Monitoring Hard Disk Drives User Error Cryptocurrency Break Fix Cookies Solar Bluetooth How To Hotspot Professional Services Messaging IT solutions sip Black Friday Regulations Work Content Lithium-ion battery Microsoft Excel Star Wars Voice over Internet Protocol Entertainment Corporate Profile Multi-Factor Security Mirgation Desktop Nanotechnology Shortcuts 5G Staff Spying Solid State Drives Remote Computing VoIP Bitcoin Network Congestion Dark Web GPS Mobile Computing Computer Repair Emergency IT Consultant Relocation Physical Security Processors Domains Cameras Tracking Upgrades Meetings Health Printers Cleaning Alert CCTV Business Analysis 3D Printing Emoji Webcam Electronic Medical Records Work/Life Balance Error Unsupported Software Black Market Point of Sale Windows 7 Travel Law Enforcement Notifications Botnet Supercomputer Mobile Data Twitter Staffing Regulation Motion Sickness CrashOverride Gadget Personal Information Administrator Data Warehouse Crowdsourcing Taxes Machine Learning IT Budget Web Server