Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Foldable Screens Enter Smartphone Market

Foldable Screens Enter Smartphone Market

There have been whispers for years about manufacturers using flexible OLED (organic light-emitting diode) displays to create devices that were flexible enough to fold in half. As late as 2018, that’s all they were...whispers. In the subsequent year, to the surprise of many industry professionals, several manufacturers have committed to creating foldable devices. We’ll look at the technology behind these devices and tell you about which foldable devices are going to be available in 2019.

0 Comments
Continue reading

Security Is a Big Component of Windows 10

Security Is a Big Component of Windows 10

With Microsoft betting on Windows 10 to be their #1 OS for the foreseeable future, it is important for them to be able to sufficiently protect their users from the growing threats looking to make life difficult for businesses from all over the world. Today, we will take a look at Windows 10 Enterprise Security, and how it works to protect businesses from harm.

0 Comments
Continue reading

Tip of the Week: This Is What Should You Do When Your Smartphone Gets Wet

Tip of the Week: This Is What Should You Do When Your Smartphone Gets Wet

Mistakes happen, especially with smartphones. Whether you’re dropping it on the floor, in the toilet, or in a puddle, there’s no shame in making this mistake. Granted, when this does occur, you need to act fast. Any water in, on, or around your device isn’t recommended, but let’s talk about what happens when you’re thrown into a worst-case scenario.

0 Comments
Continue reading

Are the Messaging Apps You Use Secure?

Are the Messaging Apps You Use Secure?

Messaging applications are critical to the success of the modern business, but it’s important that they don’t compromise security in the pursuit of convenience. There is a specific set of criteria involved with ensuring that your chosen messaging applications are secure.

0 Comments
Continue reading

Clarifying a Few IT Stereotypes

Clarifying a Few IT Stereotypes

We’ve long accepted that, as an IT provider, there are a lot of stereotypes about what we can do and how we do it. Yet, just because we’ve accepted it, doesn’t mean we aren’t going to do anything about it. That’s why we wanted to use this blog post to clear up a few misconceptions about the nature of IT services.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business Malware User Tips Computer Business Computing Internet Network Security Microsoft Google Productivity Tech Term Software Hosted Solutions Efficiency IT Services Communication Mobile Devices Small Business Hardware Smartphone Data Ransomware Backup Windows 10 Android IT Support Productivity Microsoft Office Saving Money Workplace Tips Managed IT Services Data Management Cloud Computing Browser Business Continuity Data Recovery Managed IT Services Windows Gmail Data Backup Innovation Facebook Server Upgrade Internet of Things Outsourced IT App Windows 10 Passwords Office 365 Users Smartphones Disaster Recovery Phishing Word Artificial Intelligence Business Management Employer-Employee Relationship Encryption Mobile Device Chrome Vulnerability Cybersecurity communications Social Media Remote Monitoring Managed Service Provider VoIP Government Money Applications Office Tips Network BYOD Managed Service Hacker Tip of the week Content Filtering Information Big Data Miscellaneous Spam Apple Website Analytics IT Support Infrastructure Access Control IT Management Router Firewall Customer Service Robot Printing Maintenance Automation Employee-Employer Relationship WiFi Settings Two-factor Authentication Tablet Avoiding Downtime The Internet of Things Bandwidth Antivirus YouTube Save Money Virtual Reality Risk Management Paperless Office Wireless Data storage Display Wi-Fi Unified Threat Management Touchscreen HIPAA Outlook Holiday Laptop Business Intelligence Monitors Hacking Augmented Reality Telephone Systems Chromebook Safety Company Culture Quick Tips Operating System End of Support Scam Mobile Security Presentation Downtime Computing Document Management Password Office Hosted Solution Google Drive Gadgets Networking Mouse Vendor Management Wireless Technology Development Virtualization Recovery LiFi VPN Computers Data Security Search Education Data loss Business Technology IBM Storage Retail SaaS Virtual Private Network Mobile Device Management Administration Apps Server Management Customer Relationship Management FCC Smart Tech Buisness Going Green Voice over Internet Protocol Social Engineering Entertainment Refrigeration Update Desktop User Mail Merge Lithium-ion battery Social Shortcuts Unified Threat Management Alerts Service Level Agreement IT solutions Spying Public Speaking Disaster Shortcut Distributed Denial of Service Digital Payment Spyware Superfish Fraud Internet Exlporer Analysis Competition Statistics Comparison Typing Optimization Streaming Title II Connectivity 5G FinTech iOS SharePoint Deep Learning Humor Troubleshooting Politics Address Halloween Hacks Security Cameras Collaboration User Error Licensing Cortana Uninterrupted Power Supply Patch Management Managed IT Service Modem Human Error Value Fun Budget Bluetooth Specifications Compliance Cryptocurrency Recycling Online IoT MSP How To Scalability Undo Downloads IT Technicians Bring Your Own Device sip Tech Support Corporate Profile Scary Stories Managing Stress Marketing Managed Services File Sharing VoIP Cooperation PowerPoint Computer Care Solid State Drive Break Fix Cookies Bitcoin eWaste Network Congestion Device Application How To Hotspot Professional Services Samsung Black Friday Regulations IP Address Cybercrime WannaCry Microsoft Excel Star Wars Information Technology Migration IT service Heating/Cooling Multi-Factor Security Mirgation Best Practice telephony LED Websites Identity Theft Nanotechnology Sports Cables Writing Laptops Time Management Staff Knowledge Google Docs Onboarding Training Hard Disk Drive Dark Web Windows 8 Continuity Mobility Automobile Firefox Language USB Slack G Suite Cabling Cyber Monday Social Networking Mobile Office Blockchain Cost Management Google Wallet Charging BDR Servers Google Calendar Chatbots Business Growth Smart Office Co-Managed IT Net Neutrality Screen Reader Current Events Wires Software as a Service Hard Drives Network Management Printer Wearable Technology Experience Unified Communications Digital Signage Running Cable Solar Print Toner Techology Computing Infrastructure Dongle Legal Monitoring Managed IT Smart Technology Motherboard Digital Lenovo Permissions Assessment Virtual Desktop Drones Messaging Remote Computing Google Maps Legislation Identity Alt Codes Work Dark Data Content GPS Computer Repair IT Consultant Relocation Unsupported Software Processors Cameras Meetings Tracking Health Cleaning Private Cloud CrashOverride Mobile Data Alert CCTV Emoji Webcam Printers Electronic Medical Records Work/Life Balance Error Emergency Black Market Point of Sale Mobile Computing Travel Law Enforcement Physical Security Notifications Upgrades Windows 7 Twitter Botnet Supercomputer Motion Sickness Gadget Staffing Personal Information Administrator Domains Crowdsourcing Taxes Machine Learning IT Budget Regulation 3D Printing Web Server