Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Right and Wrong of the Hollywood Hack

The Right and Wrong of the Hollywood Hack

Movies and television shows are a big part of our culture. When hackers are portrayed on the silver (or small) screen, there are some major dramatic elements added to their performances to keep the audience from dismissing key pieces of plot. Today, we will look at hacker portrayals, and what Hollywood gets right, and what it gets completely wrong.

0 Comments
Continue reading

One Phish, Two Phish, The Grinch Who Didn’t Phish

One Phish, Two Phish, The Grinch Who Didn’t Phish

An email’s important, that much is clear fact - but you need to stay safe from an email attack.

0 Comments
Continue reading

Think Your Business is Too Small to Get Hacked? Think Again!

b2ap3_thumbnail_hacked_pc_400.jpgMost computer users should practice the policy of ensuring optimal security on their PCs. To this end, assuming that you’ll be hacked (or at least targeted) at some point is pretty reasonable, as it allows you to plan ahead and take preventative actions. Still, there are plenty of people in the world who don’t care enough or worry enough to make security-minded decisions. Contrary to popular belief, there are countless ways that a hacker can take advantage of a hacked PC.

0 Comments
Continue reading

Now You Can Blame Hackers for Your Next Speeding Ticket

b2ap3_thumbnail_car_hack_400.jpgSince the dawn of the computing age, hackers have taken advantage of all sorts of tactics in order to crack systems and ruin lives. With the Internet of Things bringing connected devices from all over the place into the mix, there are more opportunities than ever to take advantage of unsuspecting users. In fact, even car computers are capable of being hacked.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Hackers User Tips Malware Microsoft Computer Business Computing Hosted Solutions Network Security Productivity Google Internet Software Tech Term Mobile Devices Efficiency IT Services Communication Data Small Business Backup Hardware Smartphone Workplace Tips Windows 10 Ransomware Android IT Support Productivity Microsoft Office Saving Money Business Continuity Cloud Computing Data Management Data Recovery Managed IT Services Browser Office 365 Gmail Data Backup Internet of Things Facebook Server Windows Users Upgrade Managed IT Services Innovation Word Passwords Disaster Recovery Smartphones App Phishing Outsourced IT Social Media Windows 10 communications Vulnerability Business Management Cybersecurity Managed Service Provider VoIP Artificial Intelligence Remote Monitoring Encryption Network Chrome Mobile Device Employer-Employee Relationship Managed Service Big Data Tip of the week Apple Miscellaneous Information Government Analytics IT Support Applications BYOD Spam Money Website Infrastructure Office Tips Hacker Content Filtering Save Money Firewall YouTube Tablet Education Access Control WiFi Antivirus Data storage Risk Management Router Display Avoiding Downtime Wireless The Internet of Things Virtualization Robot Printing Customer Service Automation Virtual Reality IT Management Settings Two-factor Authentication Paperless Office Maintenance Bandwidth Employee-Employer Relationship Scam LiFi Computers Storage Search Unified Threat Management HIPAA Holiday Solid State Drive Networking Retail IBM Presentation Development Administration Chromebook Office Mobile Device Management Hard Disk Drive VPN Data Security Gadgets Customer Relationship Management Outlook Wireless Technology Monitors Recovery Mobile Security Wi-Fi Data loss Business Technology Laptop Document Management Virtual Private Network Augmented Reality Server Management Operating System End of Support Touchscreen Safety Computing Business Intelligence Password Telephone Systems Google Drive Apps Downtime Hosted Solution Mouse Vendor Management SaaS Quick Tips Hacking Company Culture Students Writing Computing Infrastructure Dongle Bluetooth Recycling Human Error Google Docs Competition Smart Technology Motherboard MSP Scalability Windows 8 Knowledge Permissions Assessment Remote Computing Legislation Sports Identity Corporate Profile Managing Stress Managed Services Business Growth FCC Smart Tech Update VoIP PowerPoint Google Wallet Mobile Office How To Current Events Alerts Service Level Agreement eWaste Device Distributed Denial of Service Migration Experience Fraud Unified Communications Internet Exlporer IT service Heating/Cooling LED Legal Undo Comparison Digital Payment WannaCry Cables Laptops Alt Codes Dark Data Title II Connectivity Time Management Onboarding Drones Marketing SharePoint Running Cable Politics Virtual Desktop Modem Collaboration Firefox Slack Going Green Social Engineering Application Licensing Cabling Continuity Mobility Managed IT Service Charging Social Value BDR Servers Smart Office Co-Managed IT Specifications Buisness Compliance Wires Software as a Service Typing Online IT solutions IoT Network Management Digital Signage Lithium-ion battery Downloads IT Technicians Tech Support Break Fix Cookies File Sharing Techology Monitoring Cooperation Computer Care Managed IT Solar Print Toner Deep Learning Humor Lenovo Messaging Hacks Hotspot Professional Services Samsung Google Maps Work Content 5G Black Friday Regulations Digital Voice over Internet Protocol Entertainment Cryptocurrency Cortana Microsoft Excel Star Wars Desktop Budget Hard Drives Multi-Factor Security Halloween Mirgation Websites Identity Theft Mail Merge sip Fun Dark Web Nanotechnology Unified Threat Management Spying How To Staff Training Disaster Shortcut Shortcuts Bring Your Own Device Spyware Superfish Analysis Employee-Employer Relationships Language USB G Suite Statistics Optimization Streaming Cyber Monday Social Networking Automobile FinTech iOS Bitcoin Network Congestion User Blockchain Cost Management Troubleshooting Refrigeration Google Calendar Scary Stories Chatbots Address Security Cameras Best Practice telephony Public Speaking Net Neutrality Screen Reader User Error Information Technology IP Address Printer Cybercrime Wearable Technology Uninterrupted Power Supply Patch Management Administrator CrashOverride Mobile Computing Crowdsourcing Taxes Personal Information Web Server Printers Physical Security Machine Learning IT Budget Upgrades GPS Computer Repair IT Consultant Processors Cameras Relocation Emergency Meetings 3D Printing Tracking Health Cleaning Windows 7 Alert CCTV Private Cloud Emoji Webcam Unsupported Software Electronic Medical Records Work/Life Balance Regulation Error Black Market Point of Sale Mobile Data Domains Travel Law Enforcement Notifications Twitter Botnet Supercomputer Motion Sickness Gadget Staffing