Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Crucial Pieces of HIPAA Compliance

Tip of the Week: 3 Crucial Pieces of HIPAA Compliance

If your work requires you to store medical data, you should be aware of how important your data security is, as a problem could potentially put your business at risk of closing up shop permanently. Security has to be a priority with so many regulations setting compliance standards that must be followed. How can you balance the effectiveness of your business without undermining its security?

0 Comments
Continue reading

Why ROBOT is a Risk After Nearly 20 Years

Why ROBOT is a Risk After Nearly 20 Years

The Internet is rife with potential threats. Some are situational, but most are deliberate actions made by malicious entities who are trying to obtain any semblance of value from you or your company. Some of these exploits have been around longer than you’d imagine possible. This has been made evident by huge Internet-based companies such as PayPal and Facebook testing positive for a 19-year-old vulnerability that once allowed hackers to decrypt encrypted data.

0 Comments
Continue reading

Here’s Our Rundown on Blockchain Technology

Here’s Our Rundown on Blockchain Technology

As we discuss business technology, we occasionally broach topics that not everyone may be familiar with. Despite the recent media coverage that has been afforded to it, Bitcoin and blockchain technology may be a good example of one such topic. To resolve this, we’ve put together the following primer on this technology and how it will impact data security in the future.

0 Comments
Continue reading

Protecting Your Data Is Easier With A VPN

Protecting Your Data Is Easier With A VPN

Does your business focus enough on security? One of the best solutions that you can consider is a virtual private network, or VPN. By implementing a VPN solution, you can improve the security and privacy on your devices even while out of the office on important business trips or at conferences. What can a VPN do for your business?

0 Comments
Continue reading

1 Million Websites Not Using the Latest Security Protocol Soon to Be at Risk

b2ap3_thumbnail_encryption_sha1_400.jpgIt’s natural to replace older technologies with better, more recent models. However, the future isn’t looking too bright for the world’s most common website encryption method, SHA1, which will soon be replaced by a more secure protocol. Pretty soon, browsers and devices may have some difficulty reading the latest security certificates, which could cause quite a problem if it’s not remedied.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business Malware User Tips Computer Business Computing Network Security Internet Microsoft Software Google Tech Term Productivity Hosted Solutions IT Services Mobile Devices Efficiency Small Business Communication Ransomware Backup Windows 10 Hardware Data Android Smartphone Productivity IT Support Saving Money Workplace Tips Data Management Browser Microsoft Office Managed IT Services Gmail Windows Cloud Computing Facebook Server Business Continuity Data Recovery Upgrade Internet of Things Managed IT Services App Passwords Data Backup Office 365 Phishing Disaster Recovery Word Innovation Mobile Device Windows 10 Encryption Cybersecurity Artificial Intelligence Users Business Management Remote Monitoring Smartphones Outsourced IT Managed Service Provider Employer-Employee Relationship VoIP Office Tips Tip of the week Analytics Network Vulnerability IT Support Chrome Information Content Filtering Spam Government Big Data Money Website communications Miscellaneous BYOD Social Media Applications Infrastructure Employee-Employer Relationship Maintenance Customer Service Apple Virtual Reality Managed Service WiFi Avoiding Downtime Tablet Data storage Paperless Office Display The Internet of Things Hacker Settings Two-factor Authentication Antivirus Bandwidth Access Control YouTube Robot Printing Router Automation Risk Management Wireless IT Management Save Money Firewall Laptop Company Culture LiFi Computers Quick Tips Augmented Reality Scam Storage Presentation Retail Safety Office SaaS Networking Gadgets Downtime Development Wireless Technology Hosted Solution Recovery Outlook Virtualization VPN Monitors Holiday Unified Threat Management Data Security HIPAA Data loss Business Technology Virtual Private Network Operating System Search Education IBM End of Support Computing Server Management Apps Password Mobile Security Mobile Device Management Document Management Business Intelligence Touchscreen Google Drive Administration Customer Relationship Management Mouse Vendor Management Hacking Wi-Fi Telephone Systems Address Writing Hotspot Professional Services Websites Lithium-ion battery Identity Theft Security Cameras Google Docs Black Friday Regulations IT solutions Windows 8 Microsoft Excel Star Wars Training Recycling Human Error User Error Multi-Factor Security Mirgation Uninterrupted Power Supply Patch Management Dark Web Nanotechnology G Suite Google Wallet Staff Automobile 5G MSP Bluetooth Business Growth PowerPoint Corporate Profile Current Events Language USB Halloween Managing Stress Managed Services Undo Cyber Monday Social Networking Cortana Blockchain Cost Management eWaste Device VoIP Legal Marketing Google Calendar Chatbots Fun Solid State Drive Net Neutrality Screen Reader LED How To Drones Application Printer Wearable Technology Alt Codes Dark Data Onboarding WannaCry Going Green Social Engineering Computing Infrastructure Dongle Scary Stories Cables Laptops IT service Heating/Cooling Smart Technology Motherboard Remote Computing Hard Disk Drive Social Permissions Assessment IP Address Cybercrime Continuity Mobility Time Management Legislation Identity Update Slack FCC Smart Tech Smart Office Co-Managed IT Firefox Charging Cabling Typing Knowledge Digital Signage Alerts Service Level Agreement Digital Payment Sports Wires Software as a Service BDR Servers Deep Learning Humor Distributed Denial of Service Hacks Fraud Internet Exlporer Politics Mobile Office Solar Print Toner Network Management Hard Drives Comparison Chromebook Monitoring Title II Connectivity Work Content Techology Budget SharePoint Collaboration Managed IT Cryptocurrency Experience Unified Communications Desktop Digital Lenovo How To Licensing Voice over Internet Protocol Google Maps Bring Your Own Device sip Managed IT Service Modem Mail Merge User Value Tech Support Running Cable Shortcuts Refrigeration Specifications Compliance Spying Network Congestion Public Speaking Online IoT Computer Care Optimization Streaming Unified Threat Management Downloads IT Technicians File Sharing Virtual Desktop Analysis Disaster Shortcut Bitcoin Cookies Samsung Troubleshooting Spyware Superfish Information Technology Cooperation Buisness FinTech Statistics Best Practice telephony Competition Break Fix Mobile Computing Black Market Point of Sale Law Enforcement Physical Security Travel Notifications Printers CrashOverride Upgrades Botnet Supercomputer Twitter Gadget Staffing Motion Sickness Crowdsourcing Taxes 3D Printing Personal Information Administrator Emergency Machine Learning IT Budget Web Server GPS IT Consultant Unsupported Software Computer Repair Cameras Relocation Processors Tracking Meetings Domains Cleaning Mobile Data Health Regulation Alert CCTV Private Cloud Entertainment Emoji Webcam Work/Life Balance Electronic Medical Records Error