Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Understanding How a Password is Cracked

Understanding How a Password is Cracked

If you were to ask us what one of the most important cybersecurity features to have is, chances are, we’d answer “secure passwords.” Sure, this might be the answer that you’d hear from everyone, but that’s because it is really that important. For our tip, we’ll illustrate how it’s so important by examining a few key processes hackers use to crack a password.

0 Comments
Continue reading

Tech Terminology: Authentication

Tech Terminology: Authentication

Authentication isn’t an unfamiliar aspect in everyday life. Driver’s licenses, library cards, and PIN numbers are all forms of identity authentication. However, as computers have become a cornerstone of everyday life, the most commonly-used way to confirm one’s identity has almost assuredly become the username/password login combination. Today, we’ll take a deeper dive into what authentication is.

0 Comments
Continue reading

This Internet Scam Is Getting Very Personal

This Internet Scam Is Getting Very Personal

Seemingly every day you read of a new Internet threat affecting users. As a result, people are more cognizant than ever. What they do fall for time and again are scams that are seemingly person-to-person. The latest one is especially rubbing people the wrong way.

0 Comments
Continue reading

A QR Code Could Be your New Wi-Fi Password

A QR Code Could Be your New Wi-Fi Password

There is no understating the importance of strong, reliable passwords to your organization’s network security, especially to protect its wireless connection. However, this can create some friction with your staff when they try to connect to Wi-Fi using their mobile device. To make accessing the Internet easier, scannable QR codes can be used to connect to the Internet.

0 Comments
Continue reading

Tip of the Week: 4 Security Best Practices that Every Employee Needs to Adopt

Tip of the Week: 4 Security Best Practices that Every Employee Needs to Adopt

Security is a hot-button issue for all types of businesses, but cyber security is such a complex subject that it’s difficult to jam-pack its many intricacies into one blog article. Sometimes understanding just a few ways to improve your business’s security practices can be a significant benefit for your organization.

0 Comments
Continue reading

What is your Identity Worth to You?

Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Hackers User Tips Malware Microsoft Computer Business Computing Network Security Hosted Solutions Productivity Internet Google Tech Term Software Mobile Devices Efficiency IT Services Communication Data Small Business Backup Hardware Workplace Tips Windows 10 Ransomware Smartphone IT Support Android Productivity Microsoft Office Saving Money Data Recovery Business Continuity Data Management Managed IT Services Cloud Computing Browser Gmail Office 365 Internet of Things Facebook Managed IT Services Server Innovation Users Windows Upgrade Data Backup Word Passwords Smartphones Disaster Recovery Outsourced IT Windows 10 App Phishing Social Media Business Management communications Artificial Intelligence Remote Monitoring Managed Service Provider VoIP Mobile Device Encryption Network Chrome Vulnerability Cybersecurity Employer-Employee Relationship Big Data Government Information Miscellaneous Applications Money Infrastructure BYOD Spam Website Save Money Office Tips Tip of the week Apple Hacker Managed Service Content Filtering Analytics IT Support YouTube Router Education WiFi Risk Management Avoiding Downtime Robot Printing The Internet of Things Wireless Automation Virtualization IT Management Maintenance Virtual Reality Customer Service Tablet Paperless Office Employee-Employer Relationship Settings Antivirus Two-factor Authentication Data storage Firewall Bandwidth Access Control Display Data Security Outlook Data loss Business Technology Development Search Presentation Chromebook Virtual Private Network Monitors IBM Server Management Mobile Security Office Wireless Technology Administration Operating System Gadgets Mobile Device Management Document Management Touchscreen Customer Relationship Management Recovery End of Support Computing Telephone Systems Wi-Fi Google Drive Laptop Password Augmented Reality Mouse Vendor Management Business Intelligence Quick Tips Scam LiFi Safety Apps SaaS Solid State Drive Company Culture Computers Storage Networking Downtime Retail Hosted Solution Hacking Unified Threat Management Hard Disk Drive VPN HIPAA Holiday Drones Cabling Alerts Service Level Agreement eWaste Device Alt Codes Dark Data Firefox Distributed Denial of Service Going Green Social Engineering BDR Servers Fraud Internet Exlporer Knowledge LED Comparison Sports Migration Digital Payment Onboarding SharePoint Mobile Office Cables Laptops Politics Social Network Management Title II Connectivity Slack Undo Collaboration Managed IT Licensing Continuity Mobility Typing Managed IT Service Techology Modem Google Maps Value Smart Office Experience Co-Managed IT Unified Communications Deep Learning Humor Digital Specifications Lenovo Compliance Marketing Charging IoT Digital Signage Downloads Mail Merge IT Technicians Wires Application Running Cable Software as a Service Tech Support Hacks Online Monitoring Virtual Desktop File Sharing Budget Disaster Shortcut Cooperation Solar Print Toner Computer Care Cryptocurrency Break Fix Unified Threat Management Cookies How To Statistics Hotspot Professional Services Work Content Samsung Bring Your Own Device sip Spyware Black Friday Superfish Regulations Buisness Messaging Microsoft Excel Star Wars Desktop IT solutions Multi-Factor Security Address Mirgation Lithium-ion battery Voice over Internet Protocol Entertainment Websites Identity Theft Spying Uninterrupted Power Supply Patch Management Staff Shortcuts Training Bitcoin Network Congestion Dark Web User Error Nanotechnology Information Technology Bluetooth Language USB Optimization Streaming G Suite Best Practice telephony Cyber Monday Social Networking 5G Analysis Hard Drives Employee-Employer Relationships Automobile Blockchain Cost Management Cortana Troubleshooting Google Docs Corporate Profile Google Calendar Chatbots FinTech Halloween iOS Writing Fun Printer Wearable Technology Security Cameras Windows 8 VoIP Net Neutrality Screen Reader Google Wallet Computing Infrastructure Dongle Recycling User Human Error Business Growth How To Smart Technology Motherboard Refrigeration Students IT service Heating/Cooling Permissions Assessment Public Speaking Remote Computing WannaCry Legislation Identity MSP Scary Stories Scalability Current Events PowerPoint Competition Update Legal IP Address Managing Stress Cybercrime Managed Services Time Management FCC Smart Tech Computer Repair 3D Printing IT Consultant Processors Cameras Relocation Meetings Tracking Health Unsupported Software Cleaning Alert CCTV Windows 7 Private Cloud Emoji Webcam Electronic Medical Records Mobile Data Work/Life Balance Regulation Error Black Market Point of Sale Travel Law Enforcement Notifications CrashOverride Domains Twitter Botnet Supercomputer Mobile Computing Motion Sickness Physical Security Gadget Staffing Administrator Upgrades Crowdsourcing Taxes Personal Information Printers Web Server Emergency Machine Learning IT Budget GPS