Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Don’t Get Faced by FaceTime

Tip of the Week: Don’t Get Faced by FaceTime

Sometimes threats come from the most unlikely places. One such threat came in the form of Apple’s FaceTime app, which gives users the ability to spy on others without their consent through group FaceTime calls. Even though a patch has been issued that solves the problem, it’s still worth reflecting on.

0 Comments
Continue reading

Tip of the Week: Are You Using the Right Software?

Tip of the Week: Are You Using the Right Software?

Businesses that have been around the block a time or two may have discovered specific software titles that yield little-to-no results. Some might even be security risks that you simply aren’t willing to expose your data to. The free or cheap software found by some organizations to make up for operational deficiencies don’t always cut it, and some can even put your business at risk. This week’s tip is dedicated to finding the best software for your business.

0 Comments
Continue reading

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

0 Comments
Continue reading

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

0 Comments
Continue reading

Your Search Bar Is Now More Secure

Your Search Bar Is Now More Secure

August saw yet another Patch Tuesday designed to resolve security issues in Microsoft products. Out of the 48 vulnerabilities resolved, 15 affected Windows, while 25 were rated as critical, 21 as important, and 27 that allowed for remote code execution. This might sound a little overwhelming, so we’ll try to simplify it a bit--a lot of flaws were fixed, and the majority of them can be considered dangerous for your organization.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Hackers User Tips Malware Microsoft Business Computing Computer Internet Google Hosted Solutions Network Security Productivity Software Tech Term Mobile Devices Efficiency Communication IT Services Data Small Business Backup Smartphone Ransomware Workplace Tips Windows 10 Hardware Android IT Support Productivity Microsoft Office Saving Money Cloud Computing Browser Data Management Business Continuity Data Recovery Managed IT Services Gmail Data Backup Office 365 Facebook Server Internet of Things Users Upgrade Managed IT Services Innovation Word Windows Windows 10 Passwords Smartphones Disaster Recovery Phishing Outsourced IT Social Media App Employer-Employee Relationship Network Mobile Device Chrome Vulnerability Cybersecurity communications Artificial Intelligence Business Management Managed Service Provider Remote Monitoring VoIP Encryption Apple Hacker Content Filtering Tip of the week Analytics IT Support Big Data Miscellaneous Managed Service Government Money Information Spam Website Infrastructure BYOD Applications Save Money Office Tips Maintenance Firewall Virtual Reality Settings Two-factor Authentication Paperless Office Tablet Data storage Display Bandwidth WiFi YouTube Employee-Employer Relationship Avoiding Downtime Antivirus The Internet of Things Education Robot Virtualization Risk Management Access Control Router Wireless Printing Automation IT Management Customer Service Hacking Safety LiFi Computers Quick Tips Storage Downtime Scam Business Intelligence Retail Hosted Solution Solid State Drive Presentation SaaS Networking Company Culture Office Outlook Hard Disk Drive VPN Monitors Wireless Technology Holiday Search Gadgets Unified Threat Management Data Security HIPAA Recovery IBM Data loss Business Technology Mobile Device Management Development Virtual Private Network Administration Operating System Chromebook End of Support Customer Relationship Management Wi-Fi Computing Server Management Laptop Password Mobile Security Document Management Touchscreen Google Drive Apps Augmented Reality Mouse Vendor Management Telephone Systems Halloween Messaging Address Writing Hotspot Professional Services Public Speaking Websites Identity Theft Cortana Work Content Google Docs Black Friday Regulations Voice over Internet Protocol Entertainment Uninterrupted Power Supply Patch Management Windows 8 Microsoft Excel Star Wars Competition Training Fun Desktop User Error Multi-Factor Security Mirgation Business Growth Dark Web Nanotechnology G Suite Spying Google Wallet Staff Automobile Shortcuts Bluetooth Social Networking Scary Stories Analysis Employee-Employer Relationships Corporate Profile Current Events Language USB Optimization Streaming Cyber Monday Cybercrime FinTech iOS Blockchain Cost Management Troubleshooting VoIP Legal Google Calendar Chatbots IP Address Alt Codes Dark Data Net Neutrality Screen Reader Undo How To Drones Printer Wearable Technology Security Cameras Smart Technology Marketing Motherboard Remote Computing Sports Students WannaCry Going Green Social Engineering Computing Infrastructure Dongle Knowledge Recycling Human Error IT service Heating/Cooling Mobile Office MSP Scalability Social Permissions Assessment Time Management Legislation Identity Application Update Typing FCC Smart Tech PowerPoint Firefox Managing Stress Managed Services Cabling Distributed Denial of Service Alerts Service Level Agreement Digital Payment Experience Unified Communications eWaste Device BDR Servers Deep Learning Humor Running Cable Migration Hacks Fraud Internet Exlporer Politics LED Network Management Comparison Managed IT Cryptocurrency Title II Connectivity Virtual Desktop Onboarding Techology Budget SharePoint Collaboration Cables Laptops Managed IT Service Modem Hard Drives Buisness Slack Digital Lenovo How To Licensing Continuity Mobility Google Maps Bring Your Own Device sip Lithium-ion battery Charging Mail Merge Value Tech Support IT solutions Smart Office Co-Managed IT Specifications Compliance Software as a Service Disaster Shortcut Bitcoin Network Congestion Online IoT Computer Care Digital Signage Unified Threat Management Downloads IT Technicians File Sharing Wires Break Fix Cookies Refrigeration Samsung 5G Monitoring Spyware Superfish Information Technology Cooperation User Solar Print Toner Statistics Best Practice telephony Black Market Point of Sale Regulation Mobile Computing Law Enforcement Physical Security Travel Notifications CrashOverride Upgrades Twitter Botnet Supercomputer Gadget Staffing Motion Sickness Crowdsourcing Taxes 3D Printing Personal Information Administrator Web Server Emergency Machine Learning IT Budget GPS Printers IT Consultant Unsupported Software Computer Repair Processors Cameras Relocation Tracking Meetings Cleaning Mobile Data Health Alert CCTV Private Cloud Webcam Windows 7 Domains Emoji Work/Life Balance Electronic Medical Records Error