Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Being Used by College Administrators

Technology Being Used by College Administrators

While many colleges and universities once associated themselves with thick tomes of knowledge, technology plays a critical role in their processes. In addition to all of the typical IT operations that any business must contend with, these bastions of learning also need to keep their students’ data secure, make sure that these students are completing their degrees on time, and make sure that students stay enrolled.

0 Comments
Continue reading

Don’t Defrag your SSD Hard Drives!

Don’t Defrag your SSD Hard Drives!

For decades, a common quick fix for a slow computer was to run a disk defrag on the hard drive. For most modern computers, however, this common practice can actually harm your computer. Let’s talk about why, and how you can tell.

0 Comments
Continue reading

Tip of the Week: Build Your Business’ Cloud

Tip of the Week: Build Your Business’ Cloud

Many businesses have already used the cloud to great success, but others might not even know where to start. The thing is, the cloud has so many features and potential solutions that organizations who don’t know where to start might be overwhelmed by the possibilities. Today, we’ll look at some specific benefits offered by cloud-hosted solutions and services.

0 Comments
Continue reading

Why Cloud Computing is Today’s Standard

Why Cloud Computing is Today’s Standard

These days, it seems that everything is migrating to the cloud. This approach has a lot of benefits, especially for the businesses that use these solutions on a regular basis. Let’s explore a few reasons why cloud computing has proven to be so beneficial.

0 Comments
Continue reading

How Employment Levels are Balancing Out

How Employment Levels are Balancing Out

For many years, there have been occupations and careers that are largely occupied by either males or females. These discrepancies have been declining, thanks in part to the greater adoption of technology solutions in businesses. As a result, today’s workforce has shown a greater level of inclusivity than has been demonstrated in the past.

0 Comments
Continue reading

Tip of the Week: How to Use PEARS to Mitigate Your Organization’s IT Risks

Tip of the Week: How to Use PEARS to Mitigate Your Organization’s IT Risks

Implementing technology solutions for your organization always comes with a risk, and if your business is blindsided by it, risk can derail productivity and get in the way of success. As a business owner, understanding this risk and planning for it is critical to your organization’s continued success. This week’s tip is dedicated to helping you identify risk and the role it should play in your decision making.

0 Comments
Continue reading

An Introduction to the Gig Economy

An Introduction to the Gig Economy

Business owners have a lot of trouble finding top talent--especially some that are limited by certain geographical factors. Rather than go all-in on finding the much-coveted full-time job, many professionals are instead opting to provide expertise as a service. This is essentially freelancing, and the number of workers who partake in this “gig economy” has increased substantially. It has quickly become the norm for a lot of organizations.

0 Comments
Continue reading

A Brief History of Microsoft Word

A Brief History of Microsoft Word

Microsoft Word is one of the most popular software titles in the world. It wasn’t always so. Despite competing with a myriad of separate word processors over literal decades, Word has sustained and is now more powerful than ever. Today, we’ll take you through the history of the world’s most recognizable word processor.

0 Comments
Continue reading

Tip of the Week: 4 Things IT Wants You to Remember

Tip of the Week: 4 Things IT Wants You to Remember

As a managed service provider, we understand how repetitive some of our advice can be. However, we repeat this advice so often because it works. That's why we're sharing a few tips to help you keep your IT functional, while also giving you a peek into our processes.

0 Comments
Continue reading

Does Your Business Have a Sufficient Backup Plan?

Does Your Business Have a Sufficient Backup Plan?

Is your business prepared for any disasters that come its way? If you haven’t considered which threats could cause your operations the most trouble, you need to devise a strategy that takes all possibilities into account. Here, we’ll help guide you through these considerations.

0 Comments
Continue reading

Privacy Concerns Hang Over Social Media

Privacy Concerns Hang Over Social Media

Social media has brought about a massive shift in the way people interact. Today we share our opinions, photos, and videos; and, we can even choose our dates by swiping right or left. With social media, people share moments, opinions, and other information, but is all this sharing actually setting people, and the organizations they interact with, up for failure? We’ll take a look at social media privacy concerns and potentially hazardous practices that could exacerbate the problems further.

