Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The changing face of Security

Introduction

Ah I remember the good old days, when all we needed was a good antivirus on each computer and a basic firewall (or even a home router).

Well, like our youth, those days are behind us.  We live in an ever increasing, ever changing world of security threats to our data and our businesses.  Monetizing cyber-crime has become a huge business! 

When any service-based industry matures, what develops is another industry to service them.  As an example, Haber Group is an IT company that services their clients (the end user) directly.  As our industry has grown and matured, there are now IT companies that have changed their business model to provide services to companies like Haber Group and don’t deal with end users at all.  It’s become the same in the Malware world.  It used to be that hackers and criminals wrote and created their tools.  Today, some kid in eastern Europe only had to download a toolkit and can start creating new viruses/trojans/malware, etc. 

In this article and in future articles we will share our thoughts, experiences and ideas on what you need to know about the technology world that we live and work in.  Some of the topics will be: 

  • Next generation endpoint protection. What you traditionally thought of as your anti-virus
  • Email threat protection. What you traditionally thought of as your anti-spam
  • Gateway Protection. What can be done at the firewall level
  • Two-Factor Authentication (2FA). A password is not enough
  • Protection outside of the firewall

In addition, we’ll be sharing our thoughts on other technologies that impact your business.

  • “The server is dead. Long live the server.”  How the latest cloud file server technologies can impact your workflow and free you from being connected to the office
  • Disaster planning and preventing down time

This is a fascinating, on-going process where we are always evaluating the “state of the technology”.  We continue to update our best practices and what we recommend to our clients.  Overall our goals are to:

  • Increase security
  • Increase functionality and flexibility
  • Reduce/Simplify technology infrastructure
  • Keep costs down

We build the model, test it, implement internally and then bring it to our clients.   If you like hearing about this and want to hear more, let me know.

Charlie Haber…

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 13 December 2017

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Hackers Privacy Technology Email Malware Business Internet Hosted Solutions Microsoft Computer Business Computing Windows 10 Backup Small Business IT Services Software Ransomware User Tips Network Security Productivity Windows Hardware Google Smartphone Data Browser Android Data Management Gmail App Phishing Facebook Office 365 Upgrade Saving Money Smartphones Mobile Devices Business Continuity Data Recovery Internet of Things Outsourced IT Microsoft Office Big Data Word Tip of the week Managed IT Services Efficiency Remote Monitoring Office Tips Workplace Tips Cloud Computing IT Support Artificial Intelligence Cybersecurity Money Government Disaster Recovery WiFi Managed Service Provider Spam Miscellaneous Apple Social Media Settings Content Filtering Firewall Customer Service Robot Risk Management IT Support Innovation Server Productivity Data storage Employer-Employee Relationship Antivirus Search Unified Threat Management Monitors Safety Administration The Internet of Things VoIP Password Mouse Mobile Device Encryption Network IBM Wireless Windows 10 Apps Hosted Solution Customer Relationship Management Tablet Hacking YouTube communications Passwords Presentation Printing Hacker Avoiding Downtime Two-factor Authentication Office Virtual Private Network Wireless Technology Computing End of Support Recovery Google Drive Managed IT Services LiFi IT Management Telephone Systems Save Money Maintenance Chrome Analytics Data Backup SaaS Outlook Social Sports Smart Technology Augmented Reality Education WannaCry Humor Deep Learning Access Control Time Management Digital Payment Undo Cabling Hacks Distributed Denial of Service Fun Business Technology Data loss Budget sip BYOD Gadgets Bring Your Own Device Automation SharePoint Network Management Application Managed IT Virtualization Infrastructure Buisness Managed IT Service IT solutions Lenovo Digital telephony Users Best Practice Communication Downloads Computer Care Touchscreen Shortcut Disaster Vendor Management Break Fix Cortana Superfish Spyware Storage Business Growth Writing Multi-Factor Security Training Patch Management Automobile Uninterrupted Power Supply Current Events Downtime Dark Web Scam User Legal Dark Data Alt Codes Retail Cybercrime Google Calendar Wi-Fi Vulnerability Competition Solid State Drive Going Green Net Neutrality Knowledge Networking How To IT service Typing Social Engineering Legislation 5G Heating/Cooling VPN Business Management Hard Disk Drive FCC Unified Communications Experience Data Security Firefox Operating System Politics BDR Marketing Cryptocurrency Running Cable Comparison Servers Collaboration Virtual Desktop Title II Techology IP Address Google Maps Bitcoin How To Laptop Specifications Server Management Mail Merge Website File Sharing Information Technology Online Network Congestion Unified Threat Management Mobile Office Google Docs Samsung Hard Drives Websites Windows 8 Halloween Black Friday Statistics Microsoft Excel Address Google Wallet Virtual Reality Computers User Error Mobile Device Management Quick Tips Bluetooth Refrigeration Scary Stories Cyber Monday Public Speaking Corporate Profile Drones Bandwidth Display Printer Lithium-ion battery VoIP IT Budget Machine Learning 3D Printing Emergency Update IT Consultant Relocation Unsupported Software Meetings Chromebook Cleaning Private Cloud Mobile Data Webcam Emoji Work/Life Balance Error Mobile Computing Point of Sale Black Market Law Enforcement Physical Security Paperless Office CrashOverride Twitter Gadget Staffing Administrator Personal Information Web Server Remote Computing Holiday GPS Computer Repair Cameras Processors Tracking Health CCTV Alert Tech Support Document Management Electronic Medical Records Identity Theft Domains Travel G Suite Notifications Supercomputer Botnet Upgrades Motion Sickness Crowdsourcing Taxes