Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Could Your Favorite App Infect Your Device?

Could Your Favorite App Infect Your Device?

When considering solutions to help ensure your business’ IT security, mobile devices often go overlooked. This makes sense--for most of the time the telephone has existed, it has been attached to a wall, only capable of transmitting sound. However, with phones now being palm-sized computers that we carry in our pockets, keeping them safe from cyberthreats has a new importance.

0 Comments
Continue reading

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Today’s business relies on mobile devices, like smartphones, to guide them to productivity and efficiency. In fact, the vast majority of people in today’s society own a smartphone. A report shows that 90 percent of people younger than 30 own a smartphone, which means that the forward-thinking business hiring talented millennials may want to start thinking about how to secure any mobile devices that they use to access company data.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business User Tips Microsoft Business Computing Malware Software Hosted Solutions Computer Network Security Google Productivity Internet Communication Tech Term Data Small Business Mobile Devices Efficiency IT Services Ransomware Backup Hardware Workplace Tips Windows 10 Cloud Computing Smartphone Data Recovery Microsoft Office IT Support Saving Money Android Productivity Office 365 Upgrade Managed IT Services Gmail Data Management Windows Facebook Browser Users Business Continuity Information Social Media Word Internet of Things Mobile Device Data Backup Innovation Server Managed IT Services Phishing Disaster Recovery Smartphones Windows 10 Passwords App Miscellaneous Outsourced IT Employer-Employee Relationship Managed Service Provider VoIP Vulnerability Cybersecurity Business Management Encryption Network Chrome Remote Monitoring Artificial Intelligence communications Apps Tip of the week Save Money Government Office Tips Applications Apple Hacker BYOD Gadgets Analytics IT Support Spam Managed Service Content Filtering Infrastructure Website Big Data Virtual Reality Money Printing Risk Management Automation Paperless Office Maintenance Wireless Firewall Access Control Tablet Unified Threat Management Router Antivirus Customer Service Augmented Reality WiFi Avoiding Downtime VPN The Internet of Things Settings Virtualization Two-factor Authentication Data storage Employee-Employer Relationship Display Bandwidth YouTube Development IT Management Education Robot OneNote IBM Telephone Systems Operating System SaaS Hacking Mobile Device Management Quick Tips Administration End of Support Customer Relationship Management Computing Scam Bring Your Own Device Password HIPAA Wi-Fi Google Drive Solid State Drive Laptop Mouse Vendor Management Holiday Presentation Networking Business Intelligence LiFi Computers Chromebook Office Hard Disk Drive Safety Wireless Technology Data Security Storage Mobile Security Collaboration Retail Company Culture Data loss Business Technology Downtime Recovery Virtual Private Network Document Management Hosted Solution Outlook Server Management Monitors Touchscreen Search Onboarding Statistics Google Calendar Chatbots G Suite Cables Spyware Laptops Superfish Deep Learning Humor Blockchain Cost Management Automobile Experience Unified Communications Hacks Printer Wearable Technology Refrigeration Continuity Mobility Address Net Neutrality Screen Reader User Slack Data Breach Computing Infrastructure Dongle Smart Office Uninterrupted Power Supply Co-Managed IT Patch Management Running Cable Budget Smart Technology Motherboard Public Speaking Charging User Error Cryptocurrency Digital Signage Bluetooth GDPR How To Legislation Identity Competition Wires Software as a Service Virtual Desktop sip Permissions Assessment Remote Computing Solar Corporate Profile Print Toner Business Analysis Buisness FCC Smart Tech Monitoring Hard Disk Drives Network Congestion Alerts Update Service Level Agreement Work Content Lithium-ion battery Distributed Denial of Service VoIP Messaging IT solutions Bitcoin Desktop Data Warehouse Information Technology Comparison Voice over Internet Protocol How To Entertainment Best Practice telephony Fraud Internet Exlporer Writing SharePoint Undo WannaCry Shortcuts 5G Google Docs Title II Connectivity Digital Payment IT service Spying Heating/Cooling Solid State Drives Windows 8 Licensing Marketing Optimization Streaming Halloween Managed IT Service Modem Politics Analysis Time Management Employee-Employer Relationships Cortana Application Cabling Troubleshooting Google Wallet Specifications Compliance FinTech Firefox iOS Fun Business Growth Value Current Events Downloads IT Technicians Security Cameras Online IoT Private Cloud BDR Servers National Security Cooperation Recycling Human Error Scary Stories Legal Break Fix Cookies Tech Support Network Management Students Professional Services File Sharing Managed IT IP Address Cybercrime Drones Black Friday Regulations Computer Care MSP Scalability Techology Alt Codes Dark Data Hotspot Updates Going Green Social Engineering Multi-Factor Security Mirgation Samsung Managing Stress Digital Managed Services Lenovo Microsoft Excel Star Wars Google Maps PowerPoint Social Staff Hard Drives eWaste Device Mail Merge Sports Dark Web Nanotechnology Websites Identity Theft Mixed Reality Knowledge Language USB Disaster LED Shortcut Mobile Office Cyber Monday Social Networking Training Migration Unified Threat Management Typing Notifications Twitter Botnet Supercomputer Motion Sickness Mobile Data Gadget Staffing Windows 7 Crowdsourcing Taxes CrashOverride Personal Information Administrator Web Server Machine Learning IT Budget GPS Regulation IT Consultant Computer Repair Mobile Computing Processors Cameras Emergency Relocation Meetings Physical Security Tracking Upgrades Cleaning Health Alert CCTV Emoji Webcam Electronic Medical Records Printers 3D Printing Work/Life Balance Error Black Market Point of Sale Travel Unsupported Software Law Enforcement Domains