Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Search Bar Is Now More Secure

Your Search Bar Is Now More Secure

August saw yet another Patch Tuesday designed to resolve security issues in Microsoft products. Out of the 48 vulnerabilities resolved, 15 affected Windows, while 25 were rated as critical, 21 as important, and 27 that allowed for remote code execution. This might sound a little overwhelming, so we’ll try to simplify it a bit--a lot of flaws were fixed, and the majority of them can be considered dangerous for your organization.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers Malware User Tips Computer Business Computing Microsoft Productivity Internet Network Security Google Hosted Solutions Tech Term Software Communication Mobile Devices Efficiency IT Services Backup Hardware Data Small Business Workplace Tips Windows 10 Smartphone Ransomware IT Support Android Microsoft Office Saving Money Productivity Data Recovery Browser Data Management Business Continuity Managed IT Services Cloud Computing Innovation Internet of Things Server Users Upgrade Word Windows Managed IT Services Gmail Office 365 Facebook Data Backup Disaster Recovery Smartphones Phishing Social Media App Outsourced IT Passwords Windows 10 Vulnerability Cybersecurity Managed Service Provider VoIP Remote Monitoring Encryption Network Employer-Employee Relationship Chrome Artificial Intelligence Mobile Device Business Management communications BYOD Spam Managed Service Website Save Money Information Apple Applications Analytics Office Tips Infrastructure IT Support Hacker Content Filtering Money Big Data Government Miscellaneous Tip of the week Virtualization Risk Management Employee-Employer Relationship Antivirus Wireless Access Control Router Virtual Reality Customer Service Data storage Paperless Office Display Firewall Settings IT Management Two-factor Authentication Robot WiFi Maintenance Bandwidth Avoiding Downtime Printing YouTube The Internet of Things Automation Tablet Education IBM Company Culture Recovery Solid State Drive Computing Networking Google Drive Password Vendor Management Administration Mobile Device Management Document Management Mouse HIPAA Customer Relationship Management Hard Disk Drive VPN Data Security LiFi Wi-Fi Computers Laptop Development Data loss Business Technology Apps Storage Virtual Private Network Augmented Reality Retail Server Management Safety Hacking Mobile Security SaaS Touchscreen Outlook Downtime Hosted Solution Telephone Systems Monitors Unified Threat Management Presentation Holiday Quick Tips Business Intelligence Scam Operating System Office Chromebook Wireless Technology End of Support Gadgets Search Collaboration VoIP Printer Wearable Technology Bring Your Own Device sip Security Cameras Net Neutrality Screen Reader How To How To Computing Infrastructure Dongle Experience Unified Communications Recycling Human Error Smart Technology Motherboard Students IT service Heating/Cooling Legislation Identity Bitcoin Network Congestion Running Cable MSP Scalability Tech Support WannaCry Permissions Assessment PowerPoint File Sharing Time Management Best Practice telephony Managing Stress Managed Services Computer Care FCC Smart Tech Information Technology Virtual Desktop Firefox Alerts Service Level Agreement Google Docs eWaste Device Samsung Cabling Distributed Denial of Service Writing Buisness Hard Drives IT solutions LED BDR Servers Comparison Windows 8 Lithium-ion battery Migration Websites Identity Theft Fraud Internet Exlporer Onboarding Network Management SharePoint Business Growth Cables Laptops Training Title II Connectivity Google Wallet Refrigeration Techology Licensing Continuity Mobility G Suite User Managed IT Managed IT Service Modem Current Events 5G Slack Automobile Value Legal Cortana Smart Office Co-Managed IT Public Speaking Google Maps Specifications Compliance Halloween Charging Digital Lenovo Digital Signage Competition Downloads IT Technicians Alt Codes Dark Data Wires Software as a Service Mail Merge Online IoT Drones Fun Unified Threat Management Cooperation Solar Print Toner Disaster Shortcut Break Fix Cookies Going Green Social Engineering Monitoring Hotspot Professional Services Work Content Remote Computing Statistics Black Friday Regulations Social Scary Stories Messaging Spyware Superfish Desktop Update Multi-Factor Security Mirgation Typing IP Address Cybercrime Voice over Internet Protocol Entertainment Address Microsoft Excel Star Wars Undo User Error Staff Deep Learning Humor Shortcuts Uninterrupted Power Supply Patch Management Dark Web Nanotechnology Spying Language USB Knowledge Optimization Streaming Bluetooth Cyber Monday Social Networking Hacks Sports Analysis Employee-Employer Relationships Digital Payment Marketing Troubleshooting Google Calendar Chatbots Cryptocurrency Mobile Office FinTech iOS Politics Application Corporate Profile Blockchain Cost Management Budget Health Cleaning Alert CCTV Private Cloud Printers Emoji Webcam Emergency Electronic Medical Records Work/Life Balance Mobile Computing Error Physical Security Black Market Point of Sale Domains Travel Law Enforcement Upgrades Notifications Twitter Windows 7 Botnet Supercomputer Motion Sickness Gadget Staffing 3D Printing Crowdsourcing Taxes Personal Information Administrator Web Server Regulation Machine Learning IT Budget GPS Unsupported Software IT Consultant Computer Repair Processors Cameras Relocation CrashOverride Meetings Tracking Mobile Data