Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Hackers User Tips Malware Microsoft Computer Business Computing Network Security Internet Hosted Solutions Productivity Google Software Tech Term Mobile Devices Efficiency IT Services Communication Hardware Data Small Business Backup Windows 10 Smartphone Ransomware Workplace Tips Android IT Support Productivity Microsoft Office Saving Money Data Recovery Managed IT Services Data Management Cloud Computing Browser Business Continuity Word Internet of Things Gmail Managed IT Services Innovation Windows Facebook Server Data Backup Users Upgrade Office 365 Disaster Recovery Smartphones Passwords Outsourced IT App Windows 10 Phishing Social Media communications Artificial Intelligence Employer-Employee Relationship Remote Monitoring Managed Service Provider VoIP Business Management Mobile Device Encryption Network Chrome Vulnerability Cybersecurity Miscellaneous Managed Service Money Infrastructure Information Government Office Tips BYOD Applications Save Money Hacker Spam Website Apple Tip of the week Content Filtering Analytics IT Support Big Data Paperless Office Employee-Employer Relationship Education Risk Management Firewall Wireless Robot Printing Automation WiFi Access Control Avoiding Downtime IT Management Customer Service The Internet of Things Router Maintenance Virtualization Settings Two-factor Authentication Tablet Data storage Bandwidth Antivirus Virtual Reality Display YouTube Hard Disk Drive Apps VPN Company Culture Data Security Outlook Search SaaS Monitors IBM Data loss Business Technology Hacking Virtual Private Network Administration Mobile Device Management Unified Threat Management Customer Relationship Management Operating System Holiday Server Management Presentation Development Wi-Fi Touchscreen End of Support HIPAA Computing Laptop Password Chromebook Google Drive Augmented Reality Telephone Systems Office Wireless Technology Mouse Vendor Management Gadgets Safety Recovery Quick Tips Scam LiFi Document Management Downtime Mobile Security Computers Solid State Drive Hosted Solution Storage Business Intelligence Retail Networking Knowledge FinTech iOS Multi-Factor Security Mirgation Drones G Suite Sports Time Management Troubleshooting Microsoft Excel Star Wars Alt Codes Dark Data Automobile Security Cameras Staff Going Green Social Engineering Mobile Office User Firefox Dark Web Nanotechnology Cabling Refrigeration Social Public Speaking Students Cyber Monday Social Networking BDR Servers Recycling Human Error Language USB Experience Competition Unified Communications MSP Scalability Google Calendar Chatbots Network Management Blockchain Cost Management Typing Managed IT Managing Stress Managed Services Printer Wearable Technology Remote Computing Running Cable Techology PowerPoint Net Neutrality Screen Reader Deep Learning Humor Hacks Update Digital Lenovo Smart Technology Motherboard Google Maps Virtual Desktop eWaste Device Computing Infrastructure Dongle Mail Merge Migration Legislation Identity Budget Buisness LED Permissions Assessment Cryptocurrency Disaster Undo IT solutions Shortcut Cables Laptops How To Lithium-ion battery Unified Threat Management Onboarding FCC Smart Tech Bring Your Own Device sip Digital Payment Alerts Service Level Agreement Spyware Superfish Slack Distributed Denial of Service Politics Marketing Statistics Continuity Mobility Address Charging Comparison 5G Application Smart Office Co-Managed IT Fraud Internet Exlporer Bitcoin Network Congestion Collaboration Cortana Uninterrupted Power Supply Patch Management Wires Software as a Service SharePoint Information Technology Halloween User Error Digital Signage Title II Connectivity Best Practice telephony Licensing Writing Monitoring Managed IT Service Modem Google Docs Tech Support Fun Bluetooth Solar Print Toner File Sharing Corporate Profile Messaging Specifications Compliance Computer Care Work Content Value Windows 8 Voice over Internet Protocol Entertainment Downloads IT Technicians Google Wallet Samsung Scary Stories VoIP Desktop Online IoT Business Growth Shortcuts Cooperation Current Events IP Address Cybercrime How To Spying Break Fix Cookies Websites Identity Theft Hard Drives WannaCry Analysis Employee-Employer Relationships Black Friday Regulations Legal Training IT service Heating/Cooling Optimization Streaming Hotspot Professional Services Notifications 3D Printing Twitter Botnet Supercomputer Motion Sickness Gadget Staffing Crowdsourcing Unsupported Software Taxes Printers Personal Information Administrator Web Server Machine Learning IT Budget GPS Mobile Data IT Consultant Computer Repair Processors Cameras Relocation Meetings Tracking Windows 7 Cleaning Health Alert CCTV Private Cloud Mobile Computing Emoji Webcam CrashOverride Regulation Work/Life Balance Physical Security Electronic Medical Records Upgrades Error Black Market Point of Sale Travel Domains Emergency Law Enforcement