Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

“Paying the Ransom” Isn’t a Ransomware Defense

“Paying the Ransom” Isn’t a Ransomware Defense

Ransomware has become a favorite attack vector for hackers - after all, for them, it’s pretty much a no loss game. They either get paid, or they move on to their next target. Unfortunately, cyberattackers that dispatch ransomware often do get paid, and these payments can sometimes come from a surprising source: cybersecurity firms.

0 Comments
Continue reading

Even Cities Aren’t Immune to Ransomware

Even Cities Aren’t Immune to Ransomware

Ransomware hasn’t let up. It is important to understand that any organization, of any kind, is a potential target of a ransomware attack - and yes, this includes municipalities. In fact, since 2013, over 170 government systems at the county, city, or state levels have been attacked.

0 Comments
Continue reading

Fileless Ransomware Uses Windows Tools Against You

Fileless Ransomware Uses Windows Tools Against You

By now everyone knows about ransomware, the dastardly strand of malware that encrypts data (or the drives it’s stored on) and sends the user a message demanding payment in a certain amount of time before the data is deleted forever. To add a little more menace to an already stressful situation, the message includes a countdown clock. If it sounds like a bad situation, rest assured it is. How could it get worse you ask? Simple, make it more difficult to stop.

0 Comments
Continue reading

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

0 Comments
Continue reading

Targeted Ransomware Checks for Particular Attributes

Targeted Ransomware Checks for Particular Attributes

Put yourself in the shoes of a cybercriminal. If you were to launch a ransomware attack, who would be your target? Would you launch an indiscriminate attack to try to snare as many as you could, or would you narrow your focus to be more selective? As it happens, real-life cybercriminals have largely made the shift to targeted, relatively tiny, ransomware attacks.

0 Comments
Continue reading

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

0 Comments
Continue reading

Tip of the Week: Ransomware Is Exploding… Is Your Business Ready For The Blast?

Tip of the Week: Ransomware Is Exploding… Is Your Business Ready For The Blast?

When it comes to Internet threats, ransomware is the one that causes the most fear, especially for small and medium-sized businesses, as it should. According to the Cisco 2017 Annual Cybersecurity Report, ransomware is growing at a yearly rate of 350%. It’s time to make sure that you’re doing what you can to stop your business from becoming another ransomware statistic. Here’s five very good tips that will help you avoid becoming a victim of the next big ransomware attack!

0 Comments
Continue reading

Would You Share Your Browser History? This Ransomware Will

mobile_ransomware_400

Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

0 Comments
Continue reading

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

On May 11th, 2017, the world was introduced to the WannaCry ransomware. The ransomware spread around the globe like wildfire, infecting hundreds of thousands of devices and catching many major organizations and businesses by surprise. The full extent of the ransomware’s damage is still being assessed, yet, one thing we do know: this whole fiasco was preventable.

0 Comments
Continue reading

Getting Greedy: Ransomware Hackers are Asking for Way More Money

Getting Greedy: Ransomware Hackers are Asking for Way More Money

If fiscal reasons have stopped you from securing your network against ransomware thus far, you may want to reconsider your strategy. Not only are attacks still becoming more and more prevalent, but the developers of ransomware have lowered the price of admission for aspiring cyber criminals. Fortunately, there are some steps you can take to keep your business protected against a ransomware attack.

