Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Defrag your SSD Hard Drives!

Don’t Defrag your SSD Hard Drives!

For decades, a common quick fix for a slow computer was to run a disk defrag on the hard drive. For most modern computers, however, this common practice can actually harm your computer. Let’s talk about why, and how you can tell.

0 Comments
Continue reading

Does Your Business Have a Sufficient Backup Plan?

Does Your Business Have a Sufficient Backup Plan?

Is your business prepared for any disasters that come its way? If you haven’t considered which threats could cause your operations the most trouble, you need to devise a strategy that takes all possibilities into account. Here, we’ll help guide you through these considerations.

0 Comments
Continue reading

Tip of the Week: Create Useful Email Subjects

Tip of the Week: Create Useful Email Subjects

If you’ve ever received an email without a subject line, chances are you’ve never felt inclined to open it as soon as possible. The email subject line is critical to capturing the user’s attention, as it helps to ensure they understand what they can expect from the email’s contents. Here are a couple of pointers on how you can create more effective email subject lines to increase the chances of them being read.

0 Comments
Continue reading

How Good IT Makes It Seem Like You Don’t Need It

How Good IT Makes It Seem Like You Don’t Need It

As a business owner, I’m sure you’ve reviewed your business expenses… but have you ever gone through them and wondered just what it was that you had spent your money on? It’s an understandable feeling to have. The many different IT expenses that show up on the standard invoice can add up quickly, and might inspire you to reconsider how you’re investing them… besides, how much do you really need an IT provider that you never seem to call?

0 Comments
Continue reading

An MSP’s Services Protect More than Digital Assets

An MSP’s Services Protect More than Digital Assets

When you think about your data security, what kind of solutions pop into mind? If you’re like many, you probably start thinking about passwords, firewalls, and antivirus, right? While these are all good things to have, you also have to consider the possibility that someone could break into your office and bypass all of these defenses, simply by picking up your server and walking out.

0 Comments
Continue reading

Securing Your Google Account: The Unofficial Guide

Securing Your Google Account: The Unofficial Guide

If you use a computer today, there’s a fair chance that you have a Google account. The practicality that if offers with its comprehensive service offerings simply can’t be ignored. However, it is also important that a user’s, whether they utilize it for business or personal use, security isn’t ignored either.

0 Comments
Continue reading

How to Keep Your Android Device Secure

How to Keep Your Android Device Secure

Mobile devices - like smartphones, tablets, and the like - are expected to be used by 2.87 billion people by 2020. That’s a lot of devices, with a good portion of them contributing to business operations. Unfortunately, that’s also a lot of potential security issues if the right preparations aren’t taken in advance.

0 Comments
Continue reading

Make Excel Data More Exciting

Make Excel Data More Exciting

Microsoft Excel is an extremely useful program for visually displaying data. Having said that, these spreadsheets aren’t exactly the most attention-catching things on their own. Fortunately, Excel has some options built-in that can allow you to display your figures in a more engaging, more expressive, and more meaningful way.

0 Comments
Continue reading

How to Select a Phone Solution (and How to Properly Use It)

How to Select a Phone Solution (and How to Properly Use It)

Considering how long we’ve had access to the basic technology, telephones (and proper telephone etiquette while using them) haven’t changed all that much on the surface. What has changed is how the technology fundamentally works, and the options that are available for businesses. Here, we’ll go over some of the options today’s businesses have.

0 Comments
Continue reading

How to Keep Your Kids Safe from Devices (and Vice Versa)

How to Keep Your Kids Safe from Devices (and Vice Versa)

It is no secret that kids these days have more access to technology than any generation before them. While this access can truly help to enrich their lives if leveraged properly, it can also have serious ramifications if it isn’t checked.

0 Comments
Continue reading

4 Benefits of Remote Monitoring and Management

4 Benefits of Remote Monitoring and Management

As a managed service provider, one of our responsibilities is to ensure that your computing infrastructure is running without issue, and also without unduly interrupting your other employees. To accomplish this, we leverage remote monitoring and management tools that provide your operations with some notable benefits.

