Our Blog: Stuff we think you should know

Charles Haber has been a technology expert for small businesses in general, and the AEC industry specifically for over 25 years.  15 Years ago, he founded Haber Group to provide technology services that combine business needs with the human factor.

Technology Being Used by College Administrators

Technology Being Used by College Administrators

While many colleges and universities once associated themselves with thick tomes of knowledge, technology plays a critical role in their processes. In addition to all of the typical IT operations that any business must contend with, these bastions of learning also need to keep their students’ data secure, make sure that these students are completing their degrees on time, and make sure that students stay enrolled.

0 Comments
Continue reading

Don’t Defrag your SSD Hard Drives!

Don’t Defrag your SSD Hard Drives!

For decades, a common quick fix for a slow computer was to run a disk defrag on the hard drive. For most modern computers, however, this common practice can actually harm your computer. Let’s talk about why, and how you can tell.

0 Comments
Continue reading

Tip of the Week: Build Your Business’ Cloud

Tip of the Week: Build Your Business’ Cloud

Many businesses have already used the cloud to great success, but others might not even know where to start. The thing is, the cloud has so many features and potential solutions that organizations who don’t know where to start might be overwhelmed by the possibilities. Today, we’ll look at some specific benefits offered by cloud-hosted solutions and services.

0 Comments
Continue reading

Why Cloud Computing is Today’s Standard

Why Cloud Computing is Today’s Standard

These days, it seems that everything is migrating to the cloud. This approach has a lot of benefits, especially for the businesses that use these solutions on a regular basis. Let’s explore a few reasons why cloud computing has proven to be so beneficial.

0 Comments
Continue reading

How Employment Levels are Balancing Out

How Employment Levels are Balancing Out

For many years, there have been occupations and careers that are largely occupied by either males or females. These discrepancies have been declining, thanks in part to the greater adoption of technology solutions in businesses. As a result, today’s workforce has shown a greater level of inclusivity than has been demonstrated in the past.

0 Comments
Continue reading

Tip of the Week: How to Use PEARS to Mitigate Your Organization’s IT Risks

Tip of the Week: How to Use PEARS to Mitigate Your Organization’s IT Risks

Implementing technology solutions for your organization always comes with a risk, and if your business is blindsided by it, risk can derail productivity and get in the way of success. As a business owner, understanding this risk and planning for it is critical to your organization’s continued success. This week’s tip is dedicated to helping you identify risk and the role it should play in your decision making.

0 Comments
Continue reading

An Introduction to the Gig Economy

An Introduction to the Gig Economy

Business owners have a lot of trouble finding top talent--especially some that are limited by certain geographical factors. Rather than go all-in on finding the much-coveted full-time job, many professionals are instead opting to provide expertise as a service. This is essentially freelancing, and the number of workers who partake in this “gig economy” has increased substantially. It has quickly become the norm for a lot of organizations.

0 Comments
Continue reading

A Brief History of Microsoft Word

A Brief History of Microsoft Word

Microsoft Word is one of the most popular software titles in the world. It wasn’t always so. Despite competing with a myriad of separate word processors over literal decades, Word has sustained and is now more powerful than ever. Today, we’ll take you through the history of the world’s most recognizable word processor.

0 Comments
Continue reading

Tip of the Week: 4 Things IT Wants You to Remember

Tip of the Week: 4 Things IT Wants You to Remember

As a managed service provider, we understand how repetitive some of our advice can be. However, we repeat this advice so often because it works. That's why we're sharing a few tips to help you keep your IT functional, while also giving you a peek into our processes.

0 Comments
Continue reading

Does Your Business Have a Sufficient Backup Plan?

Does Your Business Have a Sufficient Backup Plan?

Is your business prepared for any disasters that come its way? If you haven’t considered which threats could cause your operations the most trouble, you need to devise a strategy that takes all possibilities into account. Here, we’ll help guide you through these considerations.

0 Comments
Continue reading

Privacy Concerns Hang Over Social Media

Privacy Concerns Hang Over Social Media

Social media has brought about a massive shift in the way people interact. Today we share our opinions, photos, and videos; and, we can even choose our dates by swiping right or left. With social media, people share moments, opinions, and other information, but is all this sharing actually setting people, and the organizations they interact with, up for failure? We’ll take a look at social media privacy concerns and potentially hazardous practices that could exacerbate the problems further.

