Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Don’t Get Faced by FaceTime

Tip of the Week: Don’t Get Faced by FaceTime

Sometimes threats come from the most unlikely places. One such threat came in the form of Apple’s FaceTime app, which gives users the ability to spy on others without their consent through group FaceTime calls. Even though a patch has been issued that solves the problem, it’s still worth reflecting on.

0 Comments
Continue reading

Tip of the Week: Are You Using the Right Software?

Tip of the Week: Are You Using the Right Software?

Businesses that have been around the block a time or two may have discovered specific software titles that yield little-to-no results. Some might even be security risks that you simply aren’t willing to expose your data to. The free or cheap software found by some organizations to make up for operational deficiencies don’t always cut it, and some can even put your business at risk. This week’s tip is dedicated to finding the best software for your business.

0 Comments
Continue reading

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

0 Comments
Continue reading

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

0 Comments
Continue reading

Your Search Bar Is Now More Secure

Your Search Bar Is Now More Secure

August saw yet another Patch Tuesday designed to resolve security issues in Microsoft products. Out of the 48 vulnerabilities resolved, 15 affected Windows, while 25 were rated as critical, 21 as important, and 27 that allowed for remote code execution. This might sound a little overwhelming, so we’ll try to simplify it a bit--a lot of flaws were fixed, and the majority of them can be considered dangerous for your organization.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers User Tips Microsoft Business Computing Malware Computer Network Security Hosted Solutions Google Productivity Software Internet Tech Term Communication Data Small Business Backup Mobile Devices Efficiency IT Services Ransomware Workplace Tips Hardware Windows 10 Smartphone Cloud Computing Microsoft Office Saving Money Android Data Recovery IT Support Office 365 Upgrade Productivity Browser Business Continuity Users Social Media Information Managed IT Services Gmail Windows Data Management Facebook Data Backup Server Phishing Internet of Things Word Managed IT Services Innovation Mobile Device Miscellaneous Smartphones Disaster Recovery Outsourced IT Passwords App Windows 10 Vulnerability Cybersecurity communications Artificial Intelligence Business Management Managed Service Provider Remote Monitoring Employer-Employee Relationship VoIP Encryption Network Chrome Content Filtering Tip of the week Analytics Spam IT Support Website Big Data Managed Service Government Money Apps BYOD Applications Infrastructure Save Money Office Tips Apple Virtual Reality Hacker Gadgets Virtualization Tablet Data storage Paperless Office Display Bandwidth YouTube Employee-Employer Relationship Antivirus Education Unified Threat Management VPN Risk Management Access Control Robot Wireless Printing Router Automation Development Firewall Augmented Reality IT Management Customer Service WiFi Maintenance Avoiding Downtime The Internet of Things Settings Two-factor Authentication Retail Hosted Solution Recovery SaaS Solid State Drive Networking Company Culture Outlook Monitors Holiday Search Hard Disk Drive Data Security HIPAA IBM Data loss Business Technology Virtual Private Network Administration Operating System Chromebook Mobile Device Management OneNote Collaboration Customer Relationship Management End of Support Hacking Wi-Fi Computing Server Management Bring Your Own Device Password Mobile Security Document Management Touchscreen Google Drive Laptop Mouse Vendor Management Presentation Telephone Systems LiFi Safety Office Quick Tips Computers Downtime Scam Wireless Technology Business Intelligence Storage Analysis Employee-Employer Relationships Corporate Profile Current Events Language USB Optimization Streaming Cyber Monday Social Networking Scary Stories Blockchain Cost Management Troubleshooting VoIP Legal Google Calendar Chatbots IP Address Cybercrime FinTech iOS Screen Reader National Security How To Drones Business Analysis Printer Wearable Technology Security Cameras Alt Codes Dark Data Net Neutrality Students WannaCry Going Green Social Engineering Computing Infrastructure Dongle Knowledge Recycling Human Error IT service Heating/Cooling Smart Technology Motherboard Remote Computing Sports Social Hard Drives Permissions Assessment Time Management Legislation Identity Update Mobile Office MSP Scalability FCC Smart Tech PowerPoint Updates Firefox Managing Stress Managed Services Cabling Typing Mixed Reality Alerts Service Level Agreement Digital Payment Experience Unified Communications eWaste Device BDR Servers Deep Learning Humor Distributed Denial of Service Hacks Refrigeration Fraud Internet Exlporer Politics LED Network Management User Comparison Running Cable Migration Title II Connectivity Virtual Desktop Onboarding Techology Budget Public Speaking SharePoint Cables Laptops Managed IT Cryptocurrency Buisness Slack Data Breach Digital Lenovo How To Competition Licensing Private Cloud Continuity Mobility Google Maps sip Managed IT Service Modem Mail Merge Value Tech Support IT solutions Smart Office Co-Managed IT Specifications Compliance Lithium-ion battery Charging Online IoT Computer Care Digital Signage GDPR Unified Threat Management Downloads IT Technicians File Sharing Wires Software as a Service Disaster Shortcut Bitcoin Network Congestion 5G Monitoring Hard Disk Drives Spyware Superfish Information Technology Cooperation Solar Print Toner Statistics Best Practice telephony Break Fix Cookies Samsung Messaging Address Writing Undo Hotspot Professional Services Websites Identity Theft Cortana Work Content Google Docs Black Friday Regulations Halloween Marketing Microsoft Excel Star Wars Training Fun Desktop Data Warehouse User Error Multi-Factor Security Mirgation Voice over Internet Protocol Entertainment Uninterrupted Power Supply Patch Management Windows 8 G Suite Spying Solid State Drives Google Wallet Staff Automobile Shortcuts Bluetooth Business Growth Application Dark Web Nanotechnology Botnet Supercomputer Twitter Gadget Staffing Motion Sickness Crowdsourcing Taxes 3D Printing Personal Information Administrator Emergency Machine Learning IT Budget Web Server GPS Printers IT Consultant Unsupported Software Domains Computer Repair Relocation Processors Cameras Tracking Meetings Cleaning Mobile Data Health Alert CCTV Emoji Webcam Windows 7 Work/Life Balance Electronic Medical Records Error Mobile Computing Black Market Point of Sale Regulation Law Enforcement Physical Security Travel Notifications CrashOverride Upgrades