Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Right and Wrong of the Hollywood Hack

The Right and Wrong of the Hollywood Hack

Movies and television shows are a big part of our culture. When hackers are portrayed on the silver (or small) screen, there are some major dramatic elements added to their performances to keep the audience from dismissing key pieces of plot. Today, we will look at hacker portrayals, and what Hollywood gets right, and what it gets completely wrong.

0 Comments
Continue reading

Tech Continues to Turn the Entertainment Industry on Its Head

Tech Continues to Turn the Entertainment Industry on Its Head

Admit it, technology is changing the way you “consume” media. Who of us hasn’t binged a show on a streaming media service while simultaneously looking up the backstory of every character on the show? Today, people want to consume content the way they want, when they want, and for as long as they want; and technology has a lot to do with it.

0 Comments
Continue reading

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

0 Comments
Continue reading

How Technology Allows Fake News to Spread

How Technology Allows Fake News to Spread

In today’s political, social, and economic environment, information is more valuable than ever. However, this increased importance, paired with the speed that data can be dispersed via the Internet, has enabled many to use false information to manipulate the general public into agreeing with their views and acting upon them.

0 Comments
Continue reading

Tip of the Week: 11 Technology Buzzwords Every SMB Should Know

Tip of the Week: 11 Technology Buzzwords Every SMB Should Know

Have you ever felt like talking to someone in the technology industry was like speaking with someone who spoke a different language? You’re not alone. It’s no secret that the IT industry loves their jargon - and has dozens of buzzwords at any given time. These are a few such words that have the industry buzzing right now!

0 Comments
Continue reading

Next Job on the Automation Chopping Block: Pizza Delivery

Next Job on the Automation Chopping Block: Pizza Delivery

Did you know that over 2,000 Domino’s Pizza franchises in Australia, New Zealand, France, Belgium, The Netherlands, Japan, and Germany feature delivery by robot? Starship Technologies, a self-driving robotics company, announced on March 29th that they would be partnering with Domino’s to revolutionize the way the delivery process works.

Tags:
0 Comments
Continue reading

How Do You Feel About ISPs Selling Your Internet Browsing History?

How Do You Feel About ISPs Selling Your Internet Browsing History?

In October of 2016, the Federal Communications Commission designed a set of rules known as the Broadband Consumer Privacy Proposal. These rules had intended to flip the status quo and require Internet service providers (ISPs) to gain their customers’ permission before they harvested their browsing histories to sell to advertisers. This proposal is now moot with the establishment of a new law that passed through Congress and was signed by President Trump in April 2017.

0 Comments
Continue reading

Tip of the Week: 4 Ways to Maybe Get Work Done on Your Laptop With a Toddler Nearby

Tip of the Week: 4 Ways to Maybe Get Work Done on Your Laptop With a Toddler Nearby

Let’s say you’ve got an email that you really need to crank out from home, and pronto. So, you whip out your laptop to get started, and that’s when you spot the menacing eyes of a toddler from across the room. What do you do? Is it even possible to use a mobile device once a toddler has it in their greedy little sights? For this week’s tip, we’ll explore your options.

0 Comments
Continue reading

Tip of the Week: Simple Device Turns Your Car Into a Wi-Fi Hotspot

Tip of the Week: Simple Device Turns Your Car Into a Wi-Fi Hotspot

The Internet of Things may have just entered social consciousness, but people have been trying to add Internet functionality to devices for quite some time. One instance of this is the development and manufacture of smart car technology. In the same way as our services are designed to proactively monitor and maintain your business’ network, a smart car has been developed largely as an completely connected automobile that allows car owners to worry less about their car and to get the most out of their investment and driving experiences.

0 Comments
Continue reading

You Know Who’s Looking Forward to Tax Season? Identity Thieves

You Know Who’s Looking Forward to Tax Season? Identity Thieves

One of the most high-profile hacking attacks in the United States struck last year when the Internal Revenue Service (IRS) was breached. 464,000 Social Security numbers were swiped; enough to file 101,000 tax returns using false personal identification numbers. Every organization can learn how to better protect themselves during tax return season, especially since you have so much on the line every year.

0 Comments
Continue reading

Why Some People Can’t Be Productive While Travelling

Why Some People Can’t Be Productive While Travelling

Let’s say that you're on a business trip. As you travel, you decide you may as well get a bit of work done. You pull out your laptop and are pecking away, and that’s when you notice a growing feeling of nausea rising in your stomach. It gets so bad that you finally have to put the laptop away, having accomplished relatively little, before you are sick.

