Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Looking Back at 2019 Data Breaches

Looking Back at 2019 Data Breaches

Data is more of a commodity than it has ever been, and more often than not, companies spend a considerable sum on data security. Unfortunately, even the most well-defended organizations still have trouble keeping data safe. 2018 saw 446.5 million records exposed due to data breaches, even though the overall number of breaches dropped by 23 percent to 1,244 total. We’ll discuss some of the most notable breaches that have happened over the first four months of 2019.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers User Tips Malware Business Computing Computer Network Security Microsoft Google Productivity Software Hosted Solutions Internet Tech Term Data Small Business Ransomware Backup Mobile Devices Efficiency Communication IT Services Workplace Tips Hardware Windows 10 Smartphone Cloud Computing Microsoft Office Saving Money Android Data Recovery IT Support Productivity Facebook Browser Business Continuity Upgrade Social Media Managed IT Services Gmail Windows Data Management Data Backup Server Office 365 Users Information Phishing Internet of Things Word Managed IT Services Innovation Mobile Device Smartphones Disaster Recovery Outsourced IT Passwords App Windows 10 Vulnerability Cybersecurity Miscellaneous communications Artificial Intelligence Business Management Managed Service Provider Remote Monitoring Employer-Employee Relationship VoIP Encryption Network Chrome Gadgets Managed Service Content Filtering Tip of the week Analytics IT Support Spam Website Big Data Government Money Applications Apps BYOD Infrastructure Save Money Office Tips Apple Virtual Reality Hacker Two-factor Authentication Employee-Employer Relationship Virtualization Tablet Data storage Paperless Office Display Bandwidth YouTube Antivirus Access Control Router VPN Development Education Unified Threat Management Risk Management Robot Wireless Printing Automation Firewall Augmented Reality IT Management Customer Service WiFi Maintenance Avoiding Downtime The Internet of Things Settings Company Culture Downtime Scam Wireless Technology Storage Retail Hosted Solution Recovery SaaS Solid State Drive Networking HIPAA Outlook Hard Disk Drive Monitors Holiday Search Data Security IBM Data loss Business Technology Virtual Private Network Administration Operating System Mobile Security Chromebook Mobile Device Management Hacking Customer Relationship Management End of Support Wi-Fi Computing Server Management Bring Your Own Device Password Document Management Touchscreen Google Drive Laptop Mouse Vendor Management Business Intelligence Presentation Telephone Systems LiFi Safety Computers Office Quick Tips G Suite Security Cameras Google Wallet Net Neutrality Screen Reader Automobile National Security Bluetooth Business Growth Printer Wearable Technology Application Scary Stories Corporate Profile Current Events Smart Technology Motherboard Students Computing Infrastructure Dongle Recycling Human Error Legislation Identity MSP Scalability VoIP Legal Permissions Assessment IP Address Cybercrime Managing Stress Managed Services How To Drones FCC Smart Tech PowerPoint Updates Alt Codes Dark Data Sports WannaCry Going Green Distributed Denial of Service Social Engineering Mixed Reality Knowledge IT service Heating/Cooling Alerts Service Level Agreement Remote Computing eWaste Device Social Comparison Hard Drives Migration Time Management Fraud Internet Exlporer Update LED Mobile Office Cables Laptops Firefox Title II Connectivity Onboarding Cabling Typing SharePoint Mobility Managed IT Service Modem Slack Digital Payment Data Breach Experience Unified Communications BDR Servers Deep Learning Humor Licensing Continuity Hacks Specifications Compliance Refrigeration Politics Charging Network Management Value User Smart Office Co-Managed IT Running Cable Wires Software as a Service Virtual Desktop Techology Budget Online IoT Public Speaking Collaboration Digital Signage Managed IT Cryptocurrency Downloads IT Technicians Solar Print Toner Buisness Digital Lenovo Break Fix How To Cookies Competition Private Cloud Monitoring Hard Disk Drives Google Maps sip Cooperation Mail Merge Black Friday Regulations Tech Support Messaging IT solutions Hotspot Professional Services Work Content Lithium-ion battery Mirgation Voice over Internet Protocol Computer Care Entertainment Unified Threat Management Microsoft Excel Star Wars File Sharing Desktop Disaster Shortcut Bitcoin Multi-Factor Security Network Congestion Samsung Shortcuts 5G Spyware Superfish Information Technology Dark Web Nanotechnology Spying Solid State Drives Statistics Best Practice telephony Staff Address Cyber Monday Writing Social Networking Undo Websites Analysis Identity Theft Employee-Employer Relationships Cortana Google Docs Language USB Optimization Streaming Halloween Windows 8 Google Calendar Chatbots Marketing FinTech Training iOS Fun User Error Blockchain Cost Management Troubleshooting Uninterrupted Power Supply Patch Management Notifications CrashOverride Upgrades Botnet Supercomputer Twitter Gadget Staffing Motion Sickness Printers Crowdsourcing Taxes 3D Printing Personal Information Administrator Emergency Machine Learning IT Budget Web Server GPS IT Consultant Unsupported Software Domains Computer Repair Relocation Processors Cameras Tracking Windows 7 Meetings Cleaning Mobile Data Health Alert CCTV Regulation Emoji Webcam Work/Life Balance Electronic Medical Records Error Mobile Computing Black Market Point of Sale Law Enforcement Physical Security Travel