Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

500 Million Users Exposed by Marriott

500 Million Users Exposed by Marriott

2018 has been the year of the hack. The problem, so was 2017, 2016, and so on… Marriott International has announced that they have had what could be the second largest data leak in history. They are saying that they are responsible for a data breach that leaked some 500 million records over a five-year span.

0 Comments
Continue reading

Solid Network Security Requires Vigilance

Solid Network Security Requires Vigilance

When all is said and done, your business’ success relies in no small part on how secure you keep it, and in order to be secure, you need to know what threats are apt to target your business. Below are four of the biggest concerns that you need to be sure that your security implementations address.

0 Comments
Continue reading

Be Mindful of These Security Issues

Be Mindful of These Security Issues

With all the stories in the news about data breach after data breach, it’s easy to get the idea that the only threats to your organization are those that are trying to break in. This can be a dangerous oversight--one that could cost your business’ future. If you ignore the possibilities, you could very well be putting your organization in jeopardy. We’ll discuss some of the major internal dangers that your business could face.

0 Comments
Continue reading

Managed Security Services Work to Stomp Out Security Problems

Managed Security Services Work to Stomp Out Security Problems

In the course of doing business, many of today’s businesses have encountered some type of major security threat. As these threats get more and more sophisticated, you are beginning to see more businesses and other organizations enlisting the services of companies that are in business to keep their clients safe. We’ll take a look at some of the services that managed security service provides, and how it fits into a business’ IT strategy.

0 Comments
Continue reading

Getting Your Staff to Understand How Important Security Is

Getting Your Staff to Understand How Important Security Is

Being a business owner in charge of new IT procedures can be a major pain, especially when it comes to your employees. How often do you experience pushback on any significant change to your IT infrastructure or policies? You’re not the only one--many organizations are in the same boat as you, and it can be a difficult situation to be in.

0 Comments
Continue reading

Cybersecurity Roundup for the First Half of 2018

Cybersecurity Roundup for the First Half of 2018

Each day tens of thousands of people from all over the world are hacked. Not just sent run-of-the-mill phishing emails, but legitimately hacked. This has made the cybersecurity industry grow at a rate only surpassed by the Internet of Things (which ironically may be one of the largest threats to cybersecurity in the world). We thought it would be good to go over some of the largest cybercrimes of the first half of 2018, and some telling statistics that will give you an idea of what exactly you are up against.

0 Comments
Continue reading

3 Predictions We’re Making About Network Security

3 Predictions We’re Making About Network Security

Innovation has always been a major part of building better solutions, but some of the most recent trends have been in regard to enhancing security. Adapting to the threat environment is one of the most important parts of running a business, so innovation has been geared toward giving users and organizations alike the security they need. That being said, a lot can change in a short period of time. Let’s take a look at some predictions for how security will change in the near future.

0 Comments
Continue reading

FREE Printout: IT Security End-User Checklist

FREE Printout: IT Security End-User Checklist

This guide was created so that business owners, office managers, and IT departments can provide it as an educational resource to showcase some of the most basic IT security practices that can be implemented in your workplace. We recommend printing this out and handing it out to your staff for maximum results.

0 Comments
Continue reading

Tip of the Week: How to Protect Yourself from Invoice Impersonation

Tip of the Week: How to Protect Yourself from Invoice Impersonation

As cybercriminals become increasingly sophisticated in their methods of attack, it is important that your staff--the ones on the front lines--are educated to spot these attempts and know what to do if one is encountered. In order to spot these attacks, it is important to know what to look for.

0 Comments
Continue reading

Data Security Has to Be A Priority For Your Organization

Data Security Has to Be A Priority For Your Organization

Considering that since January 1st of this year, there has been upwards of 10 million personal information records lost or stolen each day, odds are that you, or someone you know, has had their records compromised by a data breach. With such a high incident rate, individuals and businesses that have never received any kind of notification that their records were included in a breach, generally consider themselves lucky and assume that they are not at risk of identity theft or unauthorized account usage. Unfortunately for them, that is not always the case.

0 Comments
Continue reading

October is Cybersecurity Awareness Month

October is Cybersecurity Awareness Month

Cybercrime is the fastest growing criminal activity in the world. From the largest enterprise to the individual, it can affect anyone, anywhere. To help ensure the cybersecurity of American citizens and their businesses, the Department of Homeland Security (DHS), United States Computer Emergency Readiness Team (CERT), and the Federal Bureau of Investigation (FBI) and other agencies work together every October to raise awareness about the threats people face online through a series of educational events and activities.

0 Comments
Continue reading

Who Needs To Be Involved In Network Security? Simple: Everyone

Who Needs To Be Involved In Network Security? Simple: Everyone

Network security is an important part of keeping both your business and your staff away from online threats, but it’s not enough to implement the best, most comprehensive solutions on the market. There are a surprising number of facets to network security, and in order to optimize protection against online threats, you’ll need to know all of them. Thankfully, you don’t have to do this alone.

0 Comments
Continue reading

When It Comes To Your IT, There's No Such Thing As A Dumb Question!

When It Comes To Your IT, There's No Such Thing As A Dumb Question!

Especially with so many people claiming to be tech-savvy, asking a question about IT can be a bit nerve wracking. Because of this hesitation, there are a lot of people who don’t ask questions about technology because they feel like their questions might be stupid. For example, having an updated operating system is a term that is tossed around a lot by IT professionals, and even some not-so-professionals.

0 Comments
Continue reading

Tip of the Week: 12 Security Rules Every PC User Should Follow

Tip of the Week: 12 Security Rules Every PC User Should Follow

While you are probably spending a fair amount of time thinking about your business’ security, can you confidently say the same about those that you’ve employed? Unfortunately, your workers may not put much thought into network security. This could very possibly lead to some severe issues potentially harming your business operations.

