Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Hackers User Tips Malware Microsoft Computer Business Computing Hosted Solutions Productivity Google Network Security Internet Software Tech Term Mobile Devices Efficiency IT Services Communication Data Small Business Backup Hardware Smartphone Ransomware Workplace Tips Windows 10 Android IT Support Productivity Microsoft Office Saving Money Managed IT Services Data Management Cloud Computing Browser Business Continuity Data Recovery Gmail Managed IT Services Windows Innovation Facebook Server Data Backup Users Office 365 Upgrade Word Internet of Things Outsourced IT Passwords App Windows 10 Phishing Social Media Disaster Recovery Smartphones Remote Monitoring VoIP Business Management Encryption Mobile Device Network Chrome Vulnerability Cybersecurity communications Artificial Intelligence Employer-Employee Relationship Managed Service Provider Managed Service Infrastructure Government Information Office Tips BYOD Save Money Hacker Applications Tip of the week Apple Spam Content Filtering Website Big Data Analytics Miscellaneous IT Support Money Printing Firewall Automation IT Management Customer Service Access Control WiFi Avoiding Downtime Router The Internet of Things Maintenance Settings Virtualization Two-factor Authentication Tablet Bandwidth Antivirus Data storage YouTube Display Virtual Reality Education Paperless Office Risk Management Wireless Employee-Employer Relationship Robot Customer Relationship Management Unified Threat Management Server Management Operating System Holiday Wi-Fi Touchscreen Laptop End of Support Computing Presentation HIPAA Augmented Reality Chromebook Development Telephone Systems Google Drive Password Office Mouse Vendor Management Safety Quick Tips Wireless Technology Gadgets Scam LiFi Document Management Downtime Recovery Hosted Solution Mobile Security Computers Solid State Drive Storage Networking Retail Business Intelligence Hard Disk Drive VPN Search Data Security IBM Apps Outlook Data loss Business Technology Monitors SaaS Company Culture Mobile Device Management Virtual Private Network Administration Hacking Recycling Human Error Techology Remote Computing Competition Printer Wearable Technology Students Deep Learning Managed IT Humor Virtual Desktop Net Neutrality Screen Reader Update Computing Infrastructure Dongle MSP Scalability Google Maps Buisness Smart Technology Motherboard Digital Hacks Lenovo Permissions Assessment Managing Stress Managed Services Budget Lithium-ion battery Legislation Identity PowerPoint Cryptocurrency Mail Merge IT solutions Smart Tech eWaste Device Unified Threat Management How To Disaster Bring Your Own Device Shortcut sip Digital Payment FCC Undo Alerts Service Level Agreement Migration Statistics Politics 5G Distributed Denial of Service LED Spyware Superfish Fraud Internet Exlporer Cables Laptops Halloween Comparison Onboarding Bitcoin Address Network Congestion Collaboration Cortana Marketing Title II Connectivity Continuity Mobility Information Technology User Error SharePoint Slack Uninterrupted Power Supply Best Practice Patch Management telephony Fun Application Writing Licensing Charging Bluetooth Google Docs Tech Support Managed IT Service Modem Smart Office Co-Managed IT Value Wires Software as a Service Computer Care Scary Stories Specifications Compliance Digital Signage Corporate Profile Windows 8 File Sharing Online IoT Solar Print Toner VoIP Google Wallet Samsung IP Address Cybercrime Downloads IT Technicians Monitoring Business Growth How To Current Events Cooperation Messaging Websites Identity Theft Break Fix Cookies Work Content Knowledge Hard Drives Hotspot Professional Services Voice over Internet Protocol Entertainment IT service Heating/Cooling Legal Training Sports Black Friday Regulations Desktop WannaCry Microsoft Excel Star Wars Shortcuts Time Management Drones G Suite Mobile Office Multi-Factor Security Mirgation Spying Alt Codes Dark Data Automobile Streaming Firefox Going Green Social Engineering Staff Analysis Employee-Employer Relationships Cabling Dark Web Nanotechnology Optimization Experience Unified Communications Refrigeration Language USB FinTech iOS BDR Servers User Cyber Monday Social Networking Troubleshooting Social Blockchain Cost Management Security Cameras Network Management Running Cable Public Speaking Google Calendar Chatbots Typing Web Server Machine Learning IT Budget GPS Printers Mobile Data IT Consultant Computer Repair Processors Cameras Relocation Meetings Tracking Cleaning Health Alert CCTV Private Cloud Mobile Computing Emoji Webcam Windows 7 CrashOverride Physical Security Work/Life Balance Electronic Medical Records Upgrades Error Black Market Point of Sale Regulation Law Enforcement Emergency Travel 3D Printing Notifications Domains Twitter Botnet Supercomputer Gadget Staffing Motion Sickness Unsupported Software Crowdsourcing Taxes Personal Information Administrator