0 Comments
Continue reading

An Extreme Example of a Fired IT Administrator Taking Revenge

An Extreme Example of a Fired IT Administrator Taking Revenge

It can be easy to underestimate the importance of maintaining permissions on your network. In fact, sometimes it takes a good dose of misfortune to present the consequences of unchecked access to your network. This time, the misfortune befell PA Online, an Internet service provider located in Pennsylvania.

0 Comments
Continue reading

Study Shows How Reading Novels Can Help Your Business Succeed

Study Shows How Reading Novels Can Help Your Business Succeed

The busy business owner rarely has time to indulge in extracurricular activities, but there are still ways that you can make progress--even when you’re not actually in the office or working on important plans, there’s still the opportunity for self-improvement. One way that you can do this is by being well-read. In fact, science has practically proven that reading literary fiction is just as beneficial for your professional development as other seemingly more practical works.

0 Comments
Continue reading

Tip of the Week: 4 Odd Productivity Tips from Successful People

Tip of the Week: 4 Odd Productivity Tips from Successful People

Having a workflow that works for you is the key to being successful. Sometimes, finding such a routine requires taking some rather extraordinary measures. If you’re looking for ways to tweak your workflow to be more productive, then consider these outside-the-box productivity tips from some of history’s very successful people.

0 Comments
Continue reading

Can the Government Really Stop People From Sharing Netflix Passwords?

Can the Government Really Stop People From Sharing Netflix Passwords?

Do you loan out your Netflix password to friends so that they can catch up on their favorite shows? If so, you’re in violation of a recent federal court ruling, which declares that sharing a password of any kind is now a federal offense. So, if you plan on watching the new Netflix original series Stranger Things, you may want to reconsider how you plan to do so.

0 Comments
Continue reading

Man Responsible for 27 Million Facebook Spam Messages Finally Nabbed

Man Responsible for 27 Million Facebook Spam Messages Finally Nabbed

Cyber security professionals and Internet users rejoice, for the “Spam King,” Sanford Wallace, has finally been sentenced for his longtime use of stolen Facebook credentials to spam other users. Between 2008 and 2009, he had stolen credentials for Facebook accounts, and then used the accounts to send credential-stealing web links. Now, he gets to spend the next two and a half years in prison, and pay an oddly-specific fine of $310,629.

0 Comments
Continue reading

Pass the Barbeque Sauce: When Upgrading Goes Too Far

Pass the Barbeque Sauce: When Upgrading Goes Too Far

Upgrading technology is a sure way to improve the efficiency, security, and productivity of your company’s operations, but is there a point when upgrading one’s tech can go too far? As much as you hear us sing the praises of upgrading, we have to admit that there’s a point when you can have too much of a good thing.

0 Comments
Continue reading

4 Ways to Avoid Distracted Driving While Still Being Productive With Your Phone

4 Ways to Avoid Distracted Driving While Still Being Productive With Your Phone

Business owners who spend a lot of time on the road, like during a commute or on a business trip, understand how difficult it is to use smartphones while driving. Despite the fact that it’s illegal in many places, some people refuse to put down their phones and concentrate on the task at hand: driving. Doing so puts not only themselves, but everyone else on the road at risk of an accident, which can lead to expensive insurance payments and vehicle maintenance costs.

0 Comments
Continue reading

5 Hilarious Computing Tips From Mr. Wolfdog [VIDEO]

b2ap3_thumbnail_oh_your_wolfdog_400.jpgHappy April Fool’s Day! It’s a time to celebrate pranks, practical jokes, and laughter. Therefore, we thought we’d mix it up a bit and seek out technology advice from the funniest and the furriest CEO we know, Old Spice’s wolf-dog hybrid, Mr. Wolfdog!

