Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Terminology: Cookies

Tech Terminology: Cookies

Everyone loves cookies, but browser cookies take on a whole other definition in the computing environment. Do you know what browser cookies do, as well as what their purpose is? Today’s tech term is dedicated to cookies--they might not be delicious, but they do serve an important role within your organization.

0 Comments
Continue reading

Tech Term: Cookies

Tech Term: Cookies

Browser cookies might not sound delicious, but they are a particularly important part of your browser’s technology. Do you actually know what they do, though? Today’s tech term will explain just what these cookies are, as well as the purpose they serve for your organization.

0 Comments
Continue reading

Tip of the Week: Tricks for Better Internet Browsing

Tip of the Week: Tricks for Better Internet Browsing

If you use the Internet every single day, you’ll start to realize that you can use it more effectively for achieving your goals. In cases like this, it’s important to look at ways you can improve your overall use of the Internet, as it’s the key way you access important information, applications, and contacts. Here are some day-to-day tips that you can use to help improve your mastery of the Internet.

0 Comments
Continue reading

Tip of the Week: Control Where Your Downloads Are Saved

Tip of the Week: Control Where Your Downloads Are Saved

Whenever you download a file from the Internet, the file will, by default, go to an aptly-titled folder in Windows called Downloads. Unless you change the default settings, your files will always be saved here. But what if you want to make it so that your downloads go somewhere else? You can accomplish this pretty easily. We’ll walk you through how to do it for some of the most popular browsers, including Google Chrome, Microsoft Edge, and Mozilla Firefox.

0 Comments
Continue reading

Tip of the Week: Closed a Tab Accidentally? Here’s How to Restore It

Tip of the Week: Closed a Tab Accidentally? Here’s How to Restore It

Everyone has accidentally closed an important web browser tab before they were finished with it. What can you really do about it, though? You might expect that you have to search for the page again, but there’s a much easier way to do it. In your Google Chrome browser on a PC or smartphone, you can reopen closed tabs relatively easily.

0 Comments
Continue reading

Tip of the Week: How to Clear Browser Cache in Chrome, Firefox, and Edge

Tip of the Week: How to Clear Browser Cache in Chrome, Firefox, and Edge

Does it feel like your web browser is running slower than it should? Or is your browser prone to freezing up and crashing? If so, there’s one easy troubleshooting tip that you’ll want to try: clearing the cache.

0 Comments
Continue reading

Malvertising: Hackers are Paying For Ad Space on Popular Websites

b2ap3_thumbnail_click_on_malware_ad_400.jpgA good business practices extreme caution when using the Internet, thanks to hackers using any means possible to unleash threats against organizations of all sizes. You teach your employees how to avoid threats and to avoid suspicious websites, but what if that’s not enough to keep hackers out of your network infrastructure?

0 Comments
Continue reading

Tip of the Week: 5 Common Sense Tactics to Safeguard Your Online Identity

b2ap3_thumbnail_anonymous_internet_use_400.jpgThe Internet can be a dangerous place thanks to the anonymity it provides. Yet, this anonymity is limited, especially if you take part in questionable Internet browsing activities. Take, for instance, the hack of Ashley Madison, a website dedicated to cheating on one’s spouse. This July, a hacker group called the “Impact Team,” infiltrated the site and is now threatening to expose these cheaters.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business Malware User Tips Computer Business Computing Network Security Internet Google Microsoft Software Tech Term Productivity Hosted Solutions Mobile Devices Efficiency IT Services Communication Small Business Ransomware Backup Windows 10 Hardware Android Smartphone Data Saving Money IT Support Workplace Tips Productivity Microsoft Office Browser Managed IT Services Data Management Facebook Server Data Recovery Upgrade Business Continuity Internet of Things Managed IT Services Gmail Windows Cloud Computing Office 365 Phishing Word Disaster Recovery Passwords Innovation App Data Backup Cybersecurity Users Artificial Intelligence Remote Monitoring Smartphones Outsourced IT Business Management Managed Service Provider Employer-Employee Relationship VoIP Mobile Device Windows 10 Encryption Chrome Applications Content Filtering Analytics Spam Information Website IT Support Big Data Miscellaneous communications Social Media Infrastructure Money Government BYOD Tip of the week Office Tips Network Vulnerability Managed Service Apple Antivirus Hacker Settings Two-factor Authentication Virtual Reality Data storage Paperless Office Bandwidth Display YouTube Risk Management Robot Wireless Printing Automation IT Management Firewall Maintenance WiFi Access Control Customer Service Avoiding Downtime Router Tablet Save Money Employee-Employer Relationship The Internet of Things Gadgets Wireless Technology Computers Networking Recovery Downtime Virtualization Storage Retail Mobile Security Hosted Solution VPN Data Security Development Data loss Business Technology SaaS Outlook Virtual Private Network Monitors Search Education Server Management Holiday Apps IBM Unified Threat Management Touchscreen Hacking Administration Operating System Mobile Device Management Telephone Systems Customer Relationship Management End of Support Wi-Fi Computing Laptop Business Intelligence Password Quick Tips Google Drive Augmented Reality Mouse Vendor Management Document Management Presentation HIPAA Scam Safety Company Culture Office LiFi Application Title II Connectivity Fun Websites Identity Theft SharePoint Recycling Windows 8 Human Error How To Managed IT Service Modem MSP Google Wallet IT service Heating/Cooling Training Licensing Business Growth WannaCry Specifications Compliance Scary Stories Managing Stress Current Events Managed Services Time Management G Suite Value PowerPoint Hard Disk Drive Automobile Firefox Online IoT Legal Cabling Downloads IT Technicians IP Address Cybercrime eWaste Device Break Fix Cookies Drones BDR Servers Cooperation Alt Codes LED Dark Data Black Friday Regulations Sports Cables Going Green Laptops Social Engineering Network Management Hard Drives Hotspot Professional Services Knowledge Onboarding Mobility Techology Remote Computing Microsoft Excel Star Wars Slack Managed IT Multi-Factor Security Mirgation Mobile Office Continuity Social Dark Web Nanotechnology Charging Google Maps Staff Smart Office Typing Co-Managed IT Digital Lenovo Update User Cyber Monday Social Networking Wