Your IT Support Experts

We partner with many types of businesses in the area, and strive to eliminate IT issues before they cause expensive downtime, so you can continue to drive your business forward. Our dedicated staff loves seeing our clients succeed. Your success is our success, and as you grow, we grow.

Free Consultation

Interested in seeing what we can do for your business? Contact us to see how we can help you! Sign Up Today

Haber Group Blog

Charles Haber has been a technology expert for small businesses in general, and the AEC industry specifically for over 25 years.  15 Years ago, he founded Haber Group to provide technology services that combine business needs with the human factor.

How Do Large Companies Back Up Their Data / Maintaining Safe Access to Any Volume of Files

How Do Large Companies Back Up Their Data / Maintaining Safe Access to Any Volume of Files

Today’s software and hardware systems excel at making work more efficient than ever while housing large volumes of valuable user data for improved growth, but how do large companies back up their data? This is an important question considering the amount of data used on a daily basis. Maintaining an up-to-date copy helps large enterprises maintain access to any type of file to stay on course and remain fully committed to growth. And safely maintaining user data helps them better understand their audience, recognize trends, and offer services that better fit their customers’ needs. Keeping systems safe and secure is more important than ever to a company’s value and growth.

0 Comments
Continue reading

What to Do if a Hacker Threatens You

What to Do if a Hacker Threatens You

What to Do if a Hacker Threatens You / What Would You Do if You Were Extorted?

What would you do if you were contacted by a hacker threatening to publish compromising information about you? This may seem like a hypothetical question, but this extortion tactic is widely used by hackers today and brings in big bucks. Typically, the hacker threatens to reveal your account details or a sensitive photo or a video of you, so you give into his demands, which can be a frightening experience, but in truth, you don’t need to worry. The emails may look real, but they aren’t. And they can be a GOOD thing. You learn more about your online security than you would know if you hadn’t been contacted. If it contains any passwords, you will be in the best position to learn what passwords to change so you protect yourself from the real online threats lurking deeper in the web.

0 Comments
Continue reading

Not All Cybersecurity Efforts Work to Keep You Secure

Not All Cybersecurity Efforts Work to Keep You Secure

There are many security buzzwords that come into play when the technology available to help secure a business is discussed. The problem is that many of these buzzwords sound great but are actually very poor fits to the real needs of most small and medium-sized businesses. Let’s consider how these buzzwords play into the concept of “security theater” and how this can impact businesses negatively.

0 Comments
Continue reading

Tip of the Week: Changing Your Notification Settings on Android Devices

Tip of the Week: Changing Your Notification Settings on Android Devices

Notifications are one of the Android mobile platform’s most-often-used functions, but they can perhaps also detract from workplace focus the most. To help limit these interruptions, we’re dedicating this week’s tip to better managing these notifications for your productivity.

0 Comments
Continue reading

What You Need to Know About PCI Compliance

What You Need to Know About PCI Compliance

The days of the cash-only business are over. It doesn’t matter if your business is a multinational corporation or you cut grass for a living, accepting payment cards is not only convenient for your customers, most of the time it’s the most secure way to get paid. In an effort to protect the personal and financial information of consumers who have come to depend on their payment cards, the banks that back the credit card industry have developed a regulation that businesses who process cards need to adhere to. Today, we will go over this regulation and how it affects small and medium-sized businesses.

0 Comments
Continue reading

Careful, This Wallpaper will Brick Your Phone. Wait, What?

Careful, This Wallpaper will Brick Your Phone. Wait, What?

Hold onto your hats folks, this article is a rollercoaster. It has been recently discovered that a totally innocuous photograph is causing smartphones to break when set as the wallpaper. Is this some new malicious type of malware? Are dastardly hackers behind this exploit? 

It’s a much crazier story. Let’s take a look

0 Comments
Continue reading

Tip of the Week: Put Policies in Writing for More Impact

Tip of the Week: Put Policies in Writing for More Impact

Are your company’s policies and procedures documented? If not, they should be. Having a policy and procedure manual will act as an easy-to-distribute guide to educate your staff on the expectations you have for them. It will also provide a physical document that can be referenced if employees have questions about anything pertaining to your business. Today, we will give you a few tips on how to best go about completing an employee handbook for your business. 

0 Comments
Continue reading

What You Can Integrate with Your Business’ CRM Solution

What You Can Integrate with Your Business’ CRM Solution

To succeed in business, you need to cultivate relationships with the people you call your prospects and clients. Like any relationship, this takes a lot of work, never mind the fact that you’re dealing with hundreds instead of just one. However, there is a solution to help you with this, called a CRM, and its integrations offer nothing but benefit. Let’s discuss.