0 Comments
Continue reading

Tip of the Week: Building a Knowledge-Based Wiki in OneNote

Tip of the Week: Building a Knowledge-Based Wiki in OneNote

Despite its name, Microsoft OneNote can serve as far more than a basic note-taking application. One of these uses is as a rudimentary, but effective, wiki system. This week, our tip will go over how you can set up an internal wiki in OneNote.

0 Comments
Continue reading

Foldable Screens Enter Smartphone Market

Foldable Screens Enter Smartphone Market

There have been whispers for years about manufacturers using flexible OLED (organic light-emitting diode) displays to create devices that were flexible enough to fold in half. As late as 2018, that’s all they were...whispers. In the subsequent year, to the surprise of many industry professionals, several manufacturers have committed to creating foldable devices. We’ll look at the technology behind these devices and tell you about which foldable devices are going to be available in 2019.

0 Comments
Continue reading

Security Is a Big Component of Windows 10

Security Is a Big Component of Windows 10

With Microsoft betting on Windows 10 to be their #1 OS for the foreseeable future, it is important for them to be able to sufficiently protect their users from the growing threats looking to make life difficult for businesses from all over the world. Today, we will take a look at Windows 10 Enterprise Security, and how it works to protect businesses from harm.

0 Comments
Continue reading

Tip of the Week: This Is What Should You Do When Your Smartphone Gets Wet

Tip of the Week: This Is What Should You Do When Your Smartphone Gets Wet

Mistakes happen, especially with smartphones. Whether you’re dropping it on the floor, in the toilet, or in a puddle, there’s no shame in making this mistake. Granted, when this does occur, you need to act fast. Any water in, on, or around your device isn’t recommended, but let’s talk about what happens when you’re thrown into a worst-case scenario.

0 Comments
Continue reading

Are the Messaging Apps You Use Secure?

Are the Messaging Apps You Use Secure?

Messaging applications are critical to the success of the modern business, but it’s important that they don’t compromise security in the pursuit of convenience. There is a specific set of criteria involved with ensuring that your chosen messaging applications are secure.

0 Comments
Continue reading

Clarifying a Few IT Stereotypes

Clarifying a Few IT Stereotypes

We’ve long accepted that, as an IT provider, there are a lot of stereotypes about what we can do and how we do it. Yet, just because we’ve accepted it, doesn’t mean we aren’t going to do anything about it. That’s why we wanted to use this blog post to clear up a few misconceptions about the nature of IT services.

0 Comments
Continue reading

Tip of the Week: Create Useful Email Subjects

Tip of the Week: Create Useful Email Subjects

If you’ve ever received an email without a subject line, chances are you’ve never felt inclined to open it as soon as possible. The email subject line is critical to capturing the user’s attention, as it helps to ensure they understand what they can expect from the email’s contents. Here are a couple of pointers on how you can create more effective email subject lines to increase the chances of them being read.

0 Comments
Continue reading

Should Your Business Be Looking to Chrome OS?

Should Your Business Be Looking to Chrome OS?

Chances are that you use the Chrome web browser, and we know that even if you don’t, you definitely use Google search. With all the exposure these applications bring Google, it is kind of strange that their operating system, Chrome OS, isn’t more popular. Today, we will take a look at Chrome OS, the Chromebook, and explain why they might be a cost-effective solution for your business.