0 Comments
Continue reading

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

0 Comments
Continue reading

Why Your Business Should Be Concerned About CryptoWall

b2ap3_thumbnail_new_ransomeware_400.jpgRansomware is one of the most devastating computer viruses in today’s computing landscape. You may have heard of one of its most famous variations, Cryptolocker. It received a lot of attention when it dramatically hit the scene two short years ago. Thankfully, the threat from CryptoLocker has decreased after the GameOver Zeus botnet was taken down last year. Although, now we’ve got a new, more contagious strain of this ransomware to deal with known as Cryptowall.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business User Tips Malware Business Computing Microsoft Network Security Computer Productivity Google Software Hosted Solutions Internet Tech Term Data Small Business IT Services Communication Backup Ransomware Mobile Devices Efficiency Workplace Tips Hardware Windows 10 Smartphone Saving Money Cloud Computing Android Data Recovery Microsoft Office IT Support Productivity Upgrade Windows Social Media Browser Gmail Business Continuity Data Management Managed IT Services Facebook Innovation Managed IT Services Information Phishing Mobile Device Word Data Backup Office 365 Internet of Things Server Users Outsourced IT App Windows 10 Passwords Disaster Recovery Smartphones Encryption Network Chrome Employer-Employee Relationship Vulnerability Cybersecurity communications Artificial Intelligence Miscellaneous Business Management Managed Service Provider Remote Monitoring VoIP Save Money Office Tips Apps Applications Apple Virtual Reality Hacker Content Filtering Tip of the week Analytics IT Support Big Data Money Government Gadgets Managed Service Infrastructure Spam BYOD Website Access Control IT Management Router Customer Service Augmented Reality Development Maintenance Settings Two-factor Authentication Tablet Data storage Firewall Paperless Office Bandwidth Display Antivirus YouTube WiFi Education Unified Threat Management VPN Avoiding Downtime Robot The Internet of Things Risk Management Wireless Printing Virtualization Employee-Employer Relationship Automation Document Management Touchscreen Google Drive Laptop Password HIPAA Mouse Vendor Management Telephone Systems LiFi Safety Quick Tips Computers Scam Hacking Mobile Security Storage Downtime Hosted Solution Retail SaaS Solid State Drive Networking Outlook Presentation Business Intelligence Holiday Search Hard Disk Drive Monitors Data Security Office IBM Wireless Technology Data loss Business Technology Company Culture Administration Operating System Chromebook Mobile Device Management Virtual Private Network Recovery Customer Relationship Management End of Support Computing Server Management Bring Your Own Device Wi-Fi Managing Stress Tech Support Managed Services IT solutions FCC Smart Tech PowerPoint Updates Lithium-ion battery Mail Merge Unified Threat Management Distributed Denial of Service Hard Drives File Sharing Mixed Reality Disaster Shortcut Bitcoin Alerts Network Congestion Service Level Agreement eWaste Device Computer Care Superfish Comparison Information Technology Migration Statistics Best Practice Fraud telephony Internet Exlporer Samsung LED 5G Spyware Cables Websites Laptops Identity Theft Cortana Title II Google Docs Connectivity Onboarding Halloween Address SharePoint Writing Fun User Error Managed IT Service Modem Refrigeration Slack Data Breach Uninterrupted Power Supply Patch Management Windows 8 Licensing User Continuity Mobility Training Specifications Google Wallet Compliance Charging Automobile Bluetooth Business Growth Value Public Speaking Smart Office Co-Managed IT G Suite Wires Software as a Service Online IoT Competition Digital Signage Scary Stories Corporate Profile Downloads Current Events IT Technicians VoIP Break Fix Legal Cookies Monitoring Hard Disk Drives IP Address Cybercrime Cooperation Solar Print Toner How To Black Friday Drones Regulations Messaging Alt Codes Hotspot Dark Data Professional Services Work Content Voice over Internet Protocol Entertainment Knowledge IT service Heating/Cooling Microsoft Excel Star Wars Remote Computing Desktop Sports WannaCry Multi-Factor Security Going Green Mirgation Social Engineering Shortcuts Time Management Dark Web Nanotechnology Undo Update Spying Solid State Drives Mobile Office Social Staff Firefox Cyber Monday Social Networking Marketing Analysis Employee-Employer Relationships Cabling Typing Language USB Optimization Streaming Application FinTech iOS Digital Payment Experience Unified Communications BDR Servers Deep Learning Blockchain Humor Cost Management Troubleshooting Google Calendar Chatbots Politics Security Cameras Network Management Net Neutrality Screen Reader National Security Running Cable Printer Hacks Wearable Technology Techology Smart Technology Budget Motherboard Collaboration Students Managed IT Cryptocurrency Computing Infrastructure Dongle Recycling Human Error Virtual Desktop Legislation Identity How To MSP Private Cloud Scalability Google Maps Permissions sip Assessment Buisness Digital Lenovo Emoji Webcam Electronic Medical Records Work/Life Balance Error Domains Black Market Point of Sale Mobile Computing Physical Security Travel Law Enforcement CrashOverride Upgrades Windows 7 Notifications Botnet Supercomputer Twitter Staffing Motion Sickness Gadget 3D Printing Personal Information Regulation Administrator Crowdsourcing Taxes Machine Learning IT Budget Web Server Emergency GPS Unsupported Software Computer Repair IT Consultant Relocation Processors Cameras Tracking Meetings Mobile Data Health Cleaning Alert Printers CCTV