Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

500 Million Users Exposed by Marriott

500 Million Users Exposed by Marriott

2018 has been the year of the hack. The problem, so was 2017, 2016, and so on… Marriott International has announced that they have had what could be the second largest data leak in history. They are saying that they are responsible for a data breach that leaked some 500 million records over a five-year span.

0 Comments
Continue reading

Solid Network Security Requires Vigilance

Solid Network Security Requires Vigilance

When all is said and done, your business’ success relies in no small part on how secure you keep it, and in order to be secure, you need to know what threats are apt to target your business. Below are four of the biggest concerns that you need to be sure that your security implementations address.

0 Comments
Continue reading

Be Mindful of These Security Issues

Be Mindful of These Security Issues

With all the stories in the news about data breach after data breach, it’s easy to get the idea that the only threats to your organization are those that are trying to break in. This can be a dangerous oversight--one that could cost your business’ future. If you ignore the possibilities, you could very well be putting your organization in jeopardy. We’ll discuss some of the major internal dangers that your business could face.

0 Comments
Continue reading

Managed Security Services Work to Stomp Out Security Problems

Managed Security Services Work to Stomp Out Security Problems

In the course of doing business, many of today’s businesses have encountered some type of major security threat. As these threats get more and more sophisticated, you are beginning to see more businesses and other organizations enlisting the services of companies that are in business to keep their clients safe. We’ll take a look at some of the services that managed security service provides, and how it fits into a business’ IT strategy.

0 Comments
Continue reading

Getting Your Staff to Understand How Important Security Is

Getting Your Staff to Understand How Important Security Is

Being a business owner in charge of new IT procedures can be a major pain, especially when it comes to your employees. How often do you experience pushback on any significant change to your IT infrastructure or policies? You’re not the only one--many organizations are in the same boat as you, and it can be a difficult situation to be in.

0 Comments
Continue reading

Cybersecurity Roundup for the First Half of 2018

Cybersecurity Roundup for the First Half of 2018

Each day tens of thousands of people from all over the world are hacked. Not just sent run-of-the-mill phishing emails, but legitimately hacked. This has made the cybersecurity industry grow at a rate only surpassed by the Internet of Things (which ironically may be one of the largest threats to cybersecurity in the world). We thought it would be good to go over some of the largest cybercrimes of the first half of 2018, and some telling statistics that will give you an idea of what exactly you are up against.

0 Comments
Continue reading

3 Predictions We’re Making About Network Security

3 Predictions We’re Making About Network Security

Innovation has always been a major part of building better solutions, but some of the most recent trends have been in regard to enhancing security. Adapting to the threat environment is one of the most important parts of running a business, so innovation has been geared toward giving users and organizations alike the security they need. That being said, a lot can change in a short period of time. Let’s take a look at some predictions for how security will change in the near future.

0 Comments
Continue reading

FREE Printout: IT Security End-User Checklist

FREE Printout: IT Security End-User Checklist

This guide was created so that business owners, office managers, and IT departments can provide it as an educational resource to showcase some of the most basic IT security practices that can be implemented in your workplace. We recommend printing this out and handing it out to your staff for maximum results.

0 Comments
Continue reading

Tip of the Week: How to Protect Yourself from Invoice Impersonation

Tip of the Week: How to Protect Yourself from Invoice Impersonation

As cybercriminals become increasingly sophisticated in their methods of attack, it is important that your staff--the ones on the front lines--are educated to spot these attempts and know what to do if one is encountered. In order to spot these attacks, it is important to know what to look for.

0 Comments
Continue reading

Data Security Has to Be A Priority For Your Organization

Data Security Has to Be A Priority For Your Organization

Considering that since January 1st of this year, there has been upwards of 10 million personal information records lost or stolen each day, odds are that you, or someone you know, has had their records compromised by a data breach. With such a high incident rate, individuals and businesses that have never received any kind of notification that their records were included in a breach, generally consider themselves lucky and assume that they are not at risk of identity theft or unauthorized account usage. Unfortunately for them, that is not always the case.

