Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would One of These Social Media Scams Bamboozle You?

Would One of These Social Media Scams Bamboozle You?

Social media plays an increasing role in both the professional and personal sides of our lives. Unfortunately, this means that we all experience an increase in exposure to the many scam attempts that will appear on our screens. Like any kind of scam, the best defense against those that appear on social media is good, old-fashioned awareness and vigilance.

0 Comments
Continue reading

500 Million Users Exposed by Marriott

500 Million Users Exposed by Marriott

2018 has been the year of the hack. The problem, so was 2017, 2016, and so on… Marriott International has announced that they have had what could be the second largest data leak in history. They are saying that they are responsible for a data breach that leaked some 500 million records over a five-year span.

0 Comments
Continue reading

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

0 Comments
Continue reading

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

0 Comments
Continue reading

How a Single Hacker Stole $100 Million From Two Major Tech Companies

How a Single Hacker Stole $100 Million From Two Major Tech Companies

An unfortunate fact about the modern business world is that any organization that utilizes technology is playing with fire. Cyber attacks can circumvent even the most well-protected networks through the company’s users. This is, unfortunately, something that business owners often don’t learn until they’re on the receiving end of an attack; just like the two companies that fell victim to phishing attempts that were supposedly operated by Evaldas Rimasauskas, a Lithuanian hacker who has been accused of stealing $100 million from them.

0 Comments
Continue reading

Tip of the Week: 5 Clues that an Email is Really a Phishing Scam

b2ap3_thumbnail_do_not_go_phishing_400.jpgOne of the most masterful arts of deception that hackers use is the phishing attack, which attempts steal sensitive credentials from unwary victims. The anonymity afforded to criminals on the Internet is what makes this possible. Using phishing attacks, hackers attempt to steal credentials or personal records by forging their identities. What’s the best way to protect your business from these attacks?

0 Comments
Continue reading

Don’t Be Duped By a Phishing Attack: 4 Signs to Look Out For

b2ap3_thumbnail_online_phishing_400.jpgYour business is literally assaulted by thousands of threats a day, and they could ruin your organization's goals in an instant if not for your defenses. With such powerful security measures at your disposal, we don’t blame you for lowering your defenses; however, it should be mentioned that your network security doesn’t protect you from all manners of threats. Attacks like phishing scams have a tendency to bypass your security measures, which makes them dangerous.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Hackers Business Email User Tips Microsoft Business Computing Malware Hosted Solutions Computer Network Security Software Google Productivity Internet Tech Term Communication Data Small Business Ransomware Backup Mobile Devices Efficiency IT Services Workplace Tips Hardware Windows 10 Cloud Computing Smartphone IT Support Microsoft Office Saving Money Android Data Recovery Upgrade Office 365 Productivity Windows Facebook Information Users Browser Business Continuity Social Media Managed IT Services Gmail Data Management Server Managed IT Services Mobile Device Phishing Word Data Backup Internet of Things Innovation App Outsourced IT Windows 10 Miscellaneous Disaster Recovery Smartphones Passwords Encryption Network Business Management Remote Monitoring Chrome Artificial Intelligence communications Employer-Employee Relationship Vulnerability Cybersecurity Managed Service Provider VoIP Apple Office Tips Managed Service Analytics Gadgets Government Infrastructure Hacker IT Support Spam Content Filtering BYOD Website Big Data Money Apps Tip of the week Virtual Reality Applications Save Money Avoiding Downtime Customer Service Augmented Reality Employee-Employer Relationship Unified Threat Management The Internet of Things Data storage Settings Display Virtualization Two-factor Authentication IT Management Bandwidth Development Robot YouTube Maintenance Printing Automation Education Tablet Risk Management Access Control Router Wireless Firewall Antivirus Paperless Office VPN WiFi Data loss Business Technology Computers Storage Office Company Culture Holiday Virtual Private Network Safety Retail Wireless Technology Recovery Server Management Chromebook Touchscreen Downtime Hosted Solution Collaboration Outlook Monitors Telephone Systems OneNote Document Management Quick Tips Operating System Scam Search IBM End of Support HIPAA Bring Your Own Device Hacking Computing Solid State Drive Google Drive Networking Mobile Device Management Password Administration Customer Relationship Management Mouse Vendor Management SaaS Wi-Fi Business Intelligence Hard Disk Drive LiFi Data Security Laptop Mobile Security Presentation Remote Computing Troubleshooting Online IoT Windows 8 BDR Undo Servers FinTech iOS Downloads IT Technicians Update National Security Break Fix Cookies Business Growth Marketing Network Management 5G Security Cameras Cooperation Google Wallet Students Black Friday Regulations Application Techology Halloween Recycling Human Error Hotspot Professional Services Current Events Managed IT Cortana Mirgation Legal Digital Lenovo Microsoft Excel Star Wars Google Maps Fun MSP Scalability Digital Payment Multi-Factor Security PowerPoint Updates Dark Web Nanotechnology Alt Codes Dark Data Managing Stress Politics Managed Services Staff Drones Mail Merge Mixed Reality Cyber Monday Social Networking Unified Threat Management Scary Stories eWaste Device Language USB Going Green Social Engineering Disaster Shortcut Google Calendar Chatbots Spyware Superfish IP Address Cybercrime LED Blockchain Cost Management Social Statistics Private Cloud Migration Onboarding Net Neutrality Screen Reader Typing Hard Drives Cables Tech Support Laptops Printer Wearable Technology Address Knowledge Slack File Sharing Data Breach Smart Technology Motherboard Deep Learning Humor User Error Sports Continuity Mobility Computer Care Computing Infrastructure Dongle Uninterrupted Power Supply Patch Management Legislation Identity Mobile Office Smart Office Samsung Co-Managed IT Permissions Assessment Hacks Bluetooth Charging Digital Signage GDPR FCC Smart Tech Cryptocurrency Refrigeration Wires Websites Software as a Service Identity Theft Budget User Corporate Profile Experience Unified Communications Monitoring Hard Disk Drives Distributed Denial of Service sip VoIP Solar Print Toner Training Alerts Service Level Agreement How To Public Speaking Comparison How To Running Cable Work Content G Suite Fraud Internet Exlporer Competition Automobile Messaging WannaCry Desktop Title II Connectivity Bitcoin Network Congestion IT service Heating/Cooling Virtual Desktop Voice over Internet Protocol Entertainment SharePoint Spying Solid State Drives Managed IT Service Modem Best Practice telephony Time Management Buisness Shortcuts Licensing Information Technology Employee-Employer Relationships Specifications Compliance Google Docs Firefox Lithium-ion battery Optimization Streaming Value Writing Cabling IT solutions Analysis Physical Security Web Server Machine Learning IT Budget GPS Upgrades Computer Repair IT Consultant Processors Printers Cameras Relocation Meetings Tracking 3D Printing Health Cleaning Alert CCTV Emoji Webcam Unsupported Software Electronic Medical Records Work/Life Balance Domains CrashOverride Error Windows 7 Black Market Point of Sale Business Analysis Mobile Data Travel Law Enforcement Notifications Regulation Emergency Twitter Data Warehouse Botnet Supercomputer Motion Sickness Gadget Staffing Administrator Crowdsourcing Taxes Mobile Computing Personal Information