by Charlie | Oct 8, 2020 | Blog, Haber Group Blog
Are your company’s policies and procedures documented? If not, they should be. Having a policy and procedure manual will act as an easy-to-distribute guide to educate your staff on the expectations you have for them. It will also provide a physical document that can...
by Charlie | Oct 8, 2020 | Blog, Haber Group Blog
Hold onto your hats folks, this article is a rollercoaster. It has been recently discovered that a totally innocuous photograph is causing smartphones to break when set as the wallpaper. Is this some new malicious type of malware? Are dastardly hackers behind this...
by Charlie | Oct 8, 2020 | Blog, Haber Group Blog
The days of the cash-only business are over. It doesn’t matter if your business is a multinational corporation or you cut grass for a living, accepting payment cards is not only convenient for your customers, most of the time it’s the most secure way to get paid. In...
by Charlie | Oct 8, 2020 | Blog, Haber Group Blog
Notifications are one of the Android mobile platform’s most-often-used functions, but they can perhaps also detract from workplace focus the most. To help limit these interruptions, we’re dedicating this week’s tip to better managing these notifications for your...
by Charlie | Oct 8, 2020 | Blog, Haber Group Blog
There are many security buzzwords that come into play when the technology available to help secure a business is discussed. The problem is that many of these buzzwords sound great but are actually very poor fits to the real needs of most small and medium-sized...
by Charlie | Oct 8, 2020 | Blog, Haber Group Blog
What to Do if a Hacker Threatens You / What Would You Do if You Were Extorted? What would you do if you were contacted by a hacker threatening to publish compromising information about you? This may seem like a hypothetical question, but this extortion tactic is...