0 Comments
Continue reading

Tip of the Week: Building a Knowledge-Based Wiki in OneNote

Tip of the Week: Building a Knowledge-Based Wiki in OneNote

Despite its name, Microsoft OneNote can serve as far more than a basic note-taking application. One of these uses is as a rudimentary, but effective, wiki system. This week, our tip will go over how you can set up an internal wiki in OneNote.

0 Comments
Continue reading

Foldable Screens Enter Smartphone Market

Foldable Screens Enter Smartphone Market

There have been whispers for years about manufacturers using flexible OLED (organic light-emitting diode) displays to create devices that were flexible enough to fold in half. As late as 2018, that’s all they were...whispers. In the subsequent year, to the surprise of many industry professionals, several manufacturers have committed to creating foldable devices. We’ll look at the technology behind these devices and tell you about which foldable devices are going to be available in 2019.

0 Comments
Continue reading

Security Is a Big Component of Windows 10

Security Is a Big Component of Windows 10

With Microsoft betting on Windows 10 to be their #1 OS for the foreseeable future, it is important for them to be able to sufficiently protect their users from the growing threats looking to make life difficult for businesses from all over the world. Today, we will take a look at Windows 10 Enterprise Security, and how it works to protect businesses from harm.

0 Comments
Continue reading

Tip of the Week: This Is What Should You Do When Your Smartphone Gets Wet

Tip of the Week: This Is What Should You Do When Your Smartphone Gets Wet

Mistakes happen, especially with smartphones. Whether you’re dropping it on the floor, in the toilet, or in a puddle, there’s no shame in making this mistake. Granted, when this does occur, you need to act fast. Any water in, on, or around your device isn’t recommended, but let’s talk about what happens when you’re thrown into a worst-case scenario.

0 Comments
Continue reading

Are the Messaging Apps You Use Secure?

Are the Messaging Apps You Use Secure?

Messaging applications are critical to the success of the modern business, but it’s important that they don’t compromise security in the pursuit of convenience. There is a specific set of criteria involved with ensuring that your chosen messaging applications are secure.

0 Comments
Continue reading

Clarifying a Few IT Stereotypes

Clarifying a Few IT Stereotypes

We’ve long accepted that, as an IT provider, there are a lot of stereotypes about what we can do and how we do it. Yet, just because we’ve accepted it, doesn’t mean we aren’t going to do anything about it. That’s why we wanted to use this blog post to clear up a few misconceptions about the nature of IT services.

0 Comments
Continue reading

Tip of the Week: Create Useful Email Subjects

Tip of the Week: Create Useful Email Subjects

If you’ve ever received an email without a subject line, chances are you’ve never felt inclined to open it as soon as possible. The email subject line is critical to capturing the user’s attention, as it helps to ensure they understand what they can expect from the email’s contents. Here are a couple of pointers on how you can create more effective email subject lines to increase the chances of them being read.

0 Comments
Continue reading

Should Your Business Be Looking to Chrome OS?

Should Your Business Be Looking to Chrome OS?

Chances are that you use the Chrome web browser, and we know that even if you don’t, you definitely use Google search. With all the exposure these applications bring Google, it is kind of strange that their operating system, Chrome OS, isn’t more popular. Today, we will take a look at Chrome OS, the Chromebook, and explain why they might be a cost-effective solution for your business.

