Our Blog: Stuff we think you should know

Charles Haber has been a technology expert for small businesses in general, and the AEC industry specifically for over 25 years.  15 Years ago, he founded Haber Group to provide technology services that combine business needs with the human factor.

Tip of the Week: The Best Data Warehouse for Your Business

Tip of the Week: The Best Data Warehouse for Your Business

The importance of effective data management cannot be overstated in today’s business environment. After all, the data you collect is of little use if you fail to leverage it properly, and successful data leverage starts with choosing where to house it. This week’s tip is dedicated to how and why to utilize a data warehouse for your organization’s needs.

0 Comments
Continue reading

Businesses Can Expect These 5 Benefits from Conferencing Solutions

Businesses Can Expect These 5 Benefits from Conferencing Solutions

Many businesses have begun to take advantage of the benefits that come with having remote workers. One tool that has seen an increase in utilization as a result is a conferencing solution. Communications are extremely important for the growing business, and with a full-featured conferencing tool at your disposal, you can expect to see the following benefits. 

0 Comments
Continue reading

Deepfakes Make It Hard to Believe Your Eyes or Ears

Deepfakes Make It Hard to Believe Your Eyes or Ears

How would you feel if a video of you appeared online, saying things that you never actually said? While you may not be the one targeted by this kind of action, this situation is very real, thanks to a relatively recent development in machine learning and artificial intelligence. Known as “deepfakes,” these videos have made it crucial to examine media from a place of skepticism.

0 Comments
Continue reading

Tip of the Week: How to Keep Control of Your Cloud

Tip of the Week: How to Keep Control of Your Cloud

We always recommend cloud platforms to our clients, especially those who need a central place to host important data and applications. However, it is possible to go too far when implementing cloud services. We’ll discuss how you can monitor your cloud computing costs, as well as how access to cloud solutions can be a detriment to your organization.

0 Comments
Continue reading

The Cloud Isn’t Necessarily Safe

The Cloud Isn’t Necessarily Safe

The Cloud. That big, vague entity where a lot of us our entrusting our information has lifted a huge burden off of businesses by alleviating the need for expensive onsite hardware. It makes user management a little more user friendly. It keeps us connected and in communication no matter where we are.

0 Comments
Continue reading

How the EU’s General Data Protection Regulation is Working After the First Year

How the EU’s General Data Protection Regulation is Working After the First Year

After years of talk about individual data privacy, and years enacting regional laws, the European Union’s flagship individual privacy law, the General Data Protection Regulation went into effect a year ago in May. Suddenly, if your organization does business inside EU member states, you will be under a stringent regulation concerning individual data privacy. Today, we will look at the GDPR and what has changed in the year it has been law.

0 Comments
Continue reading

OneNote 2016 is Dead, Long Live OneNote for Windows, Part II

OneNote 2016 is Dead, Long Live OneNote for Windows, Part II

Microsoft is saying goodbye to OneNote 2016. Although the handy note-taking app will still be supported until October 2020, with extended support for a few more years after, Microsoft has decided to no longer add features to it, and instead, they are focusing on the new version of OneNote that comes bundled with Windows 10.

0 Comments
Continue reading

OneNote 2016 is Dead, Long Live OneNote for Windows, Part I

OneNote 2016 is Dead, Long Live OneNote for Windows, Part I

Microsoft’s handy little note-taking app, OneNote, is gearing up to hit the old dusty trail and retire. At least, that’s the plan for OneNote 2016, whose end of life coincides with the rest of the Office 2016 suite in October, 2020. Fortunately, most of us already have OneNote 2016’s successor installed. Wait, what?

0 Comments
Continue reading

Microsoft SQL Server 2008 and 2008 R2 Approaching End of Life

Microsoft SQL Server 2008 and 2008 R2 Approaching End of Life

A decade-old version of Microsoft’s popular database software SQL Server 2008 and SQL Server 2008 R2 is losing support on July 9,2019. If your business hasn’t moved away from the software, you are looking at a few real pressing problems. Let’s take a look at the software and what options businesses that haven’t moved on from SQL Server 2008 or SQL Server R2 have going forward.

0 Comments
Continue reading

Tech Terminology: API

Tech Terminology: API

It is said that software runs the world, but it wouldn’t necessarily be so without the ability to integrate applications with others. What exactly makes these integrations possible? For this week’s tech term, we will briefly introduce you to the application programming interface, or API; and, why it's so crucial in software development today.

