Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Understanding Spyware is the First Step to Preventing It

Tip of the Week: Understanding Spyware is the First Step to Preventing It

The term ‘spyware’ has some clearly negative connotations to it, and rightly so. This variety of malicious software can cause no small amount of trouble if left unchecked. What follows is a brief overview of spyware, and what measures you can take to protect yourself and your business from it.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business User Tips Microsoft Business Computing Malware Network Security Software Hosted Solutions Computer Google Productivity Internet Tech Term Communication Data Small Business Mobile Devices Efficiency IT Services Ransomware Backup Workplace Tips Hardware Smartphone Cloud Computing Windows 10 Microsoft Office Data Recovery Saving Money Android IT Support Productivity Office 365 Upgrade Information Gmail Windows Data Management Managed IT Services Facebook Browser Users Business Continuity Social Media Managed IT Services Mobile Device Data Backup Server Innovation Phishing Internet of Things Word Outsourced IT Passwords Windows 10 App Miscellaneous Smartphones Disaster Recovery Employer-Employee Relationship VoIP Business Management Encryption Artificial Intelligence Network Chrome Vulnerability Cybersecurity communications Remote Monitoring Managed Service Provider Analytics Applications IT Support Government Office Tips Money Tip of the week Hacker Gadgets BYOD Content Filtering Spam Big Data Website Virtual Reality Managed Service Save Money Apps Infrastructure Apple Router Development IT Management Firewall Data storage Display Unified Threat Management Maintenance Augmented Reality Customer Service WiFi Avoiding Downtime Tablet Robot Settings The Internet of Things Printing Two-factor Authentication Automation Virtualization Antivirus Bandwidth VPN YouTube Employee-Employer Relationship Education Risk Management Wireless Paperless Office Access Control SaaS Hacking Touchscreen Customer Relationship Management Storage Wi-Fi Retail OneNote Telephone Systems Laptop Holiday Mobile Security Quick Tips Outlook Presentation Safety Monitors Scam Chromebook Office Collaboration Solid State Drive Downtime Wireless Technology Recovery Networking Operating System Hosted Solution Document Management Business Intelligence End of Support Hard Disk Drive Computing Bring Your Own Device Password Data Security Google Drive Data loss Business Technology Mouse Search Vendor Management Company Culture Virtual Private Network IBM LiFi Administration HIPAA Server Management Mobile Device Management Computers Distributed Denial of Service Mail Merge Mixed Reality Google Wallet Virtual Desktop Alerts Service Level Agreement eWaste Device Business Growth Public Speaking Disaster Shortcut Migration Current Events Buisness Fraud Internet Exlporer Unified Threat Management LED Competition Comparison Title II Connectivity Remote Computing Spyware Superfish Onboarding Legal IT solutions SharePoint Statistics Cables Laptops Lithium-ion battery Managed IT Service Modem Update Address Slack Data Breach Drones Licensing Continuity Mobility Alt Codes Dark Data Uninterrupted Power Supply Patch Management Charging Going Green 5G Social Engineering Value User Error Smart Office Co-Managed IT Specifications Compliance Halloween Online IoT Digital Signage GDPR Cortana Undo Downloads IT Technicians Digital Payment Bluetooth Wires Software as a Service Social Break Fix Cookies Corporate Profile Monitoring Hard Disk Drives Marketing Fun Cooperation Politics Solar Print Toner Typing Messaging Application Hotspot Professional Services VoIP Work Content Deep Learning Humor Black Friday Regulations Entertainment Hacks Scary Stories Microsoft Excel Star Wars How To Desktop Data Warehouse Multi-Factor Security Mirgation Private Cloud Voice over Internet Protocol Dark Web Nanotechnology WannaCry Spying Solid State Drives Budget Staff Tech Support IT service Heating/Cooling Shortcuts Cryptocurrency IP Address Cybercrime File Sharing Analysis Employee-Employer Relationships How To Language USB Computer Care Time Management Optimization Streaming sip Cyber Monday Social Networking FinTech iOS Sports Blockchain Cost Management Samsung Firefox Troubleshooting Knowledge Google Calendar Chatbots Cabling Net Neutrality Screen Reader National Security Hard Drives Printer Wearable Technology Websites Identity Theft BDR Servers Security Cameras Bitcoin Mobile Office Network Congestion Motherboard Students Information Technology Computing Infrastructure Dongle Training Network Management Recycling Human Error Best Practice telephony Business Analysis Smart Technology Managed IT MSP Scalability Writing Permissions Assessment G Suite Techology Google Docs Experience Unified Communications Legislation Identity Automobile FCC Smart Tech Digital Lenovo PowerPoint Updates Refrigeration Google Maps Managing Stress Managed Services Windows 8 User Running Cable Motion Sickness Upgrades Gadget Staffing Crowdsourcing Taxes Personal Information Administrator Web Server Machine Learning IT Budget 3D Printing GPS Windows 7 IT Consultant Computer Repair Processors Cameras CrashOverride Relocation Meetings Unsupported Software Tracking Health Regulation Cleaning Alert CCTV Emoji Webcam Emergency Mobile Data Electronic Medical Records Work/Life Balance Error Black Market Point of Sale Travel Law Enforcement Domains Mobile Computing Notifications Printers Twitter Physical Security Botnet Supercomputer