Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Apple vs Samsung: Who Makes Better Tablets?

Apple vs Samsung: Who Makes Better Tablets?

In today’s mobile-centric world, portability is becoming more and more crucial to success in business affairs. This phenomenon can easily explain why tablets are commonplace in boardrooms and briefcases. With Apple and Samsung offering two heavy-hitting tablets (the Galaxy Tab S3 and the iPad Pro), we’ve decided to analyze their features head-to-head to find out which is the supreme option for your business needs.

0 Comments
Continue reading

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

0 Comments
Continue reading

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business Malware User Tips Computer Business Computing Network Security Internet Tech Term Microsoft Software Productivity Google Hosted Solutions Mobile Devices Efficiency IT Services Communication Small Business Backup Ransomware Windows 10 Hardware Android Data Smartphone Productivity IT Support Saving Money Workplace Tips Data Management Microsoft Office Managed IT Services Browser Gmail Data Recovery Internet of Things Facebook Server Managed IT Services Windows Upgrade Cloud Computing Business Continuity Innovation Passwords Disaster Recovery App Phishing Word Data Backup Office 365 Smartphones Managed Service Provider Business Management Remote Monitoring VoIP Outsourced IT Users Encryption Artificial Intelligence Mobile Device Windows 10 Employer-Employee Relationship Cybersecurity communications Miscellaneous Applications Government Infrastructure Analytics IT Support BYOD Spam Website Office Tips Network Money Chrome Social Media Content Filtering Tip of the week Vulnerability Information Big Data Save Money Risk Management WiFi Wireless Avoiding Downtime The Internet of Things Apple Data storage Display IT Management Customer Service Maintenance Robot Employee-Employer Relationship Hacker Settings Managed Service Printing Two-factor Authentication Tablet Automation Virtual Reality Access Control Bandwidth Paperless Office Firewall Antivirus Router YouTube Password Google Drive SaaS Development Education Mouse Vendor Management VPN Search Data Security IBM Presentation Mobile Security Holiday LiFi Data loss Business Technology Unified Threat Management Administration Office Computers Mobile Device Management Virtual Private Network Storage Customer Relationship Management Wireless Technology Gadgets Virtualization Retail Server Management Wi-Fi Recovery Touchscreen Laptop Business Intelligence Augmented Reality Telephone Systems Document Management Outlook Monitors Safety Quick Tips Company Culture Apps Downtime Scam Hosted Solution Operating System Hacking End of Support HIPAA Networking Computing Fraud Internet Exlporer Knowledge IT service Heating/Cooling LED Comparison Sports WannaCry Bitcoin Network Congestion Time Management Onboarding SharePoint Mobile Office Hard Disk Drive Cables Laptops Title II Connectivity telephony Firefox Remote Computing Slack Licensing Information Technology Cabling Continuity Mobility Managed IT Service Modem Best Practice Value Experience Unified Communications Undo BDR Writing Servers Smart Office Co-Managed IT Specifications Compliance Google Docs Update Charging Marketing Windows 8 Network Management Digital Signage Downloads IT Technicians Running Cable Wires Software as a Service Online IoT Business Growth Techology Monitoring Cooperation Google Wallet Managed IT Solar Digital Payment Print Toner Break Fix Cookies Virtual Desktop Application Hotspot Professional Services Current Events Google Maps Politics Work Content Black Friday Regulations Buisness Digital Lenovo Chromebook Microsoft Excel Star Wars IT solutions Desktop Multi-Factor Security Mirgation Lithium-ion battery Legal Mail Merge Collaboration Voice over Internet Protocol Alt Codes Dark Data Unified Threat Management Spying Staff Drones Disaster Shortcut Shortcuts Dark Web Nanotechnology Analysis Language USB Going Green Social Engineering Statistics Tech Support Optimization Streaming Cyber Monday Social Networking 5G Spyware Superfish Blockchain Cost Management Cortana Hard Drives Social Computer Care Troubleshooting Google Calendar Chatbots Halloween Address File Sharing FinTech Typing User Error Samsung Printer Wearable Technology Uninterrupted Power Supply Patch Management Security Cameras Net Neutrality Screen Reader Fun Computing Infrastructure Dongle Bluetooth Websites Recycling Identity Theft Human Error Smart Technology Motherboard Deep Learning Humor Permissions Assessment Refrigeration Hacks Training Legislation Identity Scary Stories User Corporate Profile MSP Cryptocurrency VoIP G Suite PowerPoint IP Address Cybercrime Public Speaking Budget Solid State Drive Automobile Managing Stress Managed Services FCC Smart Tech Alerts Service Level Agreement Competition How To eWaste Device Distributed Denial of Service Bring Your Own Device sip How To Gadget Staffing Emergency Motion Sickness Crowdsourcing Taxes Personal Information Administrator Web Server Machine Learning IT Budget Mobile Computing GPS IT Consultant Physical Security Computer Repair Processors Cameras Upgrades Relocation Meetings Regulation Tracking Cleaning Health Entertainment Alert CCTV 3D Printing Private Cloud Emoji Webcam Work/Life Balance Electronic Medical Records Domains Unsupported Software Error Black Market Point of Sale CrashOverride Law Enforcement Printers Travel Notifications Mobile Data Twitter Botnet Supercomputer