0 Comments
Continue reading

Prioritizing Network Security is a Must

Prioritizing Network Security is a Must

Every business has their version of risk management. Nowadays, with all the technology organizations use for productivity, collaboration, and communications, managing risk can often be difficult. There are numerous threats that come from the Internet that could put a damper on productivity, create inefficiencies, or shut down production entirely. Regardless of how large or small your business is, you need to prioritize the security of your computing network.

0 Comments
Continue reading

Unpatched Windows is Like Leaving Your Car Door Open in a Sketchy Parking Garage at Night with Wads of Cash in the Driver’s Seat

Unpatched Windows is Like Leaving Your Car Door Open in a Sketchy Parking Garage at Night with Wads of Cash in the Driver’s Seat

I recently read a statement from the National Security Agency (NSA) expressing concerns over the risks and vulnerabilities that come with running unpatched versions of older Windows operating systems. First, you know it’s serious if the NSA, an entity in the US who depends on the collection and processing of information, is worried that your personal information is at risk. Second, it’s another in a long line of reasons to not allow your network to fall into such disarray that you can no longer protect it.

0 Comments
Continue reading

How to Make Your Workday Simpler

How to Make Your Workday Simpler

Look, we get it… work isn’t always the most fun thing in the world. In fact, it can often be downright stressful - especially when distractions get in the way. Fortunately for our sanity, there are plenty of ways to help reduce - or even eliminate - this stress. We’ll go over a few of those ways here.

0 Comments
Continue reading

“Paying the Ransom” Isn’t a Ransomware Defense

“Paying the Ransom” Isn’t a Ransomware Defense

Ransomware has become a favorite attack vector for hackers - after all, for them, it’s pretty much a no loss game. They either get paid, or they move on to their next target. Unfortunately, cyberattackers that dispatch ransomware often do get paid, and these payments can sometimes come from a surprising source: cybersecurity firms.

0 Comments
Continue reading

NSA-Developed Malware Used in Third-Party Hack

NSA-Developed Malware Used in Third-Party Hack

Have you ever wondered what happens when hackers gain access to state-developed malware tools? Well, now you don’t have to; a type of malware called Double Pulsar, that has been utilized in the past by the NSA, was bundled with a Chinese hacking tool and used to carry out attacks on Hong Kong and Belgium in 2016. Needless to say, this threat is unnerving.

0 Comments
Continue reading

Tip of the Week: Simple Changes You Can Make to Make Work Easier

Tip of the Week: Simple Changes You Can Make to Make Work Easier

Waking up and going to work is the inevitable reality for billions of people, and sometimes people have a hard time acclimating to a new job. If that job is an office, there are some particular issues you will have to confront in order to get the most out of your time at work. Today, we look at five simple things you can do to make your life easier inside your office.

0 Comments
Continue reading

Google Docs Working on Office Support

Google Docs Working on Office Support

Businesses are expected to make a choice regarding which solutions they will utilize. Typically they choose between Google’s or Microsoft’s productivity solutions. The unfortunate side of the choice is that they are often used exclusively, meaning there was little interoperability between the two. Nowadays, however, Google is moving to allow users to edit Microsoft Office files in Google Docs.

0 Comments
Continue reading

Even Cities Aren’t Immune to Ransomware

Even Cities Aren’t Immune to Ransomware

Ransomware hasn’t let up. It is important to understand that any organization, of any kind, is a potential target of a ransomware attack - and yes, this includes municipalities. In fact, since 2013, over 170 government systems at the county, city, or state levels have been attacked.

0 Comments
Continue reading

Tip of the Week: Overcoming the Hurdles of New Solutions

Tip of the Week: Overcoming the Hurdles of New Solutions

As you have likely realized, the technology solutions that power your business today aren’t going to be effective forever. This means that you will at some point need to upgrade this technology - but this isn’t always as easy as it sounds. Here, we offer a few tips to help you make it over some of the hurdles that a change to your technology can bring.