0 Comments
Continue reading

October is Cybersecurity Awareness Month

October is Cybersecurity Awareness Month

Cybercrime is the fastest growing criminal activity in the world. From the largest enterprise to the individual, it can affect anyone, anywhere. To help ensure the cybersecurity of American citizens and their businesses, the Department of Homeland Security (DHS), United States Computer Emergency Readiness Team (CERT), and the Federal Bureau of Investigation (FBI) and other agencies work together every October to raise awareness about the threats people face online through a series of educational events and activities.

0 Comments
Continue reading

Who Needs To Be Involved In Network Security? Simple: Everyone

Who Needs To Be Involved In Network Security? Simple: Everyone

Network security is an important part of keeping both your business and your staff away from online threats, but it’s not enough to implement the best, most comprehensive solutions on the market. There are a surprising number of facets to network security, and in order to optimize protection against online threats, you’ll need to know all of them. Thankfully, you don’t have to do this alone.

0 Comments
Continue reading

When It Comes To Your IT, There's No Such Thing As A Dumb Question!

When It Comes To Your IT, There's No Such Thing As A Dumb Question!

Especially with so many people claiming to be tech-savvy, asking a question about IT can be a bit nerve wracking. Because of this hesitation, there are a lot of people who don’t ask questions about technology because they feel like their questions might be stupid. For example, having an updated operating system is a term that is tossed around a lot by IT professionals, and even some not-so-professionals.

0 Comments
Continue reading

Tip of the Week: 12 Security Rules Every PC User Should Follow

Tip of the Week: 12 Security Rules Every PC User Should Follow

While you are probably spending a fair amount of time thinking about your business’ security, can you confidently say the same about those that you’ve employed? Unfortunately, your workers may not put much thought into network security. This could very possibly lead to some severe issues potentially harming your business operations.

0 Comments
Continue reading

How Does a UTM Firewall Protect Your Business?

How Does a UTM Firewall Protect Your Business?

Every time you pick up a personal computer from a vendor, chances are that it will have an extremely basic firewall pre-installed. These consumer-grade firewalls leave much to be desired, especially in the business environment. You’ll want to make sure that your organization is equipped with enterprise-level solutions designed to protect on both a fundamental level and an advanced level. To do this, you want to take advantage of a Unified Threat Management solution.

0 Comments
Continue reading

Can Your Firewall Protect You From 304 Million Different Kinds of Malware?

b2ap3_thumbnail_malware_increase_400.jpgSmall and medium-sized businesses continue to have problems shoring up their cyber security. Even with the latest solutions, like antivirus and firewalls, they still need to be wary of impending attacks. New threats are created on a daily basis, all of which want to infiltrate your network and cause harm to your business. In fact, 27.3 percent of all malware in the world was created in 2015 alone. Will we ever escape from the clutches of malware?