0 Comments
Continue reading

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers Malware User Tips Computer Business Computing Microsoft Hosted Solutions Productivity Internet Network Security Google Tech Term Software Communication Mobile Devices Efficiency IT Services Backup Hardware Data Small Business Workplace Tips Windows 10 Ransomware Smartphone IT Support Android Microsoft Office Saving Money Productivity Cloud Computing Browser Business Continuity Managed IT Services Data Management Data Recovery Facebook Innovation Internet of Things Managed IT Services Server Users Upgrade Windows Word Data Backup Gmail Office 365 Disaster Recovery Smartphones Outsourced IT Windows 10 Phishing App Social Media Passwords Remote Monitoring Managed Service Provider Business Management VoIP Mobile Device Encryption Network Chrome Employer-Employee Relationship Artificial Intelligence Vulnerability Cybersecurity communications Infrastructure Government Spam Save Money Website BYOD Apple Applications Office Tips Analytics IT Support Tip of the week Hacker Content Filtering Money Managed Service Big Data Miscellaneous Information The Internet of Things Risk Management Wireless Virtualization Access Control IT Management Router Customer Service Maintenance Data storage Display Tablet Settings Two-factor Authentication Firewall Antivirus Virtual Reality Employee-Employer Relationship Bandwidth Robot YouTube Paperless Office Printing WiFi Automation Education Avoiding Downtime IBM Development Virtual Private Network Office Computing Wireless Technology Holiday Google Drive Gadgets Unified Threat Management Password Administration Mouse Vendor Management Server Management Recovery Mobile Device Management Touchscreen Customer Relationship Management HIPAA LiFi Wi-Fi Chromebook Telephone Systems Laptop Computers Storage Augmented Reality Quick Tips Document Management Retail Scam Apps Business Intelligence Safety Mobile Security Outlook Solid State Drive Hacking Downtime Networking Company Culture Hosted Solution Monitors Hard Disk Drive VPN Data Security Presentation Operating System SaaS Search End of Support Data loss Business Technology Google Calendar Chatbots Network Management Migration Bring Your Own Device sip Blockchain Cost Management Marketing Remote Computing LED How To Printer Wearable Technology Techology Cables Experience Laptops Unified Communications Net Neutrality Screen Reader Managed IT Application Update Onboarding Continuity Mobility Smart Technology Motherboard Google Maps Slack Running Cable Bitcoin Network Congestion Computing Infrastructure Dongle Digital Lenovo Legislation Identity Charging Best Practice Digital Payment telephony Permissions Assessment Mail Merge Smart Office Co-Managed IT Virtual Desktop Information Technology Unified Threat Management Wires Politics Software as a Service Google Docs FCC Smart Tech Disaster Shortcut Digital Signage Buisness Writing Superfish Solar Print Toner IT solutions Distributed Denial of Service Statistics Lithium-ion battery Monitoring Collaboration Windows 8 Alerts Service Level Agreement Spyware Comparison Messaging Business Growth Fraud Internet Exlporer Address Hard Drives Work Content Google Wallet SharePoint User Error Voice over Internet Protocol Tech Support Entertainment Title II Connectivity Uninterrupted Power Supply Patch Management 5G Desktop Current Events Cortana Shortcuts Computer Care Legal Managed IT Service Modem Bluetooth Spying Halloween File Sharing Licensing Drones Specifications Compliance User Analysis Employee-Employer Relationships Alt Codes Dark Data Value Corporate Profile Refrigeration Optimization Fun Samsung Streaming Downloads IT Technicians VoIP Public Speaking FinTech Websites iOS Identity Theft Online IoT Troubleshooting Going Green Social Engineering How To Competition Security Cameras Training Break Fix Cookies Scary Stories Social Cooperation G Suite Black Friday Regulations IT service Heating/Cooling IP Address Cybercrime Automobile Students Typing Hotspot Professional Services WannaCry Recycling Human Error Multi-Factor Security Mirgation Time Management MSP Scalability Deep Learning Humor Microsoft Excel Star Wars Staff Firefox Managing Stress Knowledge Managed Services Dark Web Nanotechnology Cabling PowerPoint Sports Hacks Device Budget Cyber Monday Social Networking BDR Servers Mobile Office Cryptocurrency Language USB Undo eWaste Machine Learning IT Budget Web Server GPS IT Consultant Computer Repair Relocation Windows 7 Processors Cameras Tracking Meetings Mobile Computing Cleaning Physical Security Health Regulation Private Cloud Alert CCTV Upgrades Domains Emoji Webcam CrashOverride Work/Life Balance Electronic Medical Records 3D Printing Error Black Market Point of Sale Law Enforcement Travel Unsupported Software Emergency Notifications Botnet Supercomputer Twitter Printers Gadget Staffing Motion Sickness Crowdsourcing Taxes Mobile Data Personal Information Administrator