Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Terminology: Cookies

Tech Terminology: Cookies

Everyone loves cookies, but browser cookies take on a whole other definition in the computing environment. Do you know what browser cookies do, as well as what their purpose is? Today’s tech term is dedicated to cookies--they might not be delicious, but they do serve an important role within your organization.

0 Comments
Continue reading

Tech Term: Cookies

Tech Term: Cookies

Browser cookies might not sound delicious, but they are a particularly important part of your browser’s technology. Do you actually know what they do, though? Today’s tech term will explain just what these cookies are, as well as the purpose they serve for your organization.

0 Comments
Continue reading

Tip of the Week: Tricks for Better Internet Browsing

Tip of the Week: Tricks for Better Internet Browsing

If you use the Internet every single day, you’ll start to realize that you can use it more effectively for achieving your goals. In cases like this, it’s important to look at ways you can improve your overall use of the Internet, as it’s the key way you access important information, applications, and contacts. Here are some day-to-day tips that you can use to help improve your mastery of the Internet.

0 Comments
Continue reading

Tip of the Week: Control Where Your Downloads Are Saved

Tip of the Week: Control Where Your Downloads Are Saved

Whenever you download a file from the Internet, the file will, by default, go to an aptly-titled folder in Windows called Downloads. Unless you change the default settings, your files will always be saved here. But what if you want to make it so that your downloads go somewhere else? You can accomplish this pretty easily. We’ll walk you through how to do it for some of the most popular browsers, including Google Chrome, Microsoft Edge, and Mozilla Firefox.

0 Comments
Continue reading

Tip of the Week: Closed a Tab Accidentally? Here’s How to Restore It

Tip of the Week: Closed a Tab Accidentally? Here’s How to Restore It

Everyone has accidentally closed an important web browser tab before they were finished with it. What can you really do about it, though? You might expect that you have to search for the page again, but there’s a much easier way to do it. In your Google Chrome browser on a PC or smartphone, you can reopen closed tabs relatively easily.

0 Comments
Continue reading

Tip of the Week: How to Clear Browser Cache in Chrome, Firefox, and Edge

Tip of the Week: How to Clear Browser Cache in Chrome, Firefox, and Edge

Does it feel like your web browser is running slower than it should? Or is your browser prone to freezing up and crashing? If so, there’s one easy troubleshooting tip that you’ll want to try: clearing the cache.

0 Comments
Continue reading

Malvertising: Hackers are Paying For Ad Space on Popular Websites

b2ap3_thumbnail_click_on_malware_ad_400.jpgA good business practices extreme caution when using the Internet, thanks to hackers using any means possible to unleash threats against organizations of all sizes. You teach your employees how to avoid threats and to avoid suspicious websites, but what if that’s not enough to keep hackers out of your network infrastructure?

