Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Crucial Pieces of HIPAA Compliance

Tip of the Week: 3 Crucial Pieces of HIPAA Compliance

If your work requires you to store medical data, you should be aware of how important your data security is, as a problem could potentially put your business at risk of closing up shop permanently. Security has to be a priority with so many regulations setting compliance standards that must be followed. How can you balance the effectiveness of your business without undermining its security?

0 Comments
Continue reading

Why ROBOT is a Risk After Nearly 20 Years

Why ROBOT is a Risk After Nearly 20 Years

The Internet is rife with potential threats. Some are situational, but most are deliberate actions made by malicious entities who are trying to obtain any semblance of value from you or your company. Some of these exploits have been around longer than you’d imagine possible. This has been made evident by huge Internet-based companies such as PayPal and Facebook testing positive for a 19-year-old vulnerability that once allowed hackers to decrypt encrypted data.

0 Comments
Continue reading

Here’s Our Rundown on Blockchain Technology

Here’s Our Rundown on Blockchain Technology

As we discuss business technology, we occasionally broach topics that not everyone may be familiar with. Despite the recent media coverage that has been afforded to it, Bitcoin and blockchain technology may be a good example of one such topic. To resolve this, we’ve put together the following primer on this technology and how it will impact data security in the future.

0 Comments
Continue reading

Protecting Your Data Is Easier With A VPN

Protecting Your Data Is Easier With A VPN

Does your business focus enough on security? One of the best solutions that you can consider is a virtual private network, or VPN. By implementing a VPN solution, you can improve the security and privacy on your devices even while out of the office on important business trips or at conferences. What can a VPN do for your business?

0 Comments
Continue reading

1 Million Websites Not Using the Latest Security Protocol Soon to Be at Risk

b2ap3_thumbnail_encryption_sha1_400.jpgIt’s natural to replace older technologies with better, more recent models. However, the future isn’t looking too bright for the world’s most common website encryption method, SHA1, which will soon be replaced by a more secure protocol. Pretty soon, browsers and devices may have some difficulty reading the latest security certificates, which could cause quite a problem if it’s not remedied.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Hackers Privacy Business Email User Tips Malware Computer Business Computing Microsoft Productivity Hosted Solutions Network Security Google Software Internet Tech Term Data Backup Mobile Devices Efficiency Communication IT Services Ransomware Small Business Workplace Tips Hardware Windows 10 Smartphone Android Microsoft Office Cloud Computing Saving Money Data Recovery IT Support Productivity Business Continuity Facebook Managed IT Services Upgrade Social Media Gmail Browser Data Management Office 365 Mobile Device Data Backup Server Internet of Things Users Phishing Information Innovation Word Windows Managed IT Services Windows 10 Disaster Recovery Smartphones App Outsourced IT Passwords communications Artificial Intelligence Miscellaneous Vulnerability Managed Service Provider VoIP Cybersecurity Business Management Encryption Network Employer-Employee Relationship Remote Monitoring Chrome Big Data Virtual Reality Gadgets Money Tip of the week Spam Managed Service Website Government Apps Applications Office Tips Save Money Apple BYOD Hacker Infrastructure Content Filtering Analytics IT Support Avoiding Downtime YouTube The Internet of Things Maintenance Education Employee-Employer Relationship Virtualization Robot Risk Management Tablet Wireless Printing Paperless Office Automation Access Control Antivirus Router Unified Threat Management VPN Customer Service Augmented Reality Firewall Settings Two-factor Authentication Data storage IT Management Display WiFi Bandwidth Business Intelligence Telephone Systems Office Outlook Quick Tips Wireless Technology Monitors Search Scam IBM Company Culture Recovery Operating System Mobile Device Management SaaS Solid State Drive Administration Networking Customer Relationship Management HIPAA End of Support Bring Your Own Device Wi-Fi Computing Google Drive Holiday Laptop Password Development Hard Disk Drive Mouse Vendor Management Data Security Data loss Business Technology Mobile Security LiFi Safety Chromebook Virtual Private Network Hacking Computers Storage Server Management Downtime Hosted Solution Document Management Touchscreen Retail Presentation Solid State Drives Spyware Superfish Undo Staff Alt Codes Dark Data Shortcuts Statistics Dark Web Nanotechnology Drones Samsung Spying Address Marketing Knowledge Language USB Websites Identity Theft Optimization Streaming Sports Cyber Monday Social Networking Going Green Social Engineering Analysis Employee-Employer Relationships Training Troubleshooting User Error Mobile Office Google Calendar Chatbots Social FinTech iOS Uninterrupted Power Supply Patch Management Application Blockchain Cost Management National Security Printer Wearable Technology Typing Automobile Security Cameras Bluetooth Net Neutrality Screen Reader G Suite Corporate Profile Experience Unified Communications Computing Infrastructure Dongle Deep Learning Humor Recycling Human Error Smart Technology Motherboard Students Assessment VoIP Running Cable Legislation Identity Hacks MSP Scalability Permissions PowerPoint How To Cryptocurrency Managing Stress Managed Services Virtual Desktop FCC Smart Tech Budget WannaCry Hard Drives Alerts Service Level Agreement sip eWaste Device IT service Heating/Cooling Buisness Distributed Denial of Service Remote Computing How To Mixed Reality Fraud Internet Exlporer LED Time Management Lithium-ion battery Comparison Update Migration IT solutions Onboarding Firefox SharePoint Bitcoin Network Congestion Cables Laptops Cabling Title II Connectivity Refrigeration Licensing Best Practice telephony Digital Payment Continuity Mobility BDR Servers User 5G Managed IT Service Modem Information Technology Slack Data Breach Value Google Docs Politics Smart Office Co-Managed IT Network Management Public Speaking Halloween Specifications Compliance Writing Charging Cortana Digital Signage Techology Competition Downloads IT Technicians Windows 8 Collaboration Wires Software as a Service Managed IT Fun Online IoT Digital Lenovo Cooperation Business Growth Private Cloud Solar Print Toner Google Maps Break Fix Cookies Google Wallet Monitoring Hard Disk Drives Hotspot Professional Services Tech Support Work Content Scary Stories Black Friday Regulations Current Events Messaging Mail Merge Legal Computer Care Desktop Unified Threat Management IP Address Cybercrime Multi-Factor Security Mirgation File Sharing Voice over Internet Protocol Entertainment Disaster Shortcut Microsoft Excel Star Wars Error 3D Printing Black Market Point of Sale Law Enforcement Travel CrashOverride Notifications Unsupported Software Botnet Supercomputer Twitter Gadget Staffing Printers Motion Sickness Mobile Data Taxes Updates Personal Information Administrator Crowdsourcing Emergency Machine Learning IT Budget Web Server GPS Domains IT Consultant Computer Repair Relocation Processors Cameras Tracking Mobile Computing Meetings Windows 7 Physical Security Cleaning Health Alert Upgrades CCTV Emoji Webcam Regulation Work/Life Balance Electronic Medical Records