0 Comments
Continue reading

Get the Most Value Out of Your IT Budget

Get the Most Value Out of Your IT Budget

Businesses of all sizes have budgetary considerations to observe, so it is crucial that any investments into their operations are optimized to meet each business’ individual goals. With the assistance of a managed service provider, this process is simplified. Let’s go over a few ways that a business can push its IT investment further, especially if it has subscribed to managed services.

0 Comments
Continue reading

Tip of the Week: Time Management that Really Works

Tip of the Week: Time Management that Really Works

You can make more money, but you can’t make more time. Making the most of your time at work isn’t always easy. There are all types of unexpected distractions that take up a lot of time, so you should know what works to help you get the most out of the time you do have. Today, we present three considerations that will help you manage your time better.

0 Comments
Continue reading

Yeah, There’s a Reason Some Scams are So Obvious

Yeah, There’s a Reason Some Scams are So Obvious

We’ve all seen them: the scam emails that are so obviously a scam, you have no idea why a scammer or a cybercriminal would even bother sending them. It just so happens that there is a very good reason that criminals continue to use these transparent attacks, as they have done for centuries.

0 Comments
Continue reading

What If Your Team is Burning Out at Home?

What If Your Team is Burning Out at Home?

As businesses everywhere are now operating with a remote workforce, many are seeing an issue common enough in the office settling in with their at-home employees: burnout. Let’s examine this phenomenon and see what can be done to avoid it.

0 Comments
Continue reading

Tip of the Week: Simplify Your Processes with Workspaces in Google Drive!

Tip of the Week: Simplify Your Processes with Workspaces in Google Drive!

To consolidate their tools, numerous businesses have adopted the centralized benefits of software suites and comprehensive cloud services, like Google’s G Suite offering. However, while all these files and resources may be available through a single service in G Suite, they could easily be stored in far different locations. For this week’s tip, we’re going over how you can fix this by using the Google Drive feature known as Workspaces.

0 Comments
Continue reading

Social Media Services Under Fire

Social Media Services Under Fire

More than three-and-a-half billion people are active social media users, making it one of the best inventions of the 21st century. Recently, however, Twitter, one of the most used social media platforms in the world, got into some hot water when it labeled a tweet from President Donald Trump as having “potentially misleading information”. He then responded by signing an executive order condemning this action as a method of censorship. Let’s briefly unpack this issue.

0 Comments
Continue reading

How Secure is Your Data, Really?

How Secure is Your Data, Really?

Internet-based companies have access to an audience that, at the very least, are extremely trusting of them. There is an expectation that these businesses will fulfill their promises while also protecting the information that their customers and clients provide to them, but are these expectations well-founded? Let’s consider common collection practices companies deploy and how you can keep yourself safe.

0 Comments
Continue reading

Tip of the Week: Keyboard Shortcuts You May Not Have Known

Tip of the Week: Keyboard Shortcuts You May Not Have Known

It can’t be denied that the Internet browser is one of the most utilized pieces of software on any workstation, mobile device, or computer of any kind. With so much time spent inside the browser, we thought that we would share some shortcuts that you probably don’t know exist.

0 Comments
Continue reading

What to Focus On as You Train Your Team

What to Focus On as You Train Your Team

Information technology is an incredibly important facet to any modern workplace, which means that your team needs to know how to properly handle the IT you have in place. Here are a few key practices that you need to ensure your team is up to speed on:

0 Comments
Continue reading

Make IT Security a Priority for Your Business

Make IT Security a Priority for Your Business

With so many people working from home due to stay-at-home orders resulting from the COVID-19 pandemic, IT security may not be at the forefront of users’ minds. Unfortunately, scammers and hackers aren’t unemployed during this time and are still causing havoc for businesses of all sizes. Let’s take a look at cybersecurity during COVID-19.

0 Comments
Continue reading

Tip of the Week: Should You Unplug Your Laptop While in Use?

Tip of the Week: Should You Unplug Your Laptop While in Use?

Businesses have been leaning more towards using laptops for their computing needs, thanks to the mobility that they offer while also offering comparable performance to modern desktops. There is an important question that you should be asking, though: can a laptop be left plugged in whenever it is left in one spot? Let’s find out for this week’s tip.

0 Comments
Continue reading

Improve Your Email Management in Outlook

Improve Your Email Management in Outlook

We all use email, in fact, without an email account you couldn’t do much of anything online. For those that use it for business, it can be a complete drag, often hindering as much as it helps. Microsoft has improved their Outlook platform with some useful features aimed at cutting down on the time that you have to stare at your email. Let’s take a look at two options you can use to get the most out of your email in Outlook:

0 Comments
Continue reading

News & Updates

Haber Group is proud to announce the launch of our new website at www.habergroup.com The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Contact Us

Learn more about what Haber Group can do for your business.

Haber Group
39 West 38th Street Suite 9E
New York, New York 10018