Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Prioritizing Network Security is a Must

Prioritizing Network Security is a Must

Every business has their version of risk management. Nowadays, with all the technology organizations use for productivity, collaboration, and communications, managing risk can often be difficult. There are numerous threats that come from the Internet that could put a damper on productivity, create inefficiencies, or shut down production entirely. Regardless of how large or small your business is, you need to prioritize the security of your computing network.

0 Comments
Continue reading

“Paying the Ransom” Isn’t a Ransomware Defense

“Paying the Ransom” Isn’t a Ransomware Defense

Ransomware has become a favorite attack vector for hackers - after all, for them, it’s pretty much a no loss game. They either get paid, or they move on to their next target. Unfortunately, cyberattackers that dispatch ransomware often do get paid, and these payments can sometimes come from a surprising source: cybersecurity firms.

0 Comments
Continue reading

USB Killer Caused $58,000 in Damage to The College of Saint Rose

USB Killer Caused $58,000 in Damage to The College of Saint Rose

For the modern business a lot of time is spent focusing on network security. The theory behind this action is that there are all types of threats that could be trying to get into your computer network. At a college, you’d expect that, since so much sensitive data, including personal, medical, and financial information--as well as intellectual property--is stored on college computers/servers, that the diligence of IT administrators would be even more conspicuous.

0 Comments
Continue reading

500 Million Users Exposed by Marriott

500 Million Users Exposed by Marriott

2018 has been the year of the hack. The problem, so was 2017, 2016, and so on… Marriott International has announced that they have had what could be the second largest data leak in history. They are saying that they are responsible for a data breach that leaked some 500 million records over a five-year span.

0 Comments
Continue reading

Solid Network Security Requires Vigilance

Solid Network Security Requires Vigilance

When all is said and done, your business’ success relies in no small part on how secure you keep it, and in order to be secure, you need to know what threats are apt to target your business. Below are four of the biggest concerns that you need to be sure that your security implementations address.

0 Comments
Continue reading

Be Mindful of These Security Issues

Be Mindful of These Security Issues

With all the stories in the news about data breach after data breach, it’s easy to get the idea that the only threats to your organization are those that are trying to break in. This can be a dangerous oversight--one that could cost your business’ future. If you ignore the possibilities, you could very well be putting your organization in jeopardy. We’ll discuss some of the major internal dangers that your business could face.

0 Comments
Continue reading

Managed Security Services Work to Stomp Out Security Problems

Managed Security Services Work to Stomp Out Security Problems

In the course of doing business, many of today’s businesses have encountered some type of major security threat. As these threats get more and more sophisticated, you are beginning to see more businesses and other organizations enlisting the services of companies that are in business to keep their clients safe. We’ll take a look at some of the services that managed security service provides, and how it fits into a business’ IT strategy.

0 Comments
Continue reading

Getting Your Staff to Understand How Important Security Is

Getting Your Staff to Understand How Important Security Is

Being a business owner in charge of new IT procedures can be a major pain, especially when it comes to your employees. How often do you experience pushback on any significant change to your IT infrastructure or policies? You’re not the only one--many organizations are in the same boat as you, and it can be a difficult situation to be in.

0 Comments
Continue reading

Cybersecurity Roundup for the First Half of 2018

Cybersecurity Roundup for the First Half of 2018

Each day tens of thousands of people from all over the world are hacked. Not just sent run-of-the-mill phishing emails, but legitimately hacked. This has made the cybersecurity industry grow at a rate only surpassed by the Internet of Things (which ironically may be one of the largest threats to cybersecurity in the world). We thought it would be good to go over some of the largest cybercrimes of the first half of 2018, and some telling statistics that will give you an idea of what exactly you are up against.

0 Comments
Continue reading

3 Predictions We’re Making About Network Security

3 Predictions We’re Making About Network Security

Innovation has always been a major part of building better solutions, but some of the most recent trends have been in regard to enhancing security. Adapting to the threat environment is one of the most important parts of running a business, so innovation has been geared toward giving users and organizations alike the security they need. That being said, a lot can change in a short period of time. Let’s take a look at some predictions for how security will change in the near future.

0 Comments
Continue reading

FREE Printout: IT Security End-User Checklist

FREE Printout: IT Security End-User Checklist

This guide was created so that business owners, office managers, and IT departments can provide it as an educational resource to showcase some of the most basic IT security practices that can be implemented in your workplace. We recommend printing this out and handing it out to your staff for maximum results.