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers Malware User Tips Computer Business Computing Microsoft Hosted Solutions Productivity Internet Network Security Google Tech Term Software Communication Mobile Devices Efficiency IT Services Backup Hardware Data Small Business Workplace Tips Windows 10 Ransomware Smartphone IT Support Android Microsoft Office Saving Money Productivity Cloud Computing Browser Business Continuity Managed IT Services Data Management Data Recovery Facebook Innovation Internet of Things Managed IT Services Server Users Upgrade Windows Word Data Backup Gmail Office 365 Disaster Recovery Smartphones Outsourced IT Windows 10 Phishing App Social Media Passwords Remote Monitoring Managed Service Provider Business Management VoIP Mobile Device Encryption Network Chrome Employer-Employee Relationship Artificial Intelligence Vulnerability Cybersecurity communications Infrastructure Government Spam Save Money Website BYOD Apple Applications Office Tips Analytics IT Support Tip of the week Hacker Content Filtering Money Managed Service Big Data Miscellaneous Information The Internet of Things Risk Management Wireless Virtualization Access Control IT Management Router Customer Service Maintenance Data storage Display Tablet Settings Two-factor Authentication Firewall Antivirus Virtual Reality Employee-Employer Relationship Bandwidth Robot YouTube Paperless Office Printing WiFi Automation Education Avoiding Downtime IBM Development Virtual Private Network Office Computing Wireless Technology Holiday Google Drive Gadgets Unified Threat Management Password Administration Mouse Vendor Management Server Management Recovery Mobile Device Management Touchscreen Customer Relationship Management HIPAA LiFi Wi-Fi Chromebook Telephone Systems Laptop Computers Storage Augmented Reality Quick Tips Document Management Retail Scam Apps Business Intelligence Safety Mobile Security Outlook Solid State Drive Hacking Downtime Networking Company Culture Hosted Solution Monitors Hard Disk Drive VPN Data Security Presentation Operating System SaaS Search End of Support Data loss Business Technology Google Calendar Chatbots Network Management Migration Bring Your Own Device sip Blockchain Cost Management Marketing Remote Computing LED How To Printer Wearable Technology Techology Cables Experience Laptops Unified Communications Net Neutrality Screen Reader Managed IT Application Update Onboarding Continuity Mobility Smart Technology Motherboard Google Maps Slack Running Cable Bitcoin Network Congestion Computing Infrastructure Dongle Digital Lenovo Legislation Identity Charging Best Practice Digital Payment telephony Permissions Assessment Mail Merge Smart Office Co-Managed IT Virtual Desktop Information Technology Unified Threat Management Wires Politics Software as a Service Google Docs FCC Smart Tech Disaster Shortcut Digital Signage Buisness Writing Superfish Solar Print Toner IT solutions Distributed Denial of Service Statistics Lithium-ion battery Monitoring Collaboration Windows 8 Alerts Service Level Agreement Spyware Comparison Messaging Business Growth Fraud Internet Exlporer Address Hard Drives Work Content Google Wallet SharePoint User Error Voice over Internet Protocol Tech Support Entertainment Title II Connectivity Uninterrupted Power Supply Patch Management 5G Desktop Current Events Cortana Shortcuts Computer Care Legal Managed IT Service Modem Bluetooth Spying Halloween File Sharing Licensing Drones Specifications Compliance User Analysis Employee-Employer Relationships Alt Codes Dark Data Value Corporate Profile Refrigeration Optimization Fun Samsung Streaming Downloads IT Technicians VoIP Public Speaking FinTech Websites iOS Identity Theft Online IoT Troubleshooting Going Green Social Engineering How To Competition Security Cameras Training Break Fix Cookies Scary Stories Social Cooperation G Suite Black Friday Regulations IT service Heating/Cooling IP Address Cybercrime Automobile Students Typing Hotspot Professional Services WannaCry Recycling Human Error Multi-Factor Security Mirgation Time Management MSP Scalability Deep Learning Humor Microsoft Excel Star Wars Staff Firefox Managing Stress Knowledge Managed Services Dark Web Nanotechnology Cabling PowerPoint Sports Hacks Device Budget Cyber Monday Social Networking BDR Servers Mobile Office Cryptocurrency Language USB Undo eWaste Machine Learning IT Budget Web Server GPS IT Consultant Computer Repair Relocation Windows 7 Processors Cameras Tracking Meetings Mobile Computing Cleaning Physical Security Health Regulation Private Cloud Alert CCTV Upgrades Domains Emoji Webcam CrashOverride Work/Life Balance Electronic Medical Records 3D Printing Error Black Market Point of Sale Law Enforcement Travel Unsupported Software Emergency Notifications Botnet Supercomputer Twitter Printers Gadget Staffing Motion Sickness Crowdsourcing Taxes Mobile Data Personal Information Administrator