Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Understanding How a Password is Cracked

Understanding How a Password is Cracked

If you were to ask us what one of the most important cybersecurity features to have is, chances are, we’d answer “secure passwords.” Sure, this might be the answer that you’d hear from everyone, but that’s because it is really that important. For our tip, we’ll illustrate how it’s so important by examining a few key processes hackers use to crack a password.

0 Comments
Continue reading

Tech Terminology: Authentication

Tech Terminology: Authentication

Authentication isn’t an unfamiliar aspect in everyday life. Driver’s licenses, library cards, and PIN numbers are all forms of identity authentication. However, as computers have become a cornerstone of everyday life, the most commonly-used way to confirm one’s identity has almost assuredly become the username/password login combination. Today, we’ll take a deeper dive into what authentication is.

0 Comments
Continue reading

This Internet Scam Is Getting Very Personal

This Internet Scam Is Getting Very Personal

Seemingly every day you read of a new Internet threat affecting users. As a result, people are more cognizant than ever. What they do fall for time and again are scams that are seemingly person-to-person. The latest one is especially rubbing people the wrong way.

0 Comments
Continue reading

A QR Code Could Be your New Wi-Fi Password

A QR Code Could Be your New Wi-Fi Password

There is no understating the importance of strong, reliable passwords to your organization’s network security, especially to protect its wireless connection. However, this can create some friction with your staff when they try to connect to Wi-Fi using their mobile device. To make accessing the Internet easier, scannable QR codes can be used to connect to the Internet.

0 Comments
Continue reading

Tip of the Week: 4 Security Best Practices that Every Employee Needs to Adopt

Tip of the Week: 4 Security Best Practices that Every Employee Needs to Adopt

Security is a hot-button issue for all types of businesses, but cyber security is such a complex subject that it’s difficult to jam-pack its many intricacies into one blog article. Sometimes understanding just a few ways to improve your business’s security practices can be a significant benefit for your organization.

0 Comments
Continue reading

What is your Identity Worth to You?

Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Hackers Business Email User Tips Microsoft Business Computing Malware Hosted Solutions Computer Network Security Software Google Productivity Internet Tech Term Communication Data Small Business Ransomware Backup Mobile Devices Efficiency IT Services Workplace Tips Hardware Windows 10 Cloud Computing Smartphone IT Support Microsoft Office Saving Money Android Data Recovery Upgrade Office 365 Productivity Windows Facebook Information Users Browser Business Continuity Social Media Managed IT Services Gmail Data Management Server Managed IT Services Mobile Device Phishing Word Data Backup Internet of Things Innovation App Outsourced IT Windows 10 Miscellaneous Disaster Recovery Smartphones Passwords Encryption Network Business Management Remote Monitoring Chrome Artificial Intelligence communications Employer-Employee Relationship Vulnerability Cybersecurity Managed Service Provider VoIP Apple Office Tips Managed Service Analytics Gadgets Government Infrastructure Hacker IT Support Spam Content Filtering BYOD Website Big Data Money Apps Tip of the week Virtual Reality Applications Save Money Avoiding Downtime Customer Service Augmented Reality Employee-Employer Relationship Unified Threat Management The Internet of Things Data storage Settings Display Virtualization Two-factor Authentication IT Management Bandwidth Development Robot YouTube Maintenance Printing Automation Education Tablet Risk Management Access Control Router Wireless Firewall Antivirus Paperless Office VPN WiFi Data loss Business Technology Computers Storage Office Company Culture Holiday Virtual Private Network Safety Retail Wireless Technology Recovery Server Management Chromebook Touchscreen Downtime Hosted Solution Collaboration Outlook Monitors Telephone Systems OneNote Document Management Quick Tips Operating System Scam Search IBM End of Support HIPAA Bring Your Own Device Hacking Computing Solid State Drive Google Drive Networking Mobile Device Management Password Administration Customer Relationship Management Mouse Vendor Management SaaS Wi-Fi Business Intelligence Hard Disk Drive LiFi Data Security Laptop Mobile Security Presentation Remote Computing Troubleshooting Online IoT Windows 8 BDR Undo Servers FinTech iOS Downloads IT Technicians Update National Security Break Fix Cookies Business Growth Marketing Network Management 5G Security Cameras Cooperation Google Wallet Students Black Friday Regulations Application Techology Halloween Recycling Human Error Hotspot Professional Services Current Events Managed IT Cortana Mirgation Legal Digital Lenovo Microsoft Excel Star Wars Google Maps Fun MSP Scalability Digital Payment Multi-Factor Security PowerPoint Updates Dark Web Nanotechnology Alt Codes Dark Data Managing Stress Politics Managed Services Staff Drones Mail Merge Mixed Reality Cyber Monday Social Networking Unified Threat Management Scary Stories eWaste Device Language USB Going Green Social Engineering Disaster Shortcut Google Calendar Chatbots Spyware Superfish IP Address Cybercrime LED Blockchain Cost Management Social Statistics Private Cloud Migration Onboarding Net Neutrality Screen Reader Typing Hard Drives Cables Tech Support Laptops Printer Wearable Technology Address Knowledge Slack File Sharing Data Breach Smart Technology Motherboard Deep Learning Humor User Error Sports Continuity Mobility Computer Care Computing Infrastructure Dongle Uninterrupted Power Supply Patch Management Legislation Identity Mobile Office Smart Office Samsung Co-Managed IT Permissions Assessment Hacks Bluetooth Charging Digital Signage GDPR FCC Smart Tech Cryptocurrency Refrigeration Wires Websites Software as a Service Identity Theft Budget User Corporate Profile Experience Unified Communications Monitoring Hard Disk Drives Distributed Denial of Service sip VoIP Solar Print Toner Training Alerts Service Level Agreement How To Public Speaking Comparison How To Running Cable Work Content G Suite Fraud Internet Exlporer Competition Automobile Messaging WannaCry Desktop Title II Connectivity Bitcoin Network Congestion IT service Heating/Cooling Virtual Desktop Voice over Internet Protocol Entertainment SharePoint Spying Solid State Drives Managed IT Service Modem Best Practice telephony Time Management Buisness Shortcuts Licensing Information Technology Employee-Employer Relationships Specifications Compliance Google Docs Firefox Lithium-ion battery Optimization Streaming Value Writing Cabling IT solutions Analysis Physical Security Web Server Machine Learning IT Budget GPS Upgrades Computer Repair IT Consultant Processors Printers Cameras Relocation Meetings Tracking 3D Printing Health Cleaning Alert CCTV Emoji Webcam Unsupported Software Electronic Medical Records Work/Life Balance Domains CrashOverride Error Windows 7 Black Market Point of Sale Business Analysis Mobile Data Travel Law Enforcement Notifications Regulation Emergency Twitter Data Warehouse Botnet Supercomputer Motion Sickness Gadget Staffing Administrator Crowdsourcing Taxes Mobile Computing Personal Information