0 Comments
Continue reading

Tip of the Week: How to Protect Yourself from Invoice Impersonation

Tip of the Week: How to Protect Yourself from Invoice Impersonation

As cybercriminals become increasingly sophisticated in their methods of attack, it is important that your staff--the ones on the front lines--are educated to spot these attempts and know what to do if one is encountered. In order to spot these attacks, it is important to know what to look for.

0 Comments
Continue reading

Data Security Has to Be A Priority For Your Organization

Data Security Has to Be A Priority For Your Organization

Considering that since January 1st of this year, there has been upwards of 10 million personal information records lost or stolen each day, odds are that you, or someone you know, has had their records compromised by a data breach. With such a high incident rate, individuals and businesses that have never received any kind of notification that their records were included in a breach, generally consider themselves lucky and assume that they are not at risk of identity theft or unauthorized account usage. Unfortunately for them, that is not always the case.

0 Comments
Continue reading

October is Cybersecurity Awareness Month

October is Cybersecurity Awareness Month

Cybercrime is the fastest growing criminal activity in the world. From the largest enterprise to the individual, it can affect anyone, anywhere. To help ensure the cybersecurity of American citizens and their businesses, the Department of Homeland Security (DHS), United States Computer Emergency Readiness Team (CERT), and the Federal Bureau of Investigation (FBI) and other agencies work together every October to raise awareness about the threats people face online through a series of educational events and activities.

0 Comments
Continue reading

Who Needs To Be Involved In Network Security? Simple: Everyone

Who Needs To Be Involved In Network Security? Simple: Everyone

Network security is an important part of keeping both your business and your staff away from online threats, but it’s not enough to implement the best, most comprehensive solutions on the market. There are a surprising number of facets to network security, and in order to optimize protection against online threats, you’ll need to know all of them. Thankfully, you don’t have to do this alone.

0 Comments
Continue reading

When It Comes To Your IT, There's No Such Thing As A Dumb Question!

When It Comes To Your IT, There's No Such Thing As A Dumb Question!

Especially with so many people claiming to be tech-savvy, asking a question about IT can be a bit nerve wracking. Because of this hesitation, there are a lot of people who don’t ask questions about technology because they feel like their questions might be stupid. For example, having an updated operating system is a term that is tossed around a lot by IT professionals, and even some not-so-professionals.

0 Comments
Continue reading

Tip of the Week: 12 Security Rules Every PC User Should Follow

Tip of the Week: 12 Security Rules Every PC User Should Follow

While you are probably spending a fair amount of time thinking about your business’ security, can you confidently say the same about those that you’ve employed? Unfortunately, your workers may not put much thought into network security. This could very possibly lead to some severe issues potentially harming your business operations.

0 Comments
Continue reading

How Does a UTM Firewall Protect Your Business?

How Does a UTM Firewall Protect Your Business?

Every time you pick up a personal computer from a vendor, chances are that it will have an extremely basic firewall pre-installed. These consumer-grade firewalls leave much to be desired, especially in the business environment. You’ll want to make sure that your organization is equipped with enterprise-level solutions designed to protect on both a fundamental level and an advanced level. To do this, you want to take advantage of a Unified Threat Management solution.

0 Comments
Continue reading

Can Your Firewall Protect You From 304 Million Different Kinds of Malware?

b2ap3_thumbnail_malware_increase_400.jpgSmall and medium-sized businesses continue to have problems shoring up their cyber security. Even with the latest solutions, like antivirus and firewalls, they still need to be wary of impending attacks. New threats are created on a daily basis, all of which want to infiltrate your network and cause harm to your business. In fact, 27.3 percent of all malware in the world was created in 2015 alone. Will we ever escape from the clutches of malware?

