Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Cloud Isn’t Necessarily Safe

The Cloud Isn’t Necessarily Safe

The Cloud. That big, vague entity where a lot of us our entrusting our information has lifted a huge burden off of businesses by alleviating the need for expensive onsite hardware. It makes user management a little more user friendly. It keeps us connected and in communication no matter where we are.

0 Comments
Continue reading

How the EU’s General Data Protection Regulation is Working After the First Year

How the EU’s General Data Protection Regulation is Working After the First Year

After years of talk about individual data privacy, and years enacting regional laws, the European Union’s flagship individual privacy law, the General Data Protection Regulation went into effect a year ago in May. Suddenly, if your organization does business inside EU member states, you will be under a stringent regulation concerning individual data privacy. Today, we will look at the GDPR and what has changed in the year it has been law.

0 Comments
Continue reading

Microsoft SQL Server 2008 and 2008 R2 Approaching End of Life

Microsoft SQL Server 2008 and 2008 R2 Approaching End of Life

A decade-old version of Microsoft’s popular database software SQL Server 2008 and SQL Server 2008 R2 is losing support on July 9,2019. If your business hasn’t moved away from the software, you are looking at a few real pressing problems. Let’s take a look at the software and what options businesses that haven’t moved on from SQL Server 2008 or SQL Server R2 have going forward.

0 Comments
Continue reading

Prioritizing Network Security is a Must

Prioritizing Network Security is a Must

Every business has their version of risk management. Nowadays, with all the technology organizations use for productivity, collaboration, and communications, managing risk can often be difficult. There are numerous threats that come from the Internet that could put a damper on productivity, create inefficiencies, or shut down production entirely. Regardless of how large or small your business is, you need to prioritize the security of your computing network.

0 Comments
Continue reading

Even Cities Aren’t Immune to Ransomware

Even Cities Aren’t Immune to Ransomware

Ransomware hasn’t let up. It is important to understand that any organization, of any kind, is a potential target of a ransomware attack - and yes, this includes municipalities. In fact, since 2013, over 170 government systems at the county, city, or state levels have been attacked.

0 Comments
Continue reading

Looking Back at 2019 Data Breaches

Looking Back at 2019 Data Breaches

Data is more of a commodity than it has ever been, and more often than not, companies spend a considerable sum on data security. Unfortunately, even the most well-defended organizations still have trouble keeping data safe. 2018 saw 446.5 million records exposed due to data breaches, even though the overall number of breaches dropped by 23 percent to 1,244 total. We’ll discuss some of the most notable breaches that have happened over the first four months of 2019.

0 Comments
Continue reading

Would One of These Social Media Scams Bamboozle You?

Would One of These Social Media Scams Bamboozle You?

Social media plays an increasing role in both the professional and personal sides of our lives. Unfortunately, this means that we all experience an increase in exposure to the many scam attempts that will appear on our screens. Like any kind of scam, the best defense against those that appear on social media is good, old-fashioned awareness and vigilance.

0 Comments
Continue reading

USB Killer Caused $58,000 in Damage to The College of Saint Rose

USB Killer Caused $58,000 in Damage to The College of Saint Rose

For the modern business a lot of time is spent focusing on network security. The theory behind this action is that there are all types of threats that could be trying to get into your computer network. At a college, you’d expect that, since so much sensitive data, including personal, medical, and financial information--as well as intellectual property--is stored on college computers/servers, that the diligence of IT administrators would be even more conspicuous.

0 Comments
Continue reading

Privacy Concerns Hang Over Social Media

Privacy Concerns Hang Over Social Media

Social media has brought about a massive shift in the way people interact. Today we share our opinions, photos, and videos; and, we can even choose our dates by swiping right or left. With social media, people share moments, opinions, and other information, but is all this sharing actually setting people, and the organizations they interact with, up for failure? We’ll take a look at social media privacy concerns and potentially hazardous practices that could exacerbate the problems further.

0 Comments
Continue reading

Security Is a Big Component of Windows 10

Security Is a Big Component of Windows 10

With Microsoft betting on Windows 10 to be their #1 OS for the foreseeable future, it is important for them to be able to sufficiently protect their users from the growing threats looking to make life difficult for businesses from all over the world. Today, we will take a look at Windows 10 Enterprise Security, and how it works to protect businesses from harm.