0 Comments
Continue reading

Tip of the Week: 5 Common Sense Tactics to Safeguard Your Online Identity

b2ap3_thumbnail_anonymous_internet_use_400.jpgThe Internet can be a dangerous place thanks to the anonymity it provides. Yet, this anonymity is limited, especially if you take part in questionable Internet browsing activities. Take, for instance, the hack of Ashley Madison, a website dedicated to cheating on one’s spouse. This July, a hacker group called the “Impact Team,” infiltrated the site and is now threatening to expose these cheaters.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Hackers User Tips Malware Microsoft Computer Business Computing Network Security Hosted Solutions Productivity Internet Google Tech Term Software Mobile Devices Efficiency IT Services Communication Data Small Business Backup Hardware Workplace Tips Windows 10 Ransomware Smartphone IT Support Android Productivity Microsoft Office Saving Money Data Recovery Business Continuity Data Management Managed IT Services Cloud Computing Browser Gmail Office 365 Internet of Things Facebook Managed IT Services Server Innovation Users Windows Upgrade Data Backup Word Passwords Smartphones Disaster Recovery Outsourced IT Windows 10 App Phishing Social Media Business Management communications Artificial Intelligence Remote Monitoring Managed Service Provider VoIP Mobile Device Encryption Network Chrome Vulnerability Cybersecurity Employer-Employee Relationship Big Data Government Information Miscellaneous Applications Money Infrastructure BYOD Spam Website Save Money Office Tips Tip of the week Apple Hacker Managed Service Content Filtering Analytics IT Support YouTube Router Education WiFi Risk Management Avoiding Downtime Robot Printing The Internet of Things Wireless Automation Virtualization IT Management Maintenance Virtual Reality Customer Service Tablet Paperless Office Employee-Employer Relationship Settings Antivirus Two-factor Authentication Data storage Firewall Bandwidth Access Control Display Data Security Outlook Data loss Business Technology Development Search Presentation Chromebook Virtual Private Network Monitors IBM Server Management Mobile Security Office Wireless Technology Administration Operating System Gadgets Mobile Device Management Document Management Touchscreen Customer Relationship Management Recovery End of Support Computing Telephone Systems Wi-Fi Google Drive Laptop Password Augmented Reality Mouse Vendor Management Business Intelligence Quick Tips Scam LiFi Safety Apps SaaS Solid State Drive Company Culture Computers Storage Networking Downtime Retail Hosted Solution Hacking Unified Threat Management Hard Disk Drive VPN HIPAA Holiday Drones Cabling Alerts Service Level Agreement eWaste Device Alt Codes Dark Data Firefox Distributed Denial of Service Going Green Social Engineering BDR Servers Fraud Internet Exlporer Knowledge LED Comparison Sports Migration Digital Payment Onboarding SharePoint Mobile Office Cables Laptops Politics Social Network Management Title II Connectivity Slack Undo Collaboration Managed IT Licensing Continuity Mobility Typing Managed IT Service Techology Modem Google Maps Value Smart Office Experience Co-Managed IT Unified Communications Deep Learning Humor Digital Specifications Lenovo Compliance Marketing Charging IoT Digital Signage Downloads Mail Merge IT Technicians Wires Application Running Cable Software as a Service Tech Support Hacks Online Monitoring Virtual Desktop File Sharing Budget Disaster Shortcut Cooperation Solar Print Toner Computer Care Cryptocurrency Break Fix Unified Threat Management Cookies How To Statistics Hotspot Professional Services Work Content Samsung Bring Your Own Device sip Spyware Black Friday Superfish Regulations Buisness Messaging Microsoft Excel Star Wars Desktop IT solutions Multi-Factor Security Address Mirgation Lithium-ion battery Voice over Internet Protocol Entertainment Websites Identity Theft Spying Uninterrupted Power Supply Patch Management Staff Shortcuts Training Bitcoin Network Congestion Dark Web User Error Nanotechnology Information Technology Bluetooth Language USB Optimization Streaming G Suite Best Practice telephony Cyber Monday Social Networking 5G Analysis Hard Drives Employee-Employer Relationships Automobile Blockchain Cost Management Cortana Troubleshooting Google Docs Corporate Profile Google Calendar Chatbots FinTech Halloween iOS Writing Fun Printer Wearable Technology Security Cameras Windows 8 VoIP Net Neutrality Screen Reader Google Wallet Computing Infrastructure Dongle Recycling User Human Error Business Growth How To Smart Technology Motherboard Refrigeration Students IT service Heating/Cooling Permissions Assessment Public Speaking Remote Computing WannaCry Legislation Identity MSP Scary Stories Scalability Current Events PowerPoint Competition Update Legal IP Address Managing Stress Cybercrime Managed Services Time Management FCC Smart Tech Computer Repair 3D Printing IT Consultant Processors Cameras Relocation Meetings Tracking Health Unsupported Software Cleaning Alert CCTV Windows 7 Private Cloud Emoji Webcam Electronic Medical Records Mobile Data Work/Life Balance Regulation Error Black Market Point of Sale Travel Law Enforcement Notifications CrashOverride Domains Twitter Botnet Supercomputer Mobile Computing Motion Sickness Physical Security Gadget Staffing Administrator Upgrades Crowdsourcing Taxes Personal Information Printers Web Server Emergency Machine Learning IT Budget GPS