Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Hide Yourself from Skype

Tip of the Week: How to Hide Yourself from Skype

In a recent update, Microsoft added Skype to the taskbars of many PCs. While many may believe that they don’t use Skype, they actually have an account because it is tied to their Microsoft account. If you don’t want people to be able to find you on the video chatting service, you’re going to want to follow the instructions we’ve outlined here.

0 Comments
Continue reading

Understanding How a Password is Cracked

Understanding How a Password is Cracked

If you were to ask us what one of the most important cybersecurity features to have is, chances are, we’d answer “secure passwords.” Sure, this might be the answer that you’d hear from everyone, but that’s because it is really that important. For our tip, we’ll illustrate how it’s so important by examining a few key processes hackers use to crack a password.

0 Comments
Continue reading

Tip of the Week: Four Awesome Features of Windows 10

Tip of the Week: Four Awesome Features of Windows 10

Windows 10 comes with more features built-in than most users could shake a stick of RAM at. For our tip, this week we’re diving into some of the handier features you could use at the office!

0 Comments
Continue reading

Tip of the Week: Simple Steps to Optimal IT

Tip of the Week: Simple Steps to Optimal IT

Running a business can be a fulfilling and rewarding endeavor, but on the same token, the technology that is needed for it to run can quickly become a stressful obstacle to struggle with. Fortunately, there are some easy steps you can take that allow you to minimize these moments and prevent them from occurring. We’ll review a few basics for this week’s tip!

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business Malware User Tips Computer Business Computing Internet Network Security Tech Term Microsoft Productivity Software Google Hosted Solutions Mobile Devices Efficiency IT Services Small Business Communication Windows 10 Hardware Ransomware Backup Android Smartphone Data Workplace Tips IT Support Productivity Saving Money Data Management Managed IT Services Microsoft Office Browser Data Recovery Internet of Things Gmail Managed IT Services Windows Facebook Cloud Computing Server Business Continuity Upgrade Disaster Recovery Word Passwords App Data Backup Innovation Office 365 Phishing Business Management Smartphones Managed Service Provider Employer-Employee Relationship VoIP Remote Monitoring Artificial Intelligence Outsourced IT Encryption Mobile Device Windows 10 Users Cybersecurity Social Media Government Information BYOD Analytics Applications IT Support Infrastructure Office Tips Money Network Chrome Spam Tip of the week Content Filtering Vulnerability Website Big Data Miscellaneous communications Access Control Router Apple Risk Management Wireless Data storage Display Firewall Customer Service WiFi IT Management Robot Avoiding Downtime The Internet of Things Virtual Reality Printing Maintenance Hacker Automation Settings Paperless Office Two-factor Authentication Tablet Employee-Employer Relationship Bandwidth Antivirus Managed Service YouTube Save Money VPN LiFi Search Education HIPAA IBM Computers Apps Data Security Development Data loss Business Technology Storage Mobile Device Management Retail Hacking Virtual Private Network Administration Customer Relationship Management Server Management Wi-Fi Mobile Security Document Management Touchscreen Laptop Outlook Monitors Augmented Reality Presentation Telephone Systems Safety Office Business Intelligence Gadgets Operating System Wireless Technology Quick Tips End of Support Recovery Downtime Virtualization Scam SaaS Computing Hosted Solution Company Culture Password Google Drive Mouse Vendor Management Networking Unified Threat Management Holiday Managing Stress Managed Services Mobile Office Writing FCC Smart Tech Hard Disk Drive PowerPoint Google Docs Time Management Windows 8 Distributed Denial of Service Cabling Alerts Service Level Agreement Firefox eWaste Device Digital Payment Unified Communications Comparison User BDR Servers Chromebook Google Wallet Fraud Internet Exlporer Refrigeration LED Politics Business Growth Experience Cables Laptops Collaboration Current Events Running Cable Title II Connectivity Onboarding SharePoint Public Speaking Network Management Managed IT Service Modem Managed IT Slack Legal Virtual Desktop Licensing Competition Techology Continuity Mobility Dark Data Specifications Compliance Google Maps Charging Drones Buisness Value Digital Lenovo Smart Office Co-Managed IT Tech Support Alt Codes Wires Software as a Service File Sharing Going Green Lithium-ion battery Social Engineering Online IoT Mail Merge Digital Signage Computer Care IT solutions Downloads IT Technicians Print Toner Social Break Fix Cookies Disaster Shortcut Monitoring Samsung Cooperation Unified Threat Management Solar Typing Black Friday Regulations Statistics 5G Hotspot Professional Services Undo Spyware Superfish Work Content Websites Identity Theft Voice over Internet Protocol Halloween Microsoft Excel Marketing Star Wars Address Desktop Training Deep Learning Humor Cortana Multi-Factor Security Mirgation Shortcuts Automobile Hacks Dark Web Nanotechnology Application Uninterrupted Power Supply Patch Management Spying G Suite Fun Staff User Error Cryptocurrency Cyber Monday Social Networking Bluetooth Analysis Budget Language USB Optimization Streaming Chatbots FinTech How To Scary Stories Blockchain Cost Management Corporate Profile Troubleshooting Bring Your Own Device sip Google Calendar Security Cameras IP Address Cybercrime Net Neutrality Screen Reader Solid State Drive Printer Wearable Technology VoIP Bitcoin Network Congestion Smart Technology Motherboard Remote Computing Computing Infrastructure Dongle How To Recycling Human Error Legislation Identity IT service Heating/Cooling MSP Update Information Technology Sports Permissions Assessment Hard Drives WannaCry Best Practice telephony Knowledge Computer Repair Mobile Computing IT Consultant Domains Processors Cameras Physical Security Relocation Meetings Upgrades Tracking Health Cleaning Alert CCTV Private Cloud Emoji Webcam 3D Printing Electronic Medical Records Work/Life Balance Error Regulation Black Market Point of Sale Unsupported Software Entertainment Travel Law Enforcement Notifications Twitter Mobile Data CrashOverride Botnet Supercomputer Motion Sickness Gadget Staffing Personal Information Administrator Crowdsourcing Taxes Web Server Machine Learning IT Budget Emergency Printers GPS