Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Are You Using the Right Software?

Tip of the Week: Are You Using the Right Software?

Businesses that have been around the block a time or two may have discovered specific software titles that yield little-to-no results. Some might even be security risks that you simply aren’t willing to expose your data to. The free or cheap software found by some organizations to make up for operational deficiencies don’t always cut it, and some can even put your business at risk. This week’s tip is dedicated to finding the best software for your business.

0 Comments
Continue reading

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

0 Comments
Continue reading

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

0 Comments
Continue reading

Your Search Bar Is Now More Secure

Your Search Bar Is Now More Secure

August saw yet another Patch Tuesday designed to resolve security issues in Microsoft products. Out of the 48 vulnerabilities resolved, 15 affected Windows, while 25 were rated as critical, 21 as important, and 27 that allowed for remote code execution. This might sound a little overwhelming, so we’ll try to simplify it a bit--a lot of flaws were fixed, and the majority of them can be considered dangerous for your organization.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business Malware User Tips Business Computing Computer Network Security Internet Tech Term Productivity Microsoft Software Google Hosted Solutions Mobile Devices Efficiency IT Services Communication Small Business Backup Windows 10 Hardware Ransomware Smartphone Data Android Saving Money Workplace Tips Productivity IT Support Managed IT Services Data Management Browser Microsoft Office Internet of Things Upgrade Cloud Computing Windows Gmail Data Recovery Business Continuity Facebook Server Managed IT Services Phishing Word Data Backup App Innovation Passwords Office 365 Disaster Recovery Artificial Intelligence Managed Service Provider Mobile Device Windows 10 VoIP Employer-Employee Relationship Encryption Cybersecurity Remote Monitoring Business Management Smartphones Outsourced IT Users Applications BYOD Social Media Money Tip of the week Office Tips Vulnerability Network Chrome Content Filtering Big Data Analytics communications Infrastructure Miscellaneous Spam Government IT Support Website Information Wireless IT Management Robot Maintenance Printing Automation Tablet Customer Service Firewall Antivirus Virtual Reality Hacker Settings Paperless Office Two-factor Authentication WiFi Save Money Avoiding Downtime Apple The Internet of Things Bandwidth Employee-Employer Relationship YouTube Managed Service Data storage Access Control Display Risk Management Router Outlook Development Administration Telephone Systems Monitors Mobile Device Management Customer Relationship Management Wi-Fi Quick Tips Document Management Apps Mobile Security Operating System Scam Laptop Augmented Reality End of Support Hacking Computing Google Drive Networking Password Safety Mouse Vendor Management Business Intelligence Downtime VPN Presentation LiFi Data Security Hosted Solution SaaS Data loss Business Technology Company Culture Computers Office Storage Gadgets Virtual Private Network Wireless Technology Recovery Holiday Retail Virtualization Unified Threat Management HIPAA Search Education Server Management Touchscreen IBM LED Unified Threat Management Comparison Politics Experience Unified Communications Disaster Going Green Shortcut Social Engineering Fraud Internet Exlporer Chromebook Spyware Superfish SharePoint Cables Laptops Social Statistics Hard Drives Title II Connectivity Collaboration Onboarding Running Cable Licensing Continuity Mobility Virtual Desktop Typing Managed IT Service Modem Slack Address Smart Office Co-Managed IT Buisness Deep Learning Humor User Error Specifications Compliance Tech Support Charging Uninterrupted Power Supply Patch Management Value User Downloads IT Technicians Computer Care Wires Software as a Service IT solutions Hacks Bluetooth Refrigeration Online IoT File Sharing Lithium-ion battery Digital Signage Budget Public Speaking Cooperation Samsung Solar Print Toner Cryptocurrency Break Fix Cookies Monitoring Corporate Profile Work 5G Content Bring Your Own Device VoIP sip Black Friday Regulations Websites Identity Theft Solid State Drive How To Competition Hotspot Professional Services How To Multi-Factor Security Mirgation Training Voice over Internet Protocol Cortana Microsoft Excel Star Wars Desktop Halloween WannaCry Staff G Suite Fun Shortcuts IT service Bitcoin Heating/Cooling Network Congestion Dark Web Nanotechnology Automobile Spying Optimization Streaming Best Practice Time Management telephony Cyber Monday Social Networking Analysis Hard Disk Drive Information Technology Language USB Firefox Google Docs Google Calendar Chatbots FinTech Cabling Writing Undo Blockchain Cost Management Troubleshooting Scary Stories Printer Wearable Technology Security Cameras BDR Windows 8 Servers Marketing Net Neutrality Screen Reader IP Address Cybercrime Dongle Remote Computing Recycling Human Error Business Growth Network Management Application Smart Technology Motherboard Google Wallet Computing Infrastructure Techology Legislation Identity MSP Knowledge Current Events Managed IT Permissions Assessment Update Sports Digital Legal Lenovo Managing Stress Managed Services Google Maps FCC Smart Tech Mobile Office PowerPoint Alerts Service Level Agreement eWaste Device Alt Codes Dark Data Distributed Denial of Service Digital Payment Drones Mail Merge Tracking Meetings Cleaning Health Unsupported Software Domains Alert CCTV Private Cloud Emoji Webcam CrashOverride Work/Life Balance Electronic Medical Records Mobile Data Error Point of Sale Regulation Black Market Law Enforcement Entertainment Travel Emergency Notifications Twitter Botnet Supercomputer Gadget Staffing Mobile Computing Motion Sickness Physical Security Crowdsourcing Taxes Personal Information Administrator Web Server Machine Learning IT Budget Upgrades GPS Printers IT Consultant Computer Repair Processors Cameras Relocation 3D Printing