Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

0 Comments
Continue reading

Net Neutrality Still Needs Your Help!

Net Neutrality Still Needs Your Help!

December 14th is the last day that our government representatives can vote whether or not to continue the Internet’s protection under the net neutrality rules established in 2015. Without these rules in place, your data can be analyzed by your Internet service provider, and they are free to act on that knowledge and manipulate your Internet in support of their own interests.

0 Comments
Continue reading

Unpaid Invoices are a Major Problem For SMBs

Unpaid Invoices are a Major Problem For SMBs

While many different people open businesses, the primary reason that they all do so is to make money. A positive cash flow is essential if the business is to generate funds that support a cause or provide a decent living. However, to collect this cash flow, a business must have their invoices returned. As it happens, this doesn’t often occur in a timely manner.

0 Comments
Continue reading

How Technology Allows Fake News to Spread

How Technology Allows Fake News to Spread

In today’s political, social, and economic environment, information is more valuable than ever. However, this increased importance, paired with the speed that data can be dispersed via the Internet, has enabled many to use false information to manipulate the general public into agreeing with their views and acting upon them.

0 Comments
Continue reading

Getting Back to Basics with Data Backup

Getting Back to Basics with Data Backup

It’s no industry secret that one of the most important pieces of IT any business should have is a data backup solution. However, this is like saying that every business should have a plant: the type of plant, and (by extension) the type of data backup, matters. You want a data backup that is more like a peace lily or a cactus, hardy and resilient, and less like a basil plant or orchid, high-maintenance and requiring very specific conditions to prosper.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Hackers Privacy Technology Business Email Malware Internet Hosted Solutions Microsoft Windows 10 Computer Business Computing Backup Small Business Ransomware Software IT Services Hardware Network Security Smartphone Windows Google User Tips Productivity Android Data Browser Data Management Upgrade Smartphones Saving Money Mobile Devices Gmail Phishing Business Continuity Facebook App Office 365 Outsourced IT Cloud Computing Workplace Tips Data Recovery Efficiency Managed IT Services Microsoft Office Big Data Office Tips Tip of the week IT Support Word Artificial Intelligence Internet of Things Remote Monitoring Apple Settings Content Filtering Cybersecurity Employer-Employee Relationship Robot Risk Management WiFi Innovation Spam Miscellaneous Data storage Productivity Social Media Firewall Money Customer Service Disaster Recovery IT Support Managed Service Provider Government Server Network Data Backup Hosted Solution Mobile Device Antivirus YouTube communications Printing Safety Computing Google Drive The Internet of Things LiFi Windows 10 End of Support Chrome IBM Tablet Analytics Wireless Save Money Apps Customer Relationship Management Outlook Hacking Search SaaS Virtual Private Network Passwords Administration Presentation Hacker Unified Threat Management Avoiding Downtime VoIP Monitors Two-factor Authentication Managed IT Services Office Password Mouse IT Management Wireless Technology Telephone Systems Recovery Encryption Maintenance Cortana User Error Quick Tips Website Bluetooth Mobile Office Storage Business Growth Cyber Monday Downtime Communication Corporate Profile Computer Care Hard Drives Current Events Legal Vendor Management Printer VoIP Mobile Device Management Dark Data Alt Codes Cybercrime Smart Technology Writing WannaCry Training Refrigeration Going Green Automobile Knowledge Access Control Time Management Public Speaking Lithium-ion battery Cabling Typing Distributed Denial of Service Retail Business Technology Augmented Reality Data loss Operating System Unified Communications Experience SharePoint Network Management Managed IT Infrastructure Cryptocurrency Running Cable Managed IT Service Virtual Desktop Social Engineering Lenovo Fun Digital Undo Business Management Downloads Touchscreen Shortcut Disaster Application Bitcoin Gadgets Laptop Break Fix Superfish Spyware Virtualization Information Technology Politics Google Docs Collaboration Multi-Factor Security Patch Management Uninterrupted Power Supply Windows 8 Users Halloween Dark Web How To Scam Google Wallet File Sharing Google Calendar Network Congestion Net Neutrality Vulnerability Solid State Drive Samsung Scary Stories Websites Bandwidth Networking How To Drones Heating/Cooling IT service User Virtual Reality Legislation Computers FCC VPN Wi-Fi Hard Disk Drive Social Sports Education Data Security Firefox Competition Servers Humor BDR Deep Learning Comparison Display Title II 5G Hacks Budget Techology Server Management sip Google Maps Bring Your Own Device Specifications Buisness Online Mail Merge Marketing IT solutions Unified Threat Management Digital Payment Statistics IP Address telephony Best Practice Black Friday Automation Microsoft Excel Address BYOD Private Cloud Mobile Data Webcam Emoji Work/Life Balance Error Domains Point of Sale Black Market Emergency Law Enforcement Physical Security Paperless Office Twitter Staffing Gadget Administrator Personal Information Web Server Remote Computing GPS Holiday Computer Repair Cameras Processors Tracking Health CCTV Alert Tech Support CrashOverride Document Management Electronic Medical Records Identity Theft Travel G Suite Notifications Botnet Upgrades Supercomputer Motion Sickness Taxes Crowdsourcing Machine Learning 3D Printing IT Budget Update IT Consultant Relocation Unsupported Software Meetings Chromebook Cleaning Mobile Computing