Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

500 Million Users Exposed by Marriott

500 Million Users Exposed by Marriott

2018 has been the year of the hack. The problem, so was 2017, 2016, and so on… Marriott International has announced that they have had what could be the second largest data leak in history. They are saying that they are responsible for a data breach that leaked some 500 million records over a five-year span.

0 Comments
Continue reading

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

0 Comments
Continue reading

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

0 Comments
Continue reading

How a Single Hacker Stole $100 Million From Two Major Tech Companies

How a Single Hacker Stole $100 Million From Two Major Tech Companies

An unfortunate fact about the modern business world is that any organization that utilizes technology is playing with fire. Cyber attacks can circumvent even the most well-protected networks through the company’s users. This is, unfortunately, something that business owners often don’t learn until they’re on the receiving end of an attack; just like the two companies that fell victim to phishing attempts that were supposedly operated by Evaldas Rimasauskas, a Lithuanian hacker who has been accused of stealing $100 million from them.

0 Comments
Continue reading

Tip of the Week: 5 Clues that an Email is Really a Phishing Scam

b2ap3_thumbnail_do_not_go_phishing_400.jpgOne of the most masterful arts of deception that hackers use is the phishing attack, which attempts steal sensitive credentials from unwary victims. The anonymity afforded to criminals on the Internet is what makes this possible. Using phishing attacks, hackers attempt to steal credentials or personal records by forging their identities. What’s the best way to protect your business from these attacks?

0 Comments
Continue reading

Don’t Be Duped By a Phishing Attack: 4 Signs to Look Out For

b2ap3_thumbnail_online_phishing_400.jpgYour business is literally assaulted by thousands of threats a day, and they could ruin your organization's goals in an instant if not for your defenses. With such powerful security measures at your disposal, we don’t blame you for lowering your defenses; however, it should be mentioned that your network security doesn’t protect you from all manners of threats. Attacks like phishing scams have a tendency to bypass your security measures, which makes them dangerous.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business Malware User Tips Computer Business Computing Internet Network Security Google Productivity Microsoft Software Tech Term Hosted Solutions Mobile Devices Efficiency IT Services Small Business Ransomware Communication Backup Windows 10 Hardware Android Smartphone Data Saving Money Workplace Tips Productivity IT Support Browser Microsoft Office Data Management Managed IT Services Facebook Managed IT Services Server Business Continuity Upgrade Cloud Computing Internet of Things Gmail Data Recovery Windows Innovation Office 365 Phishing Disaster Recovery Data Backup Word App Passwords Outsourced IT Mobile Device Windows 10 Smartphones Managed Service Provider Employer-Employee Relationship VoIP Cybersecurity Artificial Intelligence Business Management Encryption Remote Monitoring Content Filtering Spam Website Big Data Users communications Miscellaneous Information Social Media Tip of the week Analytics Vulnerability IT Support Money Government Office Tips Network Applications Infrastructure BYOD Chrome Two-factor Authentication Employee-Employer Relationship IT Management Managed Service Bandwidth YouTube Save Money Maintenance Apple Virtual Reality Risk Management Tablet Data storage Paperless Office Wireless Display Antivirus Firewall Access Control Customer Service Robot WiFi Router Printing Avoiding Downtime Automation The Internet of Things Hacker Settings Wireless Technology Server Management Gadgets Downtime Computing Document Management Hosted Solution Touchscreen Google Drive Recovery Company Culture Password Virtualization Mobile Security Mouse Vendor Management Telephone Systems LiFi Education Quick Tips Computers Search IBM Storage Development Scam Retail Apps Administration SaaS Mobile Device Management Customer Relationship Management Hacking Networking Outlook Wi-Fi Unified Threat Management Laptop VPN Monitors Holiday Data Security HIPAA Augmented Reality Presentation Data loss Business Technology Operating System Business Intelligence Safety Virtual Private Network End of Support Office Licensing Troubleshooting Google Maps Bring Your Own Device sip Application Managed IT Service Modem FinTech Digital Lenovo How To Specifications Compliance Security Cameras Scary Stories Mail Merge Value Tech Support Unified Threat Management Downloads IT Technicians File Sharing Recycling Human Error IP Address Cybercrime Disaster Shortcut Bitcoin Network Congestion Online IoT Computer Care Cooperation Statistics Best Practice telephony Break Fix Cookies Samsung MSP Spyware Superfish Information Technology Websites Identity Theft PowerPoint Knowledge Google Docs Black Friday Regulations Managing Stress Managed Services Sports Address Writing Hotspot Professional Services User Error Multi-Factor Security Mirgation eWaste Device Mobile Office Uninterrupted Power Supply Patch Management Windows 8 Hard Drives Microsoft Excel Star Wars Training Staff Automobile LED Bluetooth Business Growth Dark Web Nanotechnology G Suite Google Wallet USB Onboarding Experience Unified Communications Cyber Monday Social Networking Cables Laptops Corporate Profile Current Events Language VoIP Legal User Google Calendar Chatbots Continuity Mobility Running Cable Solid State Drive Refrigeration Blockchain Cost Management Slack Drones Printer Public Speaking Wearable Technology Smart Office Co-Managed IT Alt Codes Dark Data Net Neutrality Screen Reader Charging Virtual Desktop How To Competition Computing Infrastructure Dongle Digital Signage IT service Heating/Cooling Smart Technology Motherboard Remote Computing Wires Software as a Service Buisness WannaCry Going Green Social Engineering Monitoring IT solutions Time Management Legislation Identity Update Solar Print Toner Lithium-ion battery Hard Disk Drive Social Permissions Assessment Work Content Cabling Typing FCC Smart Tech Firefox Alerts Service Level Agreement Digital Payment Desktop BDR Servers Deep Learning Humor Distributed Denial of Service Voice over Internet Protocol 5G Spying Cortana Network Management Comparison Chromebook Shortcuts Halloween Hacks Undo Fraud Internet Exlporer Politics Techology Budget SharePoint Collaboration Optimization Streaming Managed IT Cryptocurrency Marketing Title II Connectivity Analysis Fun Private Cloud Alert CCTV Emoji Webcam Electronic Medical Records Work/Life Balance Error Printers Black Market Point of Sale Mobile Computing Physical Security Travel Law Enforcement Upgrades Domains Notifications CrashOverride Botnet Supercomputer Twitter Motion Sickness Gadget Staffing 3D Printing Personal Information Administrator Crowdsourcing Taxes Machine Learning IT Budget Web Server Emergency GPS Unsupported Software Computer Repair IT Consultant Regulation Relocation Processors Cameras Entertainment Meetings Tracking Mobile Data Health Cleaning