Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The IoT Keeps Growing

The IoT Keeps Growing

The Internet of Things has grown considerably over the past few years, and it’s not slowing down anytime soon. It grew as expected in 2018, but where will 2019 take the Internet of Things? We’ve put together some predictions.

0 Comments
Continue reading

Gmail Only Gets Better with These Extensions

Gmail Only Gets Better with These Extensions

Google is well-known in the technology industry for providing great tools not only for the average computer user, but professional organizations all around the world. One of the largest is Gmail, Google’s signature email solution. If you pair it with the right extensions, Gmail’s usefulness far exceeds what it can achieve on its own. Today’s blog will help you optimize your efficiency using Google Chrome extensions for Gmail.

0 Comments
Continue reading

Tip of the Week: 3 Pieces of Screen Reading Software

Tip of the Week: 3 Pieces of Screen Reading Software

Wouldn’t it be convenient if your business could have web pages or applications read out text for you so that you don’t have to? While most would consider this a luxury, these screen reading applications are an everyday occurrence to those who are blind, visually impaired, or have a learning disability. Even if you don’t have anyone in your office who needs screen reading, it can’t hurt to be prepared for a day when you might.

0 Comments
Continue reading

Could Your Favorite App Infect Your Device?

Could Your Favorite App Infect Your Device?

When considering solutions to help ensure your business’ IT security, mobile devices often go overlooked. This makes sense--for most of the time the telephone has existed, it has been attached to a wall, only capable of transmitting sound. However, with phones now being palm-sized computers that we carry in our pockets, keeping them safe from cyberthreats has a new importance.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business Malware User Tips Computer Business Computing Internet Network Security Google Productivity Microsoft Software Tech Term Hosted Solutions Mobile Devices Efficiency IT Services Small Business Ransomware Communication Backup Windows 10 Hardware Android Smartphone Data Saving Money Workplace Tips Productivity IT Support Browser Microsoft Office Data Management Managed IT Services Facebook Managed IT Services Server Business Continuity Upgrade Cloud Computing Internet of Things Gmail Data Recovery Windows Innovation Office 365 Phishing Disaster Recovery Data Backup Word App Passwords Outsourced IT Mobile Device Windows 10 Smartphones Managed Service Provider Employer-Employee Relationship VoIP Cybersecurity Artificial Intelligence Business Management Encryption Remote Monitoring Content Filtering Spam Website Big Data Users communications Miscellaneous Information Social Media Tip of the week Analytics Vulnerability IT Support Money Government Office Tips Network Applications Infrastructure BYOD Chrome Two-factor Authentication Employee-Employer Relationship IT Management Managed Service Bandwidth YouTube Save Money Maintenance Apple Virtual Reality Risk Management Tablet Data storage Paperless Office Wireless Display Antivirus Firewall Access Control Customer Service Robot WiFi Router Printing Avoiding Downtime Automation The Internet of Things Hacker Settings Wireless Technology Server Management Gadgets Downtime Computing Document Management Hosted Solution Touchscreen Google Drive Recovery Company Culture Password Virtualization Mobile Security Mouse Vendor Management Telephone Systems LiFi Education Quick Tips Computers Search IBM Storage Development Scam Retail Apps Administration SaaS Mobile Device Management Customer Relationship Management Hacking Networking Outlook Wi-Fi Unified Threat Management Laptop VPN Monitors Holiday Data Security HIPAA Augmented Reality Presentation Data loss Business Technology Operating System Business Intelligence Safety Virtual Private Network End of Support Office Licensing Troubleshooting Google Maps Bring Your Own Device sip Application Managed IT Service Modem FinTech Digital Lenovo How To Specifications Compliance Security Cameras Scary Stories Mail Merge Value Tech Support Unified Threat Management Downloads IT Technicians File Sharing Recycling Human Error IP Address Cybercrime Disaster Shortcut Bitcoin Network Congestion Online IoT Computer Care Cooperation Statistics Best Practice telephony Break Fix Cookies Samsung MSP Spyware Superfish Information Technology Websites Identity Theft PowerPoint Knowledge Google Docs Black Friday Regulations Managing Stress Managed Services Sports Address Writing Hotspot Professional Services User Error Multi-Factor Security Mirgation eWaste Device Mobile Office Uninterrupted Power Supply Patch Management Windows 8 Hard Drives Microsoft Excel Star Wars Training Staff Automobile LED Bluetooth Business Growth Dark Web Nanotechnology G Suite Google Wallet USB Onboarding Experience Unified Communications Cyber Monday Social Networking Cables Laptops Corporate Profile Current Events Language VoIP Legal User Google Calendar Chatbots Continuity Mobility Running Cable Solid State Drive Refrigeration Blockchain Cost Management Slack Drones Printer Public Speaking Wearable Technology Smart Office Co-Managed IT Alt Codes Dark Data Net Neutrality Screen Reader Charging Virtual Desktop How To Competition Computing Infrastructure Dongle Digital Signage IT service Heating/Cooling Smart Technology Motherboard Remote Computing Wires Software as a Service Buisness WannaCry Going Green Social Engineering Monitoring IT solutions Time Management Legislation Identity Update Solar Print Toner Lithium-ion battery Hard Disk Drive Social Permissions Assessment Work Content Cabling Typing FCC Smart Tech Firefox Alerts Service Level Agreement Digital Payment Desktop BDR Servers Deep Learning Humor Distributed Denial of Service Voice over Internet Protocol 5G Spying Cortana Network Management Comparison Chromebook Shortcuts Halloween Hacks Undo Fraud Internet Exlporer Politics Techology Budget SharePoint Collaboration Optimization Streaming Managed IT Cryptocurrency Marketing Title II Connectivity Analysis Fun Private Cloud Alert CCTV Emoji Webcam Electronic Medical Records Work/Life Balance Error Printers Black Market Point of Sale Mobile Computing Physical Security Travel Law Enforcement Upgrades Domains Notifications CrashOverride Botnet Supercomputer Twitter Motion Sickness Gadget Staffing 3D Printing Personal Information Administrator Crowdsourcing Taxes Machine Learning IT Budget Web Server Emergency GPS Unsupported Software Computer Repair IT Consultant Regulation Relocation Processors Cameras Entertainment Meetings Tracking Mobile Data Health Cleaning