Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Retail is Starting to Need IT

How Retail is Starting to Need IT

Of all industries, retail has probably escaped the dependence on technology that many others have developed over the years for the longest span of time. However, it has become clear that there are many ways that IT solutions can assist the retail sector that just weren’t present in the past. However, this shift is proving challenging for many of this industry’s leaders.

0 Comments
Continue reading

Powerful Physical Security Options

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?

0 Comments
Continue reading

An MSP’s Services Protect More than Digital Assets

An MSP’s Services Protect More than Digital Assets

When you think about your data security, what kind of solutions pop into mind? If you’re like many, you probably start thinking about passwords, firewalls, and antivirus, right? While these are all good things to have, you also have to consider the possibility that someone could break into your office and bypass all of these defenses, simply by picking up your server and walking out.

0 Comments
Continue reading

One Phish, Two Phish, The Grinch Who Didn’t Phish

One Phish, Two Phish, The Grinch Who Didn’t Phish

An email’s important, that much is clear fact - but you need to stay safe from an email attack.

0 Comments
Continue reading

Securing Your Google Account: The Unofficial Guide

Securing Your Google Account: The Unofficial Guide

If you use a computer today, there’s a fair chance that you have a Google account. The practicality that if offers with its comprehensive service offerings simply can’t be ignored. However, it is also important that a user’s, whether they utilize it for business or personal use, security isn’t ignored either.

0 Comments
Continue reading

Why You Should Be Encrypting Your Emails

Why You Should Be Encrypting Your Emails

Encryption can be an invaluable tool for your company, especially where your email communications are concerned. Here, we’ll go over a few of the benefits you can see by adopting it - but first, we’ll briefly go over what encryption is.

0 Comments
Continue reading

Fileless Ransomware Uses Windows Tools Against You

Fileless Ransomware Uses Windows Tools Against You

By now everyone knows about ransomware, the dastardly strand of malware that encrypts data (or the drives it’s stored on) and sends the user a message demanding payment in a certain amount of time before the data is deleted forever. To add a little more menace to an already stressful situation, the message includes a countdown clock. If it sounds like a bad situation, rest assured it is. How could it get worse you ask? Simple, make it more difficult to stop.

0 Comments
Continue reading

Windows Set to Launch Huge Update in October

Windows Set to Launch Huge Update in October

Windows 10 might be one of the best Microsoft operating systems to come out in a while, but their latest policy regarding major Windows 10 updates is causing quite a stir in the technology industry. Specifically, the large update coming up this October could potentially cause major problems for your organization.

0 Comments
Continue reading

Managed Security Services Work to Stomp Out Security Problems

Managed Security Services Work to Stomp Out Security Problems

In the course of doing business, many of today’s businesses have encountered some type of major security threat. As these threats get more and more sophisticated, you are beginning to see more businesses and other organizations enlisting the services of companies that are in business to keep their clients safe. We’ll take a look at some of the services that managed security service provides, and how it fits into a business’ IT strategy.

0 Comments
Continue reading

Tip of the Week: 5 Foundational Pieces to Computing Securely

Tip of the Week: 5 Foundational Pieces to Computing Securely

Every so often, it can be good to get back to basics for a bit of review. That’s why we’re going over five ways that you can improve your security through basic best practices for this week’s tip!

0 Comments
Continue reading

Cybersecurity Roundup for the First Half of 2018

Cybersecurity Roundup for the First Half of 2018

Each day tens of thousands of people from all over the world are hacked. Not just sent run-of-the-mill phishing emails, but legitimately hacked. This has made the cybersecurity industry grow at a rate only surpassed by the Internet of Things (which ironically may be one of the largest threats to cybersecurity in the world). We thought it would be good to go over some of the largest cybercrimes of the first half of 2018, and some telling statistics that will give you an idea of what exactly you are up against.

0 Comments
Continue reading

The IoT Keeps Growing

The IoT Keeps Growing

The Internet of Things has grown considerably over the past few years, and it’s not slowing down anytime soon. It grew as expected in 2018, but where will 2019 take the Internet of Things? We’ve put together some predictions.

0 Comments
Continue reading

Tech Terminology: Authentication

Tech Terminology: Authentication

Authentication isn’t an unfamiliar aspect in everyday life. Driver’s licenses, library cards, and PIN numbers are all forms of identity authentication. However, as computers have become a cornerstone of everyday life, the most commonly-used way to confirm one’s identity has almost assuredly become the username/password login combination. Today, we’ll take a deeper dive into what authentication is.

0 Comments
Continue reading

Artificial Intelligence May Give Hackers their Greatest Weapon Yet

Artificial Intelligence May Give Hackers their Greatest Weapon Yet

Artificial intelligence has been making waves in the world of cybersecurity, as machine learning could potentially make the solutions we have today smarter and better at their intended jobs. However, artificial intelligence has also appeared on the other side of cybersecurity, as cybercriminals have begun to leverage A.I. as well.

0 Comments
Continue reading

This Internet Scam Is Getting Very Personal

This Internet Scam Is Getting Very Personal

Seemingly every day you read of a new Internet threat affecting users. As a result, people are more cognizant than ever. What they do fall for time and again are scams that are seemingly person-to-person. The latest one is especially rubbing people the wrong way.

0 Comments
Continue reading

Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

0 Comments
Continue reading

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

0 Comments
Continue reading

How Your Smartphone Keeps Your Data Safe

How Your Smartphone Keeps Your Data Safe

Smartphones are the predominant mode of communication, as well as now being the devices most used to access the Internet. With so much depending on the modern smartphone, it has become one of the largest, and most competitive, markets of any consumer item. As a result, manufacturers are building devices with software that is able to encrypt the phone against unauthorized access.