0 Comments
Continue reading

By Reducing Human Error Companies Gain Efficiency

By Reducing Human Error Companies Gain Efficiency

Mistakes happen. This is part of doing business with other people, as well as relying on them to make sure tasks are accomplished in a timely manner. If you want to reduce the amount of user error that your organization suffers from, you unfortunately have to assume the worst--that any user will inevitably cause a problem if it’s not addressed properly beforehand. Thankfully, we have some measures you can consider so as not to create unnecessary issues for yourself.

0 Comments
Continue reading

Hurricane Season is Half Over - Be Prepared for Next Year’s

Hurricane Season is Half Over - Be Prepared for Next Year’s

We have almost made it through this year’s hurricane season, but unfortunately, this doesn’t mean that businesses will suddenly be safe again. Many businesses that are impacted by these kinds of disasters are unprepared, and so when push comes to shove, some ultimately close their doors after trying (and failing) to bounce back. We’re going to tell you how to help avoid this outcome for your business the next time there’s a disaster.

0 Comments
Continue reading

3 Predictions We’re Making About Network Security

3 Predictions We’re Making About Network Security

Innovation has always been a major part of building better solutions, but some of the most recent trends have been in regard to enhancing security. Adapting to the threat environment is one of the most important parts of running a business, so innovation has been geared toward giving users and organizations alike the security they need. That being said, a lot can change in a short period of time. Let’s take a look at some predictions for how security will change in the near future.

0 Comments
Continue reading

How to Be Sure Your Business Continuity Plan is Complete

How to Be Sure Your Business Continuity Plan is Complete

While it may not be fun to consider the worst-case scenario, it is important that you have a plan to ensure that your business will be able to survive when the chips are down. This plan to ensure that your business will continue is called (appropriately enough) a business continuity plan, and needs to address a few things that we will go over here.

0 Comments
Continue reading

Dispose of Your Old Tech Without Putting Yourself at Risk

Dispose of Your Old Tech Without Putting Yourself at Risk

The one truth about technology is that it will always break--usually at the most inopportune time. When it does finally kick the bucket, how are you getting rid of it? It’s not as though you can just toss an old server or printer in the bin. Recycling your technology is the most responsible thing to do, but you have to be cognizant of the company you are trusting to dispose of your Compaq Presario from 1997, because they may not be doing what they are claiming to do; or worse yet, they may be trying to syphon data off your old hardware.

0 Comments
Continue reading

Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

0 Comments
Continue reading

Power Off, or Leave It On?

Power Off, or Leave It On?

At the end of the day, do you shut down your computer or do you put it into sleep mode? Depending on what you need from your device the next day, you might want to consider which option benefits you the most. Here are some of the pros and cons of both approaches so that you can pick which one best suits your situation.

0 Comments
Continue reading

Are You Making Yourself Vulnerable Over Social Media?

Are You Making Yourself Vulnerable Over Social Media?

Social media might make it easy to stay connected, but it comes with a lot of negative side-effects--particularly in regard to security for both personal and professional use. If social media isn’t used properly, it could spell trouble for your organization. How can you foster proper social media usage so that your organization doesn’t suffer from poor security practices? It all starts by spreading awareness.

0 Comments
Continue reading

Tech Term: What Does “Encryption” Mean?

Tech Term: What Does “Encryption” Mean?