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Hackers Business Email User Tips Microsoft Business Computing Malware Network Security Hosted Solutions Computer Software Productivity Google Internet Communication Tech Term Data Small Business Ransomware Backup Mobile Devices Efficiency IT Services Workplace Tips Hardware Cloud Computing Windows 10 Smartphone Microsoft Office Android Saving Money Data Recovery IT Support Productivity Office 365 Upgrade Windows Data Management Managed IT Services Facebook Browser Information Business Continuity Users Social Media Gmail Managed IT Services Mobile Device Server Data Backup Innovation Phishing Internet of Things Word App Passwords Outsourced IT Windows 10 Miscellaneous Disaster Recovery Smartphones Artificial Intelligence Encryption Network Chrome communications Vulnerability Cybersecurity Business Management Managed Service Provider VoIP Employer-Employee Relationship Remote Monitoring Office Tips Money Hacker Managed Service Gadgets Content Filtering Virtual Reality Spam Big Data Tip of the week Website Save Money Applications Apple Apps Government Analytics IT Support BYOD Infrastructure Customer Service Augmented Reality WiFi Avoiding Downtime IT Management Robot Printing Employee-Employer Relationship Settings The Internet of Things Automation Maintenance Two-factor Authentication Virtualization Access Control Bandwidth Paperless Office YouTube Tablet Router Development Education Antivirus Risk Management VPN Unified Threat Management Wireless Data storage Firewall Display Outlook Business Intelligence Server Management Touchscreen Presentation Document Management Monitors Safety Office Company Culture Telephone Systems Operating System Downtime Wireless Technology Hosted Solution Recovery Quick Tips End of Support Computing Scam HIPAA Bring Your Own Device Password Google Drive Solid State Drive SaaS Mouse Vendor Management OneNote Networking Search IBM LiFi Hard Disk Drive Mobile Security Holiday Computers Mobile Device Management Data Security Storage Administration Retail Customer Relationship Management Data loss Hacking Business Technology Virtual Private Network Chromebook Wi-Fi Collaboration Laptop Private Cloud Dark Web Nanotechnology Going Green Social Engineering Spying Solid State Drives Digital Lenovo Staff Shortcuts Google Maps Analysis Employee-Employer Relationships Mail Merge Language USB Optimization Streaming 5G Tech Support Cyber Monday Social Networking Social Disaster Shortcut File Sharing Blockchain Cost Management Troubleshooting Halloween Undo Unified Threat Management Computer Care Google Calendar Chatbots Typing FinTech iOS Cortana Net Neutrality Screen Reader National Security Marketing Spyware Superfish Samsung Printer Wearable Technology Deep Learning Humor Security Cameras Fun Statistics Students Application Address Computing Infrastructure Dongle Recycling Human Error Websites Identity Theft Smart Technology Motherboard Hacks Scalability Uninterrupted Power Supply Patch Management Permissions Assessment Budget Scary Stories User Error Training Legislation Identity Cryptocurrency MSP Automobile FCC Smart Tech How To Business Analysis PowerPoint IP Address Updates Cybercrime G Suite sip Managing Stress Managed Services Bluetooth Mixed Reality Corporate Profile Alerts Service Level Agreement eWaste Device Distributed Denial of Service Migration Knowledge Fraud Internet Exlporer LED Sports VoIP Comparison Bitcoin Network Congestion Title II Connectivity Information Technology Onboarding Mobile Office How To Hard Drives SharePoint Best Practice telephony Cables Laptops Modem Writing Slack Data Breach WannaCry Remote Computing Licensing Google Docs Continuity Mobility IT service Heating/Cooling Managed IT Service Charging Experience Unified Communications Update Value Smart Office Co-Managed IT Time Management Specifications Compliance Windows 8 Online IoT Google Wallet Digital Signage GDPR Running Cable Firefox Refrigeration Downloads IT Technicians Business Growth Wires Software as a Service Cabling User Digital Payment Break Fix Cookies Current Events Monitoring Hard Disk Drives Cooperation Solar Print Toner Virtual Desktop BDR Servers Public Speaking Messaging Hotspot Professional Services Legal Work Content Buisness Network Management Competition Politics Black Friday Regulations Managed IT Microsoft Excel Star Wars Drones Desktop Lithium-ion battery Data Warehouse Techology Multi-Factor Security Mirgation Alt Codes Dark Data Voice over Internet Protocol Entertainment IT solutions Alert CCTV Emoji Webcam Electronic Medical Records Unsupported Software Work/Life Balance Error Black Market Point of Sale Travel Mobile Data Printers Law Enforcement CrashOverride Notifications Twitter Botnet Supercomputer Motion Sickness Gadget Staffing Personal Information Administrator Crowdsourcing Taxes Mobile Computing Emergency Web Server Domains Machine Learning IT Budget Windows 7 Physical Security GPS Computer Repair Upgrades IT Consultant Processors Cameras Relocation Regulation Meetings Tracking Health 3D Printing Cleaning