Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Terminology: Cookies

Tech Terminology: Cookies

Everyone loves cookies, but browser cookies take on a whole other definition in the computing environment. Do you know what browser cookies do, as well as what their purpose is? Today’s tech term is dedicated to cookies--they might not be delicious, but they do serve an important role within your organization.

0 Comments
Continue reading

Tech Term: Cookies

Tech Term: Cookies

Browser cookies might not sound delicious, but they are a particularly important part of your browser’s technology. Do you actually know what they do, though? Today’s tech term will explain just what these cookies are, as well as the purpose they serve for your organization.

0 Comments
Continue reading

Tip of the Week: Tricks for Better Internet Browsing

Tip of the Week: Tricks for Better Internet Browsing

If you use the Internet every single day, you’ll start to realize that you can use it more effectively for achieving your goals. In cases like this, it’s important to look at ways you can improve your overall use of the Internet, as it’s the key way you access important information, applications, and contacts. Here are some day-to-day tips that you can use to help improve your mastery of the Internet.

0 Comments
Continue reading

Tip of the Week: Control Where Your Downloads Are Saved

Tip of the Week: Control Where Your Downloads Are Saved

Whenever you download a file from the Internet, the file will, by default, go to an aptly-titled folder in Windows called Downloads. Unless you change the default settings, your files will always be saved here. But what if you want to make it so that your downloads go somewhere else? You can accomplish this pretty easily. We’ll walk you through how to do it for some of the most popular browsers, including Google Chrome, Microsoft Edge, and Mozilla Firefox.

0 Comments
Continue reading

Tip of the Week: Closed a Tab Accidentally? Here’s How to Restore It

Tip of the Week: Closed a Tab Accidentally? Here’s How to Restore It

Everyone has accidentally closed an important web browser tab before they were finished with it. What can you really do about it, though? You might expect that you have to search for the page again, but there’s a much easier way to do it. In your Google Chrome browser on a PC or smartphone, you can reopen closed tabs relatively easily.

0 Comments
Continue reading

Tip of the Week: How to Clear Browser Cache in Chrome, Firefox, and Edge

Tip of the Week: How to Clear Browser Cache in Chrome, Firefox, and Edge

Does it feel like your web browser is running slower than it should? Or is your browser prone to freezing up and crashing? If so, there’s one easy troubleshooting tip that you’ll want to try: clearing the cache.

0 Comments
Continue reading

Malvertising: Hackers are Paying For Ad Space on Popular Websites

b2ap3_thumbnail_click_on_malware_ad_400.jpgA good business practices extreme caution when using the Internet, thanks to hackers using any means possible to unleash threats against organizations of all sizes. You teach your employees how to avoid threats and to avoid suspicious websites, but what if that’s not enough to keep hackers out of your network infrastructure?