Email is a solution that needs to be protected, lest you expose important information to any onlookers while messages are in transit. Encryption is one of the key ways you can make sure that your messages are safe, but email hasn’t always used this method to secure messages. In fact, it wasn’t until relatively recently that encryption became a staple of the major email providers.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Hackers User Tips Malware Microsoft Computer Business Computing Internet Google Network Security Hosted Solutions Productivity Software Tech Term Communication Mobile Devices Efficiency IT Services Data Small Business Backup Hardware Smartphone Workplace Tips Windows 10 Ransomware Android IT Support Productivity Microsoft Office Saving Money Browser Cloud Computing Business Continuity Managed IT Services Data Management Data Recovery Data Backup Gmail Office 365 Internet of Things Facebook Innovation Server Users Windows Upgrade Managed IT Services Word Passwords Disaster Recovery Smartphones App Outsourced IT Phishing Social Media Windows 10 Artificial Intelligence Employer-Employee Relationship communications Vulnerability Cybersecurity Business Management Managed Service Provider VoIP Remote Monitoring Encryption Network Chrome Mobile Device Content Filtering Managed Service Tip of the week Money Big Data Miscellaneous Information Government Applications Spam Save Money BYOD Website Infrastructure Apple Office Tips Analytics Hacker IT Support Employee-Employer Relationship Virtual Reality Firewall Bandwidth Robot YouTube Tablet Paperless Office Printing Automation Education Antivirus WiFi Access Control Risk Management Avoiding Downtime Wireless The Internet of Things Router Virtualization Customer Service IT Management Data storage Settings Display Maintenance Two-factor Authentication Outlook Company Culture Quick Tips Hosted Solution Hacking Scam Monitors SaaS Solid State Drive Networking Presentation Search Operating System IBM HIPAA End of Support Development Office Holiday Computing Unified Threat Management Hard Disk Drive VPN Mobile Device Management Data Security Wireless Technology Password Administration Gadgets Google Drive Customer Relationship Management Data loss Business Technology Recovery Mouse Vendor Management Virtual Private Network Wi-Fi Chromebook Laptop Mobile Security LiFi Computers Augmented Reality Server Management Storage Document Management Touchscreen Business Intelligence Safety Retail Apps Telephone Systems Downtime USB Security Cameras Training Scary Stories User Error Public Speaking Cyber Monday Social Networking Going Green Social Engineering Uninterrupted Power Supply Patch Management Language Recycling Human Error IP Address G Suite Cybercrime Competition Google Calendar Chatbots Social Students Automobile Bluetooth Blockchain Cost Management Corporate Profile Printer Wearable Technology Typing MSP Scalability Net Neutrality Screen Reader Computing Infrastructure Deep Learning Dongle Humor Managing Stress Managed Services Sports VoIP Smart Technology Motherboard PowerPoint Knowledge eWaste Device Mobile Office How To Legislation Identity Hacks Permissions Assessment WannaCry Undo Cryptocurrency Migration IT service Heating/Cooling FCC Smart Tech Budget LED Remote Computing Alerts Bring Your Own Device Service Level Agreement sip Cables Laptops Time Management Distributed Denial of Service How To Onboarding Update Experience Unified Communications Marketing Continuity Mobility Running Cable Firefox Comparison Slack Cabling Application Fraud Internet Exlporer SharePoint Bitcoin Network Congestion Charging Digital Payment Virtual Desktop BDR Servers Title II Connectivity Smart Office Co-Managed IT Licensing Best Practice telephony Wires Software as a Service Politics Buisness Network Management Managed IT Service Modem Information Technology Digital Signage Solar Print Toner Lithium-ion battery Techology Specifications Compliance Writing Monitoring Collaboration IT solutions Managed IT Value Google Docs Digital Lenovo Downloads IT Technicians Windows 8 Messaging Google Maps Online IoT Work Content Mail Merge Hard Drives Cooperation Business Growth Voice over Internet Protocol Entertainment Tech Support 5G Break Fix Cookies Google Wallet Desktop Shortcuts Computer Care Halloween Unified Threat Management Black Friday Regulations Current Events Spying File Sharing Cortana Disaster Shortcut Hotspot Professional Services Samsung Spyware Superfish Multi-Factor Security Mirgation Analysis Employee-Employer Relationships Fun Statistics Microsoft Excel Star Wars Legal Optimization Streaming Address Refrigeration Staff Alt Codes Dark Data FinTech iOS Websites Identity Theft User Dark Web Nanotechnology Drones Troubleshooting Law Enforcement Travel Notifications CrashOverride Botnet Supercomputer Unsupported Software Printers Twitter Gadget Staffing Motion Sickness Crowdsourcing Taxes Personal Information Administrator Web Server Emergency Machine Learning IT Budget Mobile Data GPS IT Consultant Computer Repair Processors Cameras Windows 7 Relocation Tracking Meetings Cleaning Mobile Computing Health Alert CCTV Regulation Private Cloud Physical Security Upgrades Emoji Webcam Work/Life Balance Domains Electronic Medical Records Error 3D Printing Black Market Point of Sale