0 Comments
Continue reading

Migrating to the Cloud? Avoid These Problems

Migrating to the Cloud? Avoid These Problems

With cloud computing being utilized by a majority of businesses nowadays, it’s not as big of a surprise when one wants to move files from a locally-hosted server to a cloud server; or, from a cloud server to a new cloud server. This presents a fair amount of problems that you have to be mindful of if you want to move the data and applications over properly. Today, we’ll take a look at some problems you may face, and how to make sure they don’t weigh down your next cloud migration.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Hackers User Tips Malware Microsoft Business Computing Computer Internet Google Hosted Solutions Network Security Productivity Software Tech Term Mobile Devices Efficiency IT Services Communication Data Small Business Backup Hardware Ransomware Smartphone Workplace Tips Windows 10 Android IT Support Productivity Microsoft Office Saving Money Cloud Computing Browser Business Continuity Data Management Data Recovery Managed IT Services Data Backup Gmail Office 365 Internet of Things Facebook Server Users Managed IT Services Upgrade Windows Innovation Word Passwords Smartphones Disaster Recovery Outsourced IT Phishing App Social Media Windows 10 Chrome Employer-Employee Relationship Business Management Vulnerability Cybersecurity communications Artificial Intelligence Managed Service Provider Remote Monitoring VoIP Encryption Network Mobile Device Save Money Hacker Government Content Filtering Tip of the week Apple Big Data Analytics BYOD Miscellaneous IT Support Managed Service Money Information Spam Applications Infrastructure Website Office Tips Settings Two-factor Authentication Firewall Tablet Bandwidth YouTube Antivirus Data storage Display WiFi Education Employee-Employer Relationship Avoiding Downtime Risk Management The Internet of Things Access Control Wireless Router Virtualization Robot Printing Automation Virtual Reality IT Management Paperless Office Customer Service Maintenance Quick Tips Holiday Downtime Scam Unified Threat Management Hacking LiFi Computers Hosted Solution Solid State Drive Business Intelligence Storage Networking Retail Chromebook Presentation Hard Disk Drive Company Culture VPN Search Document Management Data Security HIPAA IBM Office Outlook Data loss Business Technology Wireless Technology Monitors Gadgets Mobile Device Management Virtual Private Network Administration Recovery Customer Relationship Management Wi-Fi Development Server Management Operating System Laptop End of Support Mobile Security Touchscreen Augmented Reality Computing Password SaaS Telephone Systems Google Drive Safety Apps Mouse Vendor Management Solar Patch Management Print Toner Refrigeration Best Practice telephony Microsoft Excel Star Wars Fun Monitoring User Error User Information Technology Multi-Factor Security Mirgation Remote Computing Uninterrupted Power Supply Dark Web Nanotechnology Messaging Public Speaking Writing Staff Update Work Bluetooth Content Google Docs Scary Stories Corporate Profile Voice over Internet Protocol Entertainment Competition Windows 8 Language USB Desktop Cyber Monday Social Networking Shortcuts Business Growth Blockchain Cost Management Digital Payment VoIP Spying Google Wallet Google Calendar Chatbots IP Address Cybercrime Net Neutrality Screen Reader Politics How To Analysis Employee-Employer Relationships Current Events Printer Wearable Technology Optimization Streaming Sports WannaCry FinTech iOS Computing Infrastructure Dongle Collaboration Knowledge IT service Heating/Cooling Troubleshooting Legal Smart Technology Motherboard Mobile Office Security Cameras Undo Alt Codes Dark Data Permissions Assessment Time Management Drones Legislation Identity FCC Smart Tech Tech Support Firefox Students Going Green Social Engineering Cabling Recycling Marketing Human Error Computer Care MSP Scalability Social Alerts Service Level Agreement File Sharing Experience Unified Communications BDR Servers Application Distributed Denial of Service Running Cable Managing Stress Managed Services Typing Fraud Internet Exlporer Network Management PowerPoint Comparison Samsung Humor Title II Connectivity Websites Identity Theft Virtual Desktop Techology SharePoint eWaste Managed IT Device Deep Learning Modem Training Buisness Digital Lenovo Migration Hacks Licensing Google Maps LED Managed IT Service Lithium-ion battery Cables Mail Merge Laptops Cryptocurrency Value Automobile IT solutions Onboarding Budget Specifications Compliance G Suite Mobility Hard Drives Bring Your Own Device sip Online IoT Slack Unified Threat Management How To Downloads IT Technicians Disaster Continuity Shortcut Break Fix Cookies 5G Spyware Charging Superfish Cooperation Smart Office Statistics Co-Managed IT Halloween Wires Address Software as a Service Bitcoin Network Congestion Hotspot Professional Services Cortana Digital Signage Black Friday Regulations Machine Learning IT Budget Web Server GPS CrashOverride Regulation Mobile Computing IT Consultant Computer Repair Physical Security Relocation Upgrades Processors Cameras Tracking Meetings Cleaning Emergency Health Private Cloud 3D Printing Alert CCTV Emoji Webcam Work/Life Balance Electronic Medical Records Printers Error Unsupported Software Black Market Point of Sale Law Enforcement Travel Mobile Data Notifications Botnet Supercomputer Twitter Gadget Staffing Windows 7 Domains Motion Sickness Crowdsourcing Taxes Personal Information Administrator