0 Comments
Continue reading

Migrating to the Cloud? Avoid These Problems

Migrating to the Cloud? Avoid These Problems

With cloud computing being utilized by a majority of businesses nowadays, it’s not as big of a surprise when one wants to move files from a locally-hosted server to a cloud server; or, from a cloud server to a new cloud server. This presents a fair amount of problems that you have to be mindful of if you want to move the data and applications over properly. Today, we’ll take a look at some problems you may face, and how to make sure they don’t weigh down your next cloud migration.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers Malware User Tips Business Computing Microsoft Computer Hosted Solutions Google Network Security Internet Productivity Tech Term Software Communication Mobile Devices Efficiency IT Services Data Small Business Backup Ransomware Workplace Tips Windows 10 Hardware Smartphone Android IT Support Productivity Microsoft Office Saving Money Cloud Computing Data Management Browser Business Continuity Data Recovery Managed IT Services Innovation Data Backup Facebook Office 365 Server Users Upgrade Internet of Things Word Managed IT Services Windows Gmail Passwords Smartphones Disaster Recovery Phishing Social Media Outsourced IT App Windows 10 Network Chrome Vulnerability Cybersecurity communications Business Management Remote Monitoring Managed Service Provider VoIP Artificial Intelligence Employer-Employee Relationship Mobile Device Encryption Managed Service Hacker Tip of the week Applications Information Content Filtering Save Money Big Data Miscellaneous Apple Spam Government Website Analytics IT Support BYOD Infrastructure Money Office Tips Access Control Virtual Reality WiFi Settings Router Paperless Office Tablet Two-factor Authentication Avoiding Downtime The Internet of Things Antivirus Bandwidth Virtualization YouTube Education Risk Management Data storage Wireless Display IT Management Robot Customer Service Printing Firewall Maintenance Employee-Employer Relationship Automation HIPAA Quick Tips Safety End of Support Computing Presentation Scam Downtime Google Drive Password Office Mouse Vendor Management Solid State Drive Hosted Solution SaaS Gadgets Development Wireless Technology Networking LiFi Mobile Security Recovery Holiday Hard Disk Drive VPN Computers Unified Threat Management Data Security Search Storage Retail Data loss Business Technology IBM Virtual Private Network Chromebook Mobile Device Management Administration Customer Relationship Management Server Management Apps Outlook Touchscreen Business Intelligence Wi-Fi Document Management Monitors Hacking Laptop Telephone Systems Augmented Reality Company Culture Operating System User Error Recycling Human Error Halloween Budget Training FCC Uninterrupted Power Supply Smart Tech Patch Management Students Cortana Cryptocurrency How To G Suite Distributed Denial of Service Bluetooth MSP Scalability Fun Bring Your Own Device sip Automobile Alerts Service Level Agreement Comparison Managing Stress Managed Services Undo Fraud Corporate Profile Internet Exlporer PowerPoint SharePoint VoIP eWaste Marketing Device Scary Stories Title II Connectivity Bitcoin Network Congestion LED Application IP Address Cybercrime Information Technology Managed IT Service Modem Migration Best Practice telephony Licensing How To Writing Remote Computing Specifications IT service Compliance Heating/Cooling Cables Laptops Google Docs WannaCry Value Onboarding Downloads IT Technicians Time Management Continuity Mobility Sports Online IoT Slack Knowledge Windows 8 Update Cooperation Firefox Smart Office Co-Managed IT Mobile Office Google Wallet Break Fix Cabling Cookies Charging Business Growth Current Events Black Friday BDR Regulations Servers Wires Software as a Service Digital Payment Hotspot Professional Services Digital Signage Multi-Factor Security Mirgation Network Management Solar Print Toner Hard Drives Legal Politics Microsoft Excel Star Wars Monitoring Experience Unified Communications Staff Techology Work Content Running Cable Drones Dark Web Nanotechnology Managed IT Messaging Alt Codes Dark Data Collaboration Going Green Social Engineering Cyber Monday Google Maps Social Networking Voice over Internet Protocol Entertainment Virtual Desktop Language Digital USB Lenovo Desktop Google Calendar Chatbots Shortcuts Refrigeration Buisness Tech Support Blockchain Cost Management Mail Merge Spying User Social Printer Wearable Technology Unified Threat Management Optimization Streaming Lithium-ion battery Computer Care Net Neutrality Disaster Screen Reader Shortcut Analysis Employee-Employer Relationships Public Speaking IT solutions Typing File Sharing Samsung Smart Technology Motherboard Statistics FinTech iOS Competition Deep Learning Humor Computing Infrastructure Spyware Dongle Superfish Troubleshooting Legislation Identity Security Cameras 5G Websites Identity Theft Permissions Assessment Address Hacks Mobile Data Law Enforcement Travel Printers Notifications CrashOverride Twitter Botnet Supercomputer Gadget Staffing Motion Sickness Crowdsourcing Taxes Personal Information Administrator Mobile Computing Web Server Machine Learning IT Budget Emergency Physical Security GPS Upgrades IT Consultant Windows 7 Computer Repair Processors Cameras Relocation Meetings Tracking 3D Printing Cleaning Regulation Domains Health Alert CCTV Private Cloud Emoji Webcam Unsupported Software Work/Life Balance Electronic Medical Records Error Black Market Point of Sale