Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Be Like These 14 Million US Businesses and Ignore Data Security

Don’t Be Like These 14 Million US Businesses and Ignore Data Security

If you run a small business, you might consider yourself a small target of hacking attacks. It might make sense to think of it in this way, but this actually is not advisable to think of it in this way. According to a recent survey by CNBC and SurveyMonkey, only two percent of small businesses see cyber attacks as anything worth worrying about. This leads us to the next question… are you one of them?

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers User Tips Microsoft Business Computing Malware Computer Network Security Hosted Solutions Google Productivity Software Internet Tech Term Communication Data Small Business Backup Mobile Devices Efficiency IT Services Ransomware Workplace Tips Hardware Windows 10 Smartphone Cloud Computing Microsoft Office Saving Money Android Data Recovery IT Support Office 365 Upgrade Productivity Browser Business Continuity Users Social Media Information Managed IT Services Gmail Windows Data Management Facebook Data Backup Server Phishing Internet of Things Word Managed IT Services Innovation Mobile Device Miscellaneous Smartphones Disaster Recovery Outsourced IT Passwords App Windows 10 Vulnerability Cybersecurity communications Artificial Intelligence Business Management Managed Service Provider Remote Monitoring Employer-Employee Relationship VoIP Encryption Network Chrome Content Filtering Tip of the week Analytics Spam IT Support Website Big Data Managed Service Government Money Apps BYOD Applications Infrastructure Save Money Office Tips Apple Virtual Reality Hacker Gadgets Virtualization Tablet Data storage Paperless Office Display Bandwidth YouTube Employee-Employer Relationship Antivirus Education Unified Threat Management VPN Risk Management Access Control Robot Wireless Printing Router Automation Development Firewall Augmented Reality IT Management Customer Service WiFi Maintenance Avoiding Downtime The Internet of Things Settings Two-factor Authentication Retail Hosted Solution Recovery SaaS Solid State Drive Networking Company Culture Outlook Monitors Holiday Search Hard Disk Drive Data Security HIPAA IBM Data loss Business Technology Virtual Private Network Administration Operating System Chromebook Mobile Device Management OneNote Collaboration Customer Relationship Management End of Support Hacking Wi-Fi Computing Server Management Bring Your Own Device Password Mobile Security Document Management Touchscreen Google Drive Laptop Mouse Vendor Management Presentation Telephone Systems LiFi Safety Office Quick Tips Computers Downtime Scam Wireless Technology Business Intelligence Storage Analysis Employee-Employer Relationships Corporate Profile Current Events Language USB Optimization Streaming Cyber Monday Social Networking Scary Stories Blockchain Cost Management Troubleshooting VoIP Legal Google Calendar Chatbots IP Address Cybercrime FinTech iOS Screen Reader National Security How To Drones Business Analysis Printer Wearable Technology Security Cameras Alt Codes Dark Data Net Neutrality Students WannaCry Going Green Social Engineering Computing Infrastructure Dongle Knowledge Recycling Human Error IT service Heating/Cooling Smart Technology Motherboard Remote Computing Sports Social Hard Drives Permissions Assessment Time Management Legislation Identity Update Mobile Office MSP Scalability FCC Smart Tech PowerPoint Updates Firefox Managing Stress Managed Services Cabling Typing Mixed Reality Alerts Service Level Agreement Digital Payment Experience Unified Communications eWaste Device BDR Servers Deep Learning Humor Distributed Denial of Service Hacks Refrigeration Fraud Internet Exlporer Politics LED Network Management User Comparison Running Cable Migration Title II Connectivity Virtual Desktop Onboarding Techology Budget Public Speaking SharePoint Cables Laptops Managed IT Cryptocurrency Buisness Slack Data Breach Digital Lenovo How To Competition Licensing Private Cloud Continuity Mobility Google Maps sip Managed IT Service Modem Mail Merge Value Tech Support IT solutions Smart Office Co-Managed IT Specifications Compliance Lithium-ion battery Charging Online IoT Computer Care Digital Signage GDPR Unified Threat Management Downloads IT Technicians File Sharing Wires Software as a Service Disaster Shortcut Bitcoin Network Congestion 5G Monitoring Hard Disk Drives Spyware Superfish Information Technology Cooperation Solar Print Toner Statistics Best Practice telephony Break Fix Cookies Samsung Messaging Address Writing Undo Hotspot Professional Services Websites Identity Theft Cortana Work Content Google Docs Black Friday Regulations Halloween Marketing Microsoft Excel Star Wars Training Fun Desktop Data Warehouse User Error Multi-Factor Security Mirgation Voice over Internet Protocol Entertainment Uninterrupted Power Supply Patch Management Windows 8 G Suite Spying Solid State Drives Google Wallet Staff Automobile Shortcuts Bluetooth Business Growth Application Dark Web Nanotechnology Botnet Supercomputer Twitter Gadget Staffing Motion Sickness Crowdsourcing Taxes 3D Printing Personal Information Administrator Emergency Machine Learning IT Budget Web Server GPS Printers IT Consultant Unsupported Software Domains Computer Repair Relocation Processors Cameras Tracking Meetings Cleaning Mobile Data Health Alert CCTV Emoji Webcam Windows 7 Work/Life Balance Electronic Medical Records Error Mobile Computing Black Market Point of Sale Regulation Law Enforcement Physical Security Travel Notifications CrashOverride Upgrades