0 Comments
Continue reading

Are the Messaging Apps You Use Secure?

Are the Messaging Apps You Use Secure?

Messaging applications are critical to the success of the modern business, but it’s important that they don’t compromise security in the pursuit of convenience. There is a specific set of criteria involved with ensuring that your chosen messaging applications are secure.

0 Comments
Continue reading

Social Media Can Be a Great Business Tool, So Long as It’s Secured

Social Media Can Be a Great Business Tool, So Long as It’s Secured

There is no denying that social media is one of the most powerful communication tools of our time, especially for businesses trying to communicate with their clients and customers. However, while you will want to have an account for your business on social media, you might not want a presence of your own. Today, we’ll discuss this quandary, and how you can resolve it.

0 Comments
Continue reading

The Right and Wrong of the Hollywood Hack

The Right and Wrong of the Hollywood Hack

Movies and television shows are a big part of our culture. When hackers are portrayed on the silver (or small) screen, there are some major dramatic elements added to their performances to keep the audience from dismissing key pieces of plot. Today, we will look at hacker portrayals, and what Hollywood gets right, and what it gets completely wrong.

0 Comments
Continue reading

How Retail is Starting to Need IT

How Retail is Starting to Need IT

Of all industries, retail has probably escaped the dependence on technology that many others have developed over the years for the longest span of time. However, it has become clear that there are many ways that IT solutions can assist the retail sector that just weren’t present in the past. However, this shift is proving challenging for many of this industry’s leaders.

0 Comments
Continue reading

Powerful Physical Security Options

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?

0 Comments
Continue reading

An MSP’s Services Protect More than Digital Assets

An MSP’s Services Protect More than Digital Assets

When you think about your data security, what kind of solutions pop into mind? If you’re like many, you probably start thinking about passwords, firewalls, and antivirus, right? While these are all good things to have, you also have to consider the possibility that someone could break into your office and bypass all of these defenses, simply by picking up your server and walking out.

0 Comments
Continue reading

One Phish, Two Phish, The Grinch Who Didn’t Phish

One Phish, Two Phish, The Grinch Who Didn’t Phish

An email’s important, that much is clear fact - but you need to stay safe from an email attack.

0 Comments
Continue reading

Securing Your Google Account: The Unofficial Guide

Securing Your Google Account: The Unofficial Guide

If you use a computer today, there’s a fair chance that you have a Google account. The practicality that if offers with its comprehensive service offerings simply can’t be ignored. However, it is also important that a user’s, whether they utilize it for business or personal use, security isn’t ignored either.

0 Comments
Continue reading

Why You Should Be Encrypting Your Emails

Why You Should Be Encrypting Your Emails

Encryption can be an invaluable tool for your company, especially where your email communications are concerned. Here, we’ll go over a few of the benefits you can see by adopting it - but first, we’ll briefly go over what encryption is.

