Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

500 Million Users Exposed by Marriott

500 Million Users Exposed by Marriott

2018 has been the year of the hack. The problem, so was 2017, 2016, and so on… Marriott International has announced that they have had what could be the second largest data leak in history. They are saying that they are responsible for a data breach that leaked some 500 million records over a five-year span.

0 Comments
Continue reading

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

0 Comments
Continue reading

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

0 Comments
Continue reading

How a Single Hacker Stole $100 Million From Two Major Tech Companies

How a Single Hacker Stole $100 Million From Two Major Tech Companies

An unfortunate fact about the modern business world is that any organization that utilizes technology is playing with fire. Cyber attacks can circumvent even the most well-protected networks through the company’s users. This is, unfortunately, something that business owners often don’t learn until they’re on the receiving end of an attack; just like the two companies that fell victim to phishing attempts that were supposedly operated by Evaldas Rimasauskas, a Lithuanian hacker who has been accused of stealing $100 million from them.

0 Comments
Continue reading

Tip of the Week: 5 Clues that an Email is Really a Phishing Scam

b2ap3_thumbnail_do_not_go_phishing_400.jpgOne of the most masterful arts of deception that hackers use is the phishing attack, which attempts steal sensitive credentials from unwary victims. The anonymity afforded to criminals on the Internet is what makes this possible. Using phishing attacks, hackers attempt to steal credentials or personal records by forging their identities. What’s the best way to protect your business from these attacks?

0 Comments
Continue reading

Don’t Be Duped By a Phishing Attack: 4 Signs to Look Out For

b2ap3_thumbnail_online_phishing_400.jpgYour business is literally assaulted by thousands of threats a day, and they could ruin your organization's goals in an instant if not for your defenses. With such powerful security measures at your disposal, we don’t blame you for lowering your defenses; however, it should be mentioned that your network security doesn’t protect you from all manners of threats. Attacks like phishing scams have a tendency to bypass your security measures, which makes them dangerous.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers Malware User Tips Computer Business Computing Microsoft Hosted Solutions Google Productivity Internet Network Security Software Tech Term Communication Mobile Devices Efficiency IT Services Small Business Backup Hardware Data Ransomware Workplace Tips Windows 10 Smartphone IT Support Android Microsoft Office Saving Money Productivity Data Management Managed IT Services Browser Business Continuity Cloud Computing Data Recovery Facebook Managed IT Services Innovation Server Office 365 Users Upgrade Internet of Things Word Data Backup Gmail Windows Outsourced IT Windows 10 Phishing Smartphones Disaster Recovery Social Media App Passwords Encryption Network Chrome Remote Monitoring communications Mobile Device Vulnerability Managed Service Provider Employer-Employee Relationship VoIP Cybersecurity Artificial Intelligence Business Management Office Tips Infrastructure BYOD Managed Service Hacker Applications Content Filtering Spam Information Website Save Money Big Data Miscellaneous Apple Tip of the week Analytics IT Support Government Money Router Printing WiFi Automation Avoiding Downtime Employee-Employer Relationship The Internet of Things Settings Two-factor Authentication Virtualization Bandwidth IT Management YouTube Maintenance Education Virtual Reality Risk Management Paperless Office Tablet Data storage Wireless Display Antivirus Firewall Robot Customer Service Access Control Presentation Data loss Business Technology Chromebook Virtual Private Network Company Culture Operating System Safety Office End of Support Downtime Wireless Technology Computing Gadgets Server Management Password Hosted Solution Mobile Security Document Management Recovery Touchscreen Google Drive Mouse Vendor Management Development Telephone Systems LiFi Computers Search Quick Tips Storage Scam IBM Apps Retail Solid State Drive Administration Mobile Device Management SaaS Networking Customer Relationship Management Hacking Wi-Fi Outlook Hard Disk Drive VPN Monitors Business Intelligence Holiday Laptop Unified Threat Management Augmented Reality Data Security HIPAA Troubleshooting 5G Distributed Denial of Service FinTech iOS Alerts Service Level Agreement Digital Payment BDR Servers Deep Learning Humor Undo Hacks Security Cameras Cortana Fraud Internet Exlporer Politics Network Management Halloween Comparison Marketing Managed IT Cryptocurrency Recycling Human Error Fun Title II Connectivity Techology Budget Students SharePoint Collaboration Managed IT Service Modem Digital Lenovo How To MSP Scalability Licensing Application Google Maps Bring Your Own Device sip Mail Merge Managing Stress Managed Services Value Tech Support PowerPoint Scary Stories Specifications Compliance Disaster Shortcut Bitcoin Network Congestion eWaste Device Online IoT Computer Care Unified Threat Management IP Address Cybercrime Downloads IT Technicians File Sharing Best Practice telephony LED Break Fix Cookies Samsung Spyware Superfish Information Technology Migration Cooperation Statistics Regulations Address Writing Cables Laptops Knowledge Hotspot Professional Services Websites Identity Theft Google Docs Onboarding Sports Black Friday Hard Drives Uninterrupted Power Supply Patch Management Windows 8 Continuity Mobility Microsoft Excel Star Wars Training User Error Slack Mobile Office Multi-Factor Security Mirgation Business Growth Smart Office Co-Managed IT Dark Web Nanotechnology G Suite Google Wallet Charging Staff Automobile Bluetooth Cyber Monday Social Networking Corporate Profile Current Events Wires Software as a Service Experience Unified Communications Language USB Digital Signage Refrigeration Solar Print Toner Blockchain Cost Management User VoIP Legal Monitoring Running Cable Google Calendar Chatbots Alt Codes Dark Data Work Content Virtual Desktop Net Neutrality Screen Reader Public Speaking How To Drones Messaging Printer Wearable Technology Buisness Smart Technology Motherboard Remote Computing Competition WannaCry Going Green Social Engineering Voice over Internet Protocol Entertainment Computing Infrastructure Dongle IT service Heating/Cooling Desktop Social Shortcuts IT solutions Permissions Assessment Time Management Spying Lithium-ion battery Legislation Identity Update Cabling Typing Optimization Streaming FCC Smart Tech Firefox Analysis Employee-Employer Relationships Processors Cameras Relocation Meetings Tracking Cleaning Mobile Data Health Printers Alert CCTV Private Cloud Emoji Webcam Work/Life Balance Electronic Medical Records Error Black Market Point of Sale Mobile Computing Law Enforcement Physical Security Travel Notifications Domains CrashOverride Upgrades Windows 7 Twitter Botnet Supercomputer Gadget Staffing Motion Sickness Crowdsourcing Taxes 3D Printing Regulation Personal Information Administrator Web Server Emergency Machine Learning IT Budget GPS IT Consultant Unsupported Software Computer Repair