0 Comments
Continue reading

A QR Code Could Be your New Wi-Fi Password

A QR Code Could Be your New Wi-Fi Password

There is no understating the importance of strong, reliable passwords to your organization’s network security, especially to protect its wireless connection. However, this can create some friction with your staff when they try to connect to Wi-Fi using their mobile device. To make accessing the Internet easier, scannable QR codes can be used to connect to the Internet.

0 Comments
Continue reading

FREE Printout: IT Security End-User Checklist

FREE Printout: IT Security End-User Checklist

This guide was created so that business owners, office managers, and IT departments can provide it as an educational resource to showcase some of the most basic IT security practices that can be implemented in your workplace. We recommend printing this out and handing it out to your staff for maximum results.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business Malware User Tips Computer Business Computing Network Security Internet Google Tech Term Microsoft Productivity Software Hosted Solutions Mobile Devices Efficiency IT Services Communication Small Business Ransomware Backup Windows 10 Hardware Android Smartphone Data Saving Money Workplace Tips IT Support Productivity Browser Microsoft Office Managed IT Services Data Management Facebook Cloud Computing Server Business Continuity Upgrade Data Recovery Internet of Things Managed IT Services Gmail Windows Data Backup Office 365 Phishing Disaster Recovery Word Innovation Passwords App Cybersecurity Users Artificial Intelligence Smartphones Business Management Managed Service Provider Remote Monitoring Employer-Employee Relationship VoIP Outsourced IT Encryption Mobile Device Windows 10 Content Filtering Tip of the week Analytics Vulnerability IT Support Spam Website Big Data Miscellaneous communications Social Media Government Money Information Infrastructure BYOD Applications Office Tips Network Chrome Two-factor Authentication Paperless Office Tablet Data storage Display Bandwidth Antivirus YouTube Employee-Employer Relationship Managed Service Robot Risk Management Access Control Router Wireless Printing Automation Firewall IT Management Customer Service WiFi Save Money Maintenance Avoiding Downtime Hacker Settings Apple The Internet of Things Virtual Reality Storage Gadgets Downtime Scam Wireless Technology Business Intelligence Retail Virtualization Hosted Solution Recovery SaaS Networking Company Culture Outlook Unified Threat Management VPN Monitors Holiday Search Education Data Security HIPAA IBM Data loss Business Technology Apps Mobile Device Management Development Virtual Private Network Administration Operating System End of Support Hacking Customer Relationship Management Wi-Fi Computing Server Management Laptop Password Mobile Security Document Management Touchscreen Google Drive Augmented Reality Mouse Vendor Management Presentation Telephone Systems Safety LiFi Computers Office Quick Tips Bluetooth Business Growth Application Dark Web Nanotechnology G Suite Spying Google Wallet Staff Automobile Shortcuts Cyber Monday Social Networking Scary Stories Analysis Corporate Profile Current Events Language USB Optimization Streaming IP Address Cybercrime FinTech Solid State Drive Blockchain Cost Management Troubleshooting VoIP Legal Google Calendar Chatbots Alt Codes Dark Data Net Neutrality Screen Reader How To Drones Printer Wearable Technology Security Cameras Smart Technology Motherboard Remote Computing Sports WannaCry Going Green Social Engineering Computing Infrastructure Dongle Knowledge Recycling Human Error IT service Heating/Cooling Mobile Office MSP Hard Disk Drive Social Hard Drives Permissions Assessment Time Management Legislation Identity Update Managed Services Cabling Typing FCC Smart Tech PowerPoint Firefox Managing Stress Distributed Denial of Service Alerts Service Level Agreement Digital Payment Experience Unified Communications eWaste Device BDR Servers Deep Learning Humor Chromebook Running Cable Hacks Refrigeration Fraud Internet Exlporer Politics LED Network Management User Comparison Cables Laptops Managed IT Cryptocurrency Title II Connectivity Virtual Desktop Onboarding Techology Budget Public Speaking SharePoint Collaboration sip Managed IT Service Modem Buisness Slack Digital Lenovo How To Competition Licensing Continuity Mobility Google Maps Bring Your Own Device Compliance Lithium-ion battery Charging Mail Merge Value Tech Support IT solutions Smart Office Co-Managed IT Specifications Wires Software as a Service Disaster Shortcut Bitcoin Network Congestion Online IoT Computer Care Digital Signage Unified Threat Management Downloads IT Technicians File Sharing Best Practice telephony Break Fix Cookies Samsung 5G Monitoring Spyware Superfish Information Technology Cooperation Solar Print Toner Statistics Black Friday Regulations Halloween Address Writing Undo Hotspot Professional Services Websites Identity Theft Cortana Work Content Google Docs Voice over Internet Protocol Uninterrupted Power Supply Patch Management Windows 8 Marketing Microsoft Excel Star Wars Training Fun Desktop User Error Multi-Factor Security Mirgation Notifications CrashOverride Upgrades Twitter Botnet Supercomputer Gadget Staffing Motion Sickness Crowdsourcing Taxes 3D Printing Personal Information Administrator Web Server Emergency Machine Learning IT Budget GPS Printers IT Consultant Unsupported Software Domains Computer Repair Processors Cameras Relocation Meetings Tracking Cleaning Mobile Data Health Alert CCTV Private Cloud Emoji Webcam Work/Life Balance Electronic Medical Records Error Black Market Point of Sale Regulation Mobile Computing Entertainment Law Enforcement Physical Security Travel