0 Comments
Continue reading

Fileless Ransomware Uses Windows Tools Against You

Fileless Ransomware Uses Windows Tools Against You

By now everyone knows about ransomware, the dastardly strand of malware that encrypts data (or the drives it’s stored on) and sends the user a message demanding payment in a certain amount of time before the data is deleted forever. To add a little more menace to an already stressful situation, the message includes a countdown clock. If it sounds like a bad situation, rest assured it is. How could it get worse you ask? Simple, make it more difficult to stop.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers User Tips Microsoft Business Computing Malware Network Security Computer Hosted Solutions Productivity Google Software Internet Tech Term Communication Data Small Business Backup Mobile Devices Efficiency IT Services Ransomware Workplace Tips Hardware Windows 10 Smartphone Cloud Computing Android Data Recovery Microsoft Office IT Support Saving Money Upgrade Productivity Office 365 Facebook Information Managed IT Services Users Social Media Windows Gmail Browser Data Management Business Continuity Server Internet of Things Phishing Innovation Managed IT Services Word Mobile Device Data Backup Disaster Recovery Smartphones Outsourced IT App Windows 10 Passwords Miscellaneous Business Management Managed Service Provider VoIP Remote Monitoring Encryption Network Employer-Employee Relationship Chrome Vulnerability Cybersecurity communications Artificial Intelligence Gadgets Money Government Spam Website Applications Infrastructure BYOD Apps Office Tips Save Money Apple Virtual Reality Hacker Content Filtering Tip of the week Analytics IT Support Big Data Managed Service Unified Threat Management VPN Education Access Control Robot Virtualization Risk Management Router Wireless Printing Development Automation IT Management Customer Service Augmented Reality Maintenance Settings Firewall Two-factor Authentication Tablet Data storage Paperless Office WiFi Display Bandwidth Avoiding Downtime Antivirus YouTube Employee-Employer Relationship The Internet of Things Hard Disk Drive Monitors Wireless Technology Holiday Search HIPAA Recovery IBM Data Security Data loss Business Technology Administration Operating System Chromebook Mobile Device Management Virtual Private Network Collaboration Customer Relationship Management End of Support OneNote Server Management Bring Your Own Device Wi-Fi Computing Touchscreen Google Drive Laptop Password Mobile Security Document Management Mouse Vendor Management Telephone Systems LiFi Hacking Safety Quick Tips Computers Business Intelligence Storage Downtime Scam Hosted Solution Retail SaaS Solid State Drive Presentation Company Culture Networking Outlook Office Time Management Legislation Identity Application Update Mobile Office MSP Scalability Social Permissions Assessment Managing Stress Managed Services Cabling Typing FCC Smart Tech PowerPoint Updates Firefox Alerts Service Level Agreement Digital Payment Experience Unified Communications eWaste Device BDR Servers Deep Learning Humor Distributed Denial of Service Mixed Reality LED Network Management Comparison Running Cable Migration Hacks Fraud Internet Exlporer Politics Techology Budget SharePoint Cables Laptops Managed IT Cryptocurrency Title II Connectivity Virtual Desktop Onboarding Licensing Private Cloud Continuity Mobility Google Maps sip Managed IT Service Modem Hard Drives Buisness Slack Data Breach Digital Lenovo How To IT solutions Smart Office Co-Managed IT Specifications Compliance Lithium-ion battery Charging Mail Merge Value Tech Support Unified Threat Management Downloads IT Technicians File Sharing Wires Software as a Service Disaster Shortcut Bitcoin Network Congestion Online IoT Computer Care Digital Signage GDPR Cooperation User Solar Print Toner Statistics Best Practice telephony Break Fix Cookies Refrigeration Samsung 5G Monitoring Hard Disk Drives Spyware Superfish Information Technology Identity Theft Cortana Work Content Google Docs Black Friday Regulations Halloween Messaging Address Writing Hotspot Professional Services Public Speaking Websites Data Warehouse User Error Multi-Factor Security Mirgation Voice over Internet Protocol Entertainment Uninterrupted Power Supply Patch Management Windows 8 Microsoft Excel Star Wars Competition Training Fun Desktop Staff Automobile Shortcuts Bluetooth Business Growth Dark Web Nanotechnology G Suite Spying Solid State Drives Google Wallet Optimization Streaming Cyber Monday Social Networking Scary Stories Analysis Employee-Employer Relationships Corporate Profile Current Events Language USB Troubleshooting VoIP Legal Google Calendar Chatbots IP Address Cybercrime FinTech iOS Blockchain Cost Management Business Analysis Printer Wearable Technology Security Cameras Alt Codes Dark Data Net Neutrality Screen Reader Undo National Security How To Drones Dongle Knowledge Recycling Human Error IT service Heating/Cooling Smart Technology Marketing Motherboard Remote Computing Sports Students WannaCry Going Green Social Engineering Computing Infrastructure Printers GPS Unsupported Software Computer Repair IT Consultant Relocation Processors Cameras Meetings Tracking Mobile Data Health Cleaning Alert CCTV Emoji Webcam Windows 7 Domains Electronic Medical Records Work/Life Balance Error Black Market Point of Sale Regulation Mobile Computing Physical Security Travel Law Enforcement Notifications CrashOverride Upgrades Botnet Supercomputer Twitter Motion Sickness Gadget Staffing 3D Printing Personal Information Administrator Crowdsourcing Taxes Machine Learning IT Budget Web Server Emergency