0 Comments
Continue reading

How Does a UTM Firewall Protect Your Business?

How Does a UTM Firewall Protect Your Business?

Every time you pick up a personal computer from a vendor, chances are that it will have an extremely basic firewall pre-installed. These consumer-grade firewalls leave much to be desired, especially in the business environment. You’ll want to make sure that your organization is equipped with enterprise-level solutions designed to protect on both a fundamental level and an advanced level. To do this, you want to take advantage of a Unified Threat Management solution.

0 Comments
Continue reading

Can Your Firewall Protect You From 304 Million Different Kinds of Malware?

b2ap3_thumbnail_malware_increase_400.jpgSmall and medium-sized businesses continue to have problems shoring up their cyber security. Even with the latest solutions, like antivirus and firewalls, they still need to be wary of impending attacks. New threats are created on a daily basis, all of which want to infiltrate your network and cause harm to your business. In fact, 27.3 percent of all malware in the world was created in 2015 alone. Will we ever escape from the clutches of malware?

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business Malware User Tips Computer Business Computing Network Security Internet Google Microsoft Software Tech Term Productivity Hosted Solutions Mobile Devices Efficiency IT Services Communication Small Business Ransomware Backup Windows 10 Hardware Android Smartphone Data Saving Money IT Support Workplace Tips Productivity Microsoft Office Browser Managed IT Services Data Management Facebook Server Data Recovery Upgrade Business Continuity Internet of Things Managed IT Services Gmail Windows Cloud Computing Office 365 Phishing Word Disaster Recovery Passwords Innovation App Data Backup Cybersecurity Users Artificial Intelligence Remote Monitoring Smartphones Outsourced IT Business Management Managed Service Provider Employer-Employee Relationship VoIP Mobile Device Windows 10 Encryption Chrome Applications Content Filtering Analytics Spam Information Website IT Support Big Data Miscellaneous communications Social Media Infrastructure Money Government BYOD Tip of the week Office Tips Network Vulnerability Managed Service Apple Antivirus Hacker Settings Two-factor Authentication Virtual Reality Data storage Paperless Office Bandwidth Display YouTube Risk Management Robot Wireless Printing Automation IT Management Firewall Maintenance WiFi Access Control Customer Service Avoiding Downtime Router Tablet Save Money Employee-Employer Relationship The Internet of Things Gadgets Wireless Technology Computers Networking Recovery Downtime Virtualization Storage Retail Mobile Security Hosted Solution VPN Data Security Development Data loss Business Technology SaaS Outlook Virtual Private Network Monitors Search Education Server Management Holiday Apps IBM Unified Threat Management Touchscreen Hacking Administration Operating System Mobile Device Management Telephone Systems Customer Relationship Management End of Support Wi-Fi Computing Laptop Business Intelligence Password Quick Tips Google Drive Augmented Reality Mouse Vendor Management Document Management Presentation HIPAA Scam Safety Company Culture Office LiFi Application Title II Connectivity Fun Websites Identity Theft SharePoint Recycling Windows 8 Human Error How To Managed IT Service Modem MSP Google Wallet IT service Heating/Cooling Training Licensing Business Growth WannaCry Specifications Compliance Scary Stories Managing Stress Current Events Managed Services Time Management G Suite Value PowerPoint Hard Disk Drive Automobile Firefox Online IoT Legal Cabling Downloads IT Technicians IP Address Cybercrime eWaste Device Break Fix Cookies Drones BDR Servers Cooperation Alt Codes LED Dark Data Black Friday Regulations Sports Cables Going Green Laptops Social Engineering Network Management Hard Drives Hotspot Professional Services Knowledge Onboarding Mobility Techology Remote Computing Microsoft Excel Star Wars Slack Managed IT Multi-Factor Security Mirgation Mobile Office Continuity Social Dark Web Nanotechnology Charging Google Maps Staff Smart Office Typing Co-Managed IT Digital Lenovo Update User Cyber Monday Social Networking Wires Software as a Service Refrigeration Language USB Experience Unified Communications Deep Learning Digital Signage Humor Mail Merge Solar Hacks Print Toner Unified Threat Management Blockchain Cost Management Monitoring Disaster Shortcut Digital Payment Public Speaking Google Calendar Chatbots Running Cable Net Neutrality Screen Reader Virtual Desktop Budget Statistics Politics Competition Printer Wearable Technology Work Cryptocurrency Content Spyware Superfish Chromebook Smart Technology Motherboard Buisness Voice over Internet Protocol How To Computing Infrastructure Dongle Bring Your Own Device Desktop sip Address Collaboration Shortcuts User Error Permissions Assessment IT solutions Spying Uninterrupted Power Supply Patch Management Legislation Identity Lithium-ion battery FCC Smart Tech Analysis Bluetooth Tech Support Optimization Bitcoin Streaming Network Congestion Distributed Denial of Service 5G FinTech Information Technology Computer Care Undo Alerts Service Level Agreement Best Practice Troubleshooting telephony Corporate Profile File Sharing Halloween Security Cameras Writing VoIP Samsung Marketing Fraud Internet Exlporer Cortana Google Docs Solid State Drive Comparison Black Market Point of Sale Physical Security Upgrades Law Enforcement Printers Emergency Travel Notifications Twitter Botnet Supercomputer 3D Printing Gadget Staffing Motion Sickness Crowdsourcing Taxes Personal Information Administrator Web Server Machine Learning IT Budget Domains Unsupported Software GPS IT Consultant Computer Repair Processors Cameras Relocation Regulation Mobile Data Tracking Meetings Entertainment Cleaning Health Alert CCTV Private Cloud Webcam CrashOverride Emoji Work/Life Balance Electronic Medical Records Mobile Computing Error