0 Comments
Continue reading

Protect Your Data Using These Three Methods

Protect Your Data Using These Three Methods

With so much on the line for businesses that deal with sensitive information, security needs to be considered a top priority. Unfortunately, one solution that works for every threat out there doesn’t exist. The right combination of enterprise-level security solutions can help your business secure its important data.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business User Tips Microsoft Malware Business Computing Hosted Solutions Computer Network Security Productivity Software Google Internet Tech Term Communication Data Small Business Mobile Devices Efficiency IT Services Ransomware Backup Workplace Tips Hardware Windows 10 Smartphone Cloud Computing Data Recovery IT Support Microsoft Office Android Saving Money Productivity Office 365 Upgrade Social Media Managed IT Services Information Gmail Windows Data Management Facebook Browser Users Business Continuity Internet of Things Word Managed IT Services Innovation Mobile Device Data Backup Server Phishing Smartphones Disaster Recovery Outsourced IT Passwords App Windows 10 Miscellaneous Business Management Managed Service Provider Remote Monitoring Employer-Employee Relationship VoIP Encryption Network Chrome Vulnerability Cybersecurity communications Artificial Intelligence Managed Service Government Money Apps Infrastructure BYOD Applications Save Money Office Tips Virtual Reality Apple Hacker Gadgets Content Filtering Analytics Tip of the week IT Support Spam Big Data Website Robot Risk Management Wireless Printing Automation Access Control Router Firewall Development Augmented Reality IT Management Customer Service WiFi Avoiding Downtime Maintenance Settings The Internet of Things Two-factor Authentication Paperless Office Virtualization Data storage Tablet Display Bandwidth Antivirus YouTube Unified Threat Management Employee-Employer Relationship VPN Education Data Security IBM Data loss Business Technology Mobile Device Management Chromebook Virtual Private Network HIPAA Administration Operating System Collaboration End of Support Hacking Customer Relationship Management Server Management Wi-Fi Computing Bring Your Own Device Laptop Password OneNote Document Management Google Drive Touchscreen Mouse Vendor Management Telephone Systems Mobile Security Presentation Safety LiFi Computers Office Quick Tips Storage Downtime Scam Wireless Technology Recovery Retail Hosted Solution SaaS Solid State Drive Business Intelligence Networking Outlook Monitors Hard Disk Drive Search Holiday Company Culture Typing Students Cabling Computing Infrastructure Dongle Recycling Human Error Firefox Smart Technology Motherboard BDR Servers Permissions Assessment Legislation Experience Identity Unified Communications Digital Payment Deep Learning Humor MSP Scalability User FCC Running Cable Smart Tech Hacks PowerPoint Updates Refrigeration Politics Managing Stress Managed Services Network Management Cryptocurrency Mixed Reality Managed IT Alerts Virtual Desktop Service Level Agreement Budget eWaste Device Techology Distributed Denial of Service Public Speaking Google Maps Fraud Buisness Internet Exlporer How To LED Digital Lenovo Comparison Competition Private Cloud sip Migration Lithium-ion battery Title II Connectivity Onboarding Mail Merge SharePoint IT solutions Tech Support Cables Laptops File Sharing Bitcoin Network Congestion Slack Data Breach Disaster Shortcut Licensing Computer Care Continuity Mobility Unified Threat Management Managed IT Service Modem Statistics 5G Value Samsung Information Technology Smart Office Co-Managed IT Spyware Superfish Specifications Compliance Best Practice telephony Charging Online Halloween IoT Writing Digital Signage GDPR Address Downloads Cortana Undo IT Technicians Websites Identity Theft Google Docs Wires Software as a Service Windows 8 Monitoring Hard Disk Drives Uninterrupted Power Supply Patch Management Marketing Fun Cooperation Training Solar Print Toner User Error Break Fix Cookies Messaging Bluetooth Application Hotspot Professional Services G Suite Google Wallet Work Content Black Friday Regulations Automobile Business Growth Microsoft Excel Scary Stories Star Wars Current Events Desktop Data Warehouse Corporate Profile Multi-Factor Security Mirgation Voice over Internet Protocol Entertainment Nanotechnology Spying Solid State Drives Staff Legal Shortcuts VoIP IP Address Dark Web Cybercrime Alt Codes Dark Data Analysis Employee-Employer Relationships Language USB Drones Optimization Streaming How To Cyber Monday Social Networking Blockchain Sports Cost Management Remote Computing Going Green Social Engineering Troubleshooting WannaCry Google Calendar Knowledge Chatbots FinTech iOS IT service Heating/Cooling Mobile Office Net Neutrality Screen Reader Update Social National Security Business Analysis Printer Hard Drives Wearable Technology Security Cameras Time Management IT Consultant Unsupported Software Domains Computer Repair Processors Cameras Printers Relocation Meetings Tracking Cleaning Mobile Data Health Alert CCTV Emoji Webcam Electronic Medical Records Work/Life Balance Windows 7 Error Black Market Point of Sale Mobile Computing Travel Law Enforcement Physical Security Regulation Notifications Upgrades CrashOverride Twitter Botnet Supercomputer Motion Sickness Gadget Staffing Crowdsourcing Taxes 3D Printing Personal Information Administrator Web Server Emergency Machine Learning IT Budget GPS