0 Comments
Continue reading

Tip of the Week: 5 Common Sense Tactics to Safeguard Your Online Identity

b2ap3_thumbnail_anonymous_internet_use_400.jpgThe Internet can be a dangerous place thanks to the anonymity it provides. Yet, this anonymity is limited, especially if you take part in questionable Internet browsing activities. Take, for instance, the hack of Ashley Madison, a website dedicated to cheating on one’s spouse. This July, a hacker group called the “Impact Team,” infiltrated the site and is now threatening to expose these cheaters.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business User Tips Microsoft Business Computing Malware Network Security Software Hosted Solutions Computer Google Productivity Internet Tech Term Communication Data Small Business Ransomware Mobile Devices Backup Efficiency IT Services Workplace Tips Hardware Smartphone Cloud Computing Windows 10 Data Recovery IT Support Android Microsoft Office Saving Money Productivity Office 365 Upgrade Gmail Browser Managed IT Services Data Management Information Business Continuity Facebook Users Social Media Windows Innovation Managed IT Services Server Internet of Things Mobile Device Phishing Data Backup Word Passwords Miscellaneous Outsourced IT Smartphones Disaster Recovery Windows 10 App Chrome Business Management Remote Monitoring communications Managed Service Provider VoIP Vulnerability Encryption Cybersecurity Artificial Intelligence Employer-Employee Relationship Network Hacker Managed Service Money Government Content Filtering Infrastructure BYOD Big Data Applications Gadgets Save Money Spam Website Apple Virtual Reality Tip of the week Analytics Apps IT Support Office Tips Settings Firewall Unified Threat Management VPN Two-factor Authentication Robot Access Control Printing Router Bandwidth Automation WiFi Development YouTube Avoiding Downtime The Internet of Things Education IT Management Virtualization Risk Management Wireless Maintenance Tablet Data storage Paperless Office Augmented Reality Display Customer Service Antivirus Employee-Employer Relationship Hard Disk Drive Monitors Holiday Data Security Downtime HIPAA Hosted Solution Data loss Business Technology Operating System Presentation Chromebook Virtual Private Network Collaboration End of Support Office Server Management Bring Your Own Device OneNote Computing Document Management Touchscreen Google Drive Wireless Technology Search Password Mouse Vendor Management Mobile Security Recovery IBM Telephone Systems Mobile Device Management LiFi Administration Quick Tips Computers Customer Relationship Management Scam Wi-Fi Storage Business Intelligence Laptop Retail SaaS Solid State Drive Networking Hacking Safety Company Culture Outlook Recycling Human Error Time Management Smart Technology Motherboard Competition Update Fun Students Social Computing Infrastructure Dongle Firefox Legislation Identity MSP Scalability Cabling Typing Permissions Assessment Digital Payment Managing Stress Scary Stories Managed Services BDR Servers Deep Learning Humor FCC Smart Tech PowerPoint Updates Politics IP Address eWaste Cybercrime Device Network Management Distributed Denial of Service Mixed Reality Hacks Alerts Service Level Agreement Techology Budget Comparison Undo Migration Managed IT Cryptocurrency Fraud Internet Exlporer LED How To SharePoint Marketing Private Cloud Cables Sports Laptops Google Maps sip Title II Connectivity Knowledge Onboarding Digital Lenovo Tech Support Mobile Office Continuity Mobility Managed IT Service Modem Slack Data Breach Mail Merge Licensing Application Unified Threat Management Specifications Compliance File Sharing Charging Disaster Shortcut Bitcoin Network Congestion Value Computer Care Smart Office Co-Managed IT Information Technology Downloads IT Technicians Wires Software as a Service Statistics Best Practice telephony Online IoT Samsung Experience Digital Signage Unified Communications GDPR Spyware Superfish Websites Identity Theft Solar Running Cable Print Toner Google Docs Break Fix Cookies Monitoring Hard Disk Drives Address Writing Cooperation Content User Error Black Friday Regulations Virtual Desktop Messaging Uninterrupted Power Supply Patch Management Windows 8 Hotspot Professional Services Training Work Google Wallet Multi-Factor Security Mirgation Hard Drives Automobile Voice over Internet Protocol Buisness Entertainment Bluetooth Business Growth Microsoft Excel Star Wars G Suite Desktop Data Warehouse Lithium-ion battery Shortcuts Dark Web Nanotechnology Spying IT solutions Solid State Drives Corporate Profile Current Events Staff Optimization Streaming VoIP Legal Cyber Monday Social Networking Analysis Employee-Employer Relationships Language USB How To Drones Google Calendar Chatbots Refrigeration 5G FinTech iOS Alt Codes Dark Data Blockchain Cost Management User Troubleshooting Wearable Technology Halloween Security Cameras IT service Heating/Cooling Net Neutrality Screen Reader Public Speaking Remote Computing Cortana National Security WannaCry Business Analysis Going Green Social Engineering Printer GPS Unsupported Software Computer Repair IT Consultant Printers Relocation Processors Cameras Tracking Meetings Mobile Data Health Cleaning Alert CCTV Emoji Webcam Electronic Medical Records Windows 7 Work/Life Balance Error Black Market Point of Sale Mobile Computing Physical Security Travel Regulation Law Enforcement Upgrades Notifications CrashOverride Botnet Supercomputer Domains Twitter Motion Sickness Gadget Staffing 3D Printing Personal Information Administrator Crowdsourcing Taxes Machine Learning IT Budget Web Server Emergency