Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Crucial Pieces of HIPAA Compliance

Tip of the Week: 3 Crucial Pieces of HIPAA Compliance

If your work requires you to store medical data, you should be aware of how important your data security is, as a problem could potentially put your business at risk of closing up shop permanently. Security has to be a priority with so many regulations setting compliance standards that must be followed. How can you balance the effectiveness of your business without undermining its security?

0 Comments
Continue reading

Why ROBOT is a Risk After Nearly 20 Years

Why ROBOT is a Risk After Nearly 20 Years

The Internet is rife with potential threats. Some are situational, but most are deliberate actions made by malicious entities who are trying to obtain any semblance of value from you or your company. Some of these exploits have been around longer than you’d imagine possible. This has been made evident by huge Internet-based companies such as PayPal and Facebook testing positive for a 19-year-old vulnerability that once allowed hackers to decrypt encrypted data.

0 Comments
Continue reading

Here’s Our Rundown on Blockchain Technology

Here’s Our Rundown on Blockchain Technology

As we discuss business technology, we occasionally broach topics that not everyone may be familiar with. Despite the recent media coverage that has been afforded to it, Bitcoin and blockchain technology may be a good example of one such topic. To resolve this, we’ve put together the following primer on this technology and how it will impact data security in the future.

0 Comments
Continue reading

Protecting Your Data Is Easier With A VPN

Protecting Your Data Is Easier With A VPN

Does your business focus enough on security? One of the best solutions that you can consider is a virtual private network, or VPN. By implementing a VPN solution, you can improve the security and privacy on your devices even while out of the office on important business trips or at conferences. What can a VPN do for your business?

0 Comments
Continue reading

1 Million Websites Not Using the Latest Security Protocol Soon to Be at Risk

b2ap3_thumbnail_encryption_sha1_400.jpgIt’s natural to replace older technologies with better, more recent models. However, the future isn’t looking too bright for the world’s most common website encryption method, SHA1, which will soon be replaced by a more secure protocol. Pretty soon, browsers and devices may have some difficulty reading the latest security certificates, which could cause quite a problem if it’s not remedied.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers Malware User Tips Computer Business Computing Microsoft Productivity Internet Network Security Google Hosted Solutions Tech Term Software Communication Mobile Devices Efficiency IT Services Backup Hardware Data Small Business Workplace Tips Windows 10 Smartphone Ransomware IT Support Android Microsoft Office Saving Money Productivity Data Recovery Browser Data Management Business Continuity Managed IT Services Cloud Computing Innovation Internet of Things Server Users Upgrade Word Windows Managed IT Services Gmail Office 365 Facebook Data Backup Disaster Recovery Smartphones Phishing Social Media App Outsourced IT Passwords Windows 10 Vulnerability Cybersecurity Managed Service Provider VoIP Remote Monitoring Encryption Network Employer-Employee Relationship Chrome Artificial Intelligence Mobile Device Business Management communications BYOD Spam Managed Service Website Save Money Information Apple Applications Analytics Office Tips Infrastructure IT Support Hacker Content Filtering Money Big Data Government Miscellaneous Tip of the week Virtualization Risk Management Employee-Employer Relationship Antivirus Wireless Access Control Router Virtual Reality Customer Service Data storage Paperless Office Display Firewall Settings IT Management Two-factor Authentication Robot WiFi Maintenance Bandwidth Avoiding Downtime Printing YouTube The Internet of Things Automation Tablet Education IBM Company Culture Recovery Solid State Drive Computing Networking Google Drive Password Vendor Management Administration Mobile Device Management Document Management Mouse HIPAA Customer Relationship Management Hard Disk Drive VPN Data Security LiFi Wi-Fi Computers Laptop Development Data loss Business Technology Apps Storage Virtual Private Network Augmented Reality Retail Server Management Safety Hacking Mobile Security SaaS Touchscreen Outlook Downtime Hosted Solution Telephone Systems Monitors Unified Threat Management Presentation Holiday Quick Tips Business Intelligence Scam Operating System Office Chromebook Wireless Technology End of Support Gadgets Search Collaboration VoIP Printer Wearable Technology Bring Your Own Device sip Security Cameras Net Neutrality Screen Reader How To How To Computing Infrastructure Dongle Experience Unified Communications Recycling Human Error Smart Technology Motherboard Students IT service Heating/Cooling Legislation Identity Bitcoin Network Congestion Running Cable MSP Scalability Tech Support WannaCry Permissions Assessment PowerPoint File Sharing Time Management Best Practice telephony Managing Stress Managed Services Computer Care FCC Smart Tech Information Technology Virtual Desktop Firefox Alerts Service Level Agreement Google Docs eWaste Device Samsung Cabling Distributed Denial of Service Writing Buisness Hard Drives IT solutions LED BDR Servers Comparison Windows 8 Lithium-ion battery Migration Websites Identity Theft Fraud Internet Exlporer Onboarding Network Management SharePoint Business Growth Cables Laptops Training Title II Connectivity Google Wallet Refrigeration Techology Licensing Continuity Mobility G Suite User Managed IT Managed IT Service Modem Current Events 5G Slack Automobile Value Legal Cortana Smart Office Co-Managed IT Public Speaking Google Maps Specifications Compliance Halloween Charging Digital Lenovo Digital Signage Competition Downloads IT Technicians Alt Codes Dark Data Wires Software as a Service Mail Merge Online IoT Drones Fun Unified Threat Management Cooperation Solar Print Toner Disaster Shortcut Break Fix Cookies Going Green Social Engineering Monitoring Hotspot Professional Services Work Content Remote Computing Statistics Black Friday Regulations Social Scary Stories Messaging Spyware Superfish Desktop Update Multi-Factor Security Mirgation Typing IP Address Cybercrime Voice over Internet Protocol Entertainment Address Microsoft Excel Star Wars Undo User Error Staff Deep Learning Humor Shortcuts Uninterrupted Power Supply Patch Management Dark Web Nanotechnology Spying Language USB Knowledge Optimization Streaming Bluetooth Cyber Monday Social Networking Hacks Sports Analysis Employee-Employer Relationships Digital Payment Marketing Troubleshooting Google Calendar Chatbots Cryptocurrency Mobile Office FinTech iOS Politics Application Corporate Profile Blockchain Cost Management Budget Health Cleaning Alert CCTV Private Cloud Printers Emoji Webcam Emergency Electronic Medical Records Work/Life Balance Mobile Computing Error Physical Security Black Market Point of Sale Domains Travel Law Enforcement Upgrades Notifications Twitter Windows 7 Botnet Supercomputer Motion Sickness Gadget Staffing 3D Printing Crowdsourcing Taxes Personal Information Administrator Web Server Regulation Machine Learning IT Budget GPS Unsupported Software IT Consultant Computer Repair Processors Cameras Relocation CrashOverride Meetings Tracking Mobile Data