Haber Group Blog

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.
What You Need to Know About PCI Compliance

What You Need to Know About PCI Compliance

The days of the cash-only business are over. It doesn’t matter if your business is a multinational corporation or you cut grass for a living, accepting payment cards is not only convenient for your customers, most of the time it’s the most secure way to get paid. In an effort to protect the personal and financial information of consumers who have come to depend on their payment cards, the banks that back the credit card industry have developed a regulation that businesses who process cards...

read more
Tip of the Week: Changing Your Notification Settings on Android Devices

Tip of the Week: Changing Your Notification Settings on Android Devices

Notifications are one of the Android mobile platform’s most-often-used functions, but they can perhaps also detract from workplace focus the most. To help limit these interruptions, we’re dedicating this week’s tip to better managing these notifications for your productivity. To begin, check the version of Android that you  have installed. A few of these tips will require that you’re using Android 10, and some may not work on all devices. Interacting with Your Android Notifications How to...

read more
Not All Cybersecurity Efforts Work to Keep You Secure

Not All Cybersecurity Efforts Work to Keep You Secure

There are many security buzzwords that come into play when the technology available to help secure a business is discussed. The problem is that many of these buzzwords sound great but are actually very poor fits to the real needs of most small and medium-sized businesses. Let’s consider how these buzzwords play into the concept of “security theater” and how this can impact businesses negatively. “Security Theater” Coined by cybersecurity technologist Bruce Schneier in the early 2000s,...

read more
What to Do if a Hacker Threatens You

What to Do if a Hacker Threatens You

What to Do if a Hacker Threatens You / What Would You Do if You Were Extorted? What would you do if you were contacted by a hacker threatening to publish compromising information about you? This may seem like a hypothetical question, but this extortion tactic is widely used by hackers today and brings in big bucks. Typically, the hacker threatens to reveal your account details or a sensitive photo or a video of you, so you give into his demands, which can...

read more
How Do Large Companies Back Up Their Data / Maintaining Safe Access to Any Volume of Files

How Do Large Companies Back Up Their Data / Maintaining Safe Access to Any Volume of Files

Today’s software and hardware systems excel at making work more efficient than ever while housing large volumes of valuable user data for improved growth, but how do large companies back up their data? This is an important question considering the amount of data used on a daily basis. Maintaining an up-to-date copy helps large enterprises maintain access to any type of file to stay on course and remain fully committed to growth. And safely maintaining user data helps them better understand...

read more