Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Understanding How a Password is Cracked

Understanding How a Password is Cracked

If you were to ask us what one of the most important cybersecurity features to have is, chances are, we’d answer “secure passwords.” Sure, this might be the answer that you’d hear from everyone, but that’s because it is really that important. For our tip, we’ll illustrate how it’s so important by examining a few key processes hackers use to crack a password.

0 Comments
Continue reading

Tech Terminology: Authentication

Tech Terminology: Authentication

Authentication isn’t an unfamiliar aspect in everyday life. Driver’s licenses, library cards, and PIN numbers are all forms of identity authentication. However, as computers have become a cornerstone of everyday life, the most commonly-used way to confirm one’s identity has almost assuredly become the username/password login combination. Today, we’ll take a deeper dive into what authentication is.

0 Comments
Continue reading

This Internet Scam Is Getting Very Personal

This Internet Scam Is Getting Very Personal

Seemingly every day you read of a new Internet threat affecting users. As a result, people are more cognizant than ever. What they do fall for time and again are scams that are seemingly person-to-person. The latest one is especially rubbing people the wrong way.

0 Comments
Continue reading

A QR Code Could Be your New Wi-Fi Password

A QR Code Could Be your New Wi-Fi Password

There is no understating the importance of strong, reliable passwords to your organization’s network security, especially to protect its wireless connection. However, this can create some friction with your staff when they try to connect to Wi-Fi using their mobile device. To make accessing the Internet easier, scannable QR codes can be used to connect to the Internet.

0 Comments
Continue reading

Tip of the Week: 4 Security Best Practices that Every Employee Needs to Adopt

Tip of the Week: 4 Security Best Practices that Every Employee Needs to Adopt

Security is a hot-button issue for all types of businesses, but cyber security is such a complex subject that it’s difficult to jam-pack its many intricacies into one blog article. Sometimes understanding just a few ways to improve your business’s security practices can be a significant benefit for your organization.

0 Comments
Continue reading

What is your Identity Worth to You?

Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business Malware User Tips Computer Business Computing Network Security Internet Google Microsoft Tech Term Software Productivity Hosted Solutions Mobile Devices Efficiency IT Services Small Business Communication Backup Windows 10 Hardware Ransomware Android Smartphone Data Saving Money Workplace Tips Productivity IT Support Managed IT Services Data Management Browser Microsoft Office Server Business Continuity Upgrade Cloud Computing Internet of Things Data Recovery Gmail Windows Managed IT Services Facebook Office 365 Phishing Data Backup Disaster Recovery Word App Passwords Innovation Mobile Device Windows 10 Users Smartphones Artificial Intelligence Cybersecurity Managed Service Provider Business Management Employer-Employee Relationship VoIP Remote Monitoring Encryption Outsourced IT Spam Website Big Data communications Analytics Miscellaneous Tip of the week IT Support Social Media Vulnerability Information Government Money BYOD Office Tips Applications Infrastructure Network Chrome Content Filtering Virtual Reality Maintenance Bandwidth Apple YouTube Data storage Paperless Office Employee-Employer Relationship Tablet Managed Service Display Risk Management Antivirus Wireless Robot Access Control Printing Firewall Automation Router Customer Service WiFi Avoiding Downtime The Internet of Things Hacker Settings IT Management Two-factor Authentication Save Money Computers Quick Tips Storage Retail Company Culture Scam SaaS Search Education IBM Networking Outlook Apps Administration Unified Threat Management Mobile Device Management Monitors Holiday Development Customer Relationship Management Hacking VPN Data Security HIPAA Wi-Fi Operating System Laptop Data loss Business Technology End of Support Virtual Private Network Augmented Reality Presentation Computing Google Drive Server Management Safety Password Document Management Touchscreen Office Mouse Mobile Security Vendor Management Wireless Technology Gadgets Downtime Hosted Solution LiFi Recovery Telephone Systems Virtualization Business Intelligence Professional Services Analysis IP Address Cybercrime Windows 8 Black Friday Regulations Training Optimization Address Streaming Hotspot Automobile FinTech User Error Business Growth Multi-Factor Security Mirgation G Suite Uninterrupted Power Supply Patch Management Troubleshooting Google Wallet Microsoft Excel Star Wars Knowledge Staff Bluetooth Sports Current Events Dark Web Nanotechnology Security Cameras Legal Language USB Mobile Office Cyber Monday Social Networking Hard Drives Corporate Profile Recycling Human Error VoIP MSP Alt Codes Google Calendar Dark Data Chatbots Solid State Drive Drones Blockchain Cost Management Managed Services Experience Unified Communications Printer Wearable Technology Remote Computing PowerPoint Going Green Net Neutrality Social Engineering Screen Reader How To Managing Stress Computing Infrastructure Dongle Update User IT service Heating/Cooling Running Cable Social Smart Technology Motherboard Refrigeration WannaCry eWaste Device Public Speaking Time Management Typing Legislation Identity Hard Disk Drive LED Virtual Desktop Permissions Assessment Firefox Cables Laptops Deep Learning Humor Cabling Onboarding Buisness FCC Smart Tech Digital Payment Competition IT solutions Alerts Service Level Agreement Chromebook BDR Servers Slack Lithium-ion battery Hacks Distributed Denial of Service Politics Continuity Mobility Collaboration Network Management Charging Cryptocurrency Comparison Smart Office Co-Managed IT Budget Fraud Internet Exlporer Wires Techology Software as a Service Bring Your Own Device SharePoint sip Managed IT Digital Signage 5G Title II How To Connectivity Cortana Licensing Google Maps Monitoring Halloween Managed IT Service Modem Tech Support Undo Digital Solar Lenovo Print Toner File Sharing Bitcoin Specifications Network Congestion Compliance Marketing Computer Care Work Mail Merge Content Fun Value Voice over Internet Protocol Unified Threat Management Best Practice Downloads telephony IT Technicians Samsung Application Disaster Shortcut Desktop Information Technology Online IoT Google Docs Cooperation Statistics Spying Scary Stories Break Fix Writing Cookies Websites Identity Theft Spyware Superfish Shortcuts Physical Security Travel Law Enforcement Notifications Upgrades Twitter Botnet Supercomputer CrashOverride Motion Sickness Gadget Staffing Personal Information Administrator Domains Crowdsourcing Taxes Printers 3D Printing Web Server Machine Learning IT Budget GPS Emergency Computer Repair IT Consultant Unsupported Software Processors Cameras Relocation Meetings Tracking Health Cleaning Mobile Data Alert CCTV Private Cloud Emoji Webcam Electronic Medical Records Regulation Work/Life Balance Error Entertainment Black Market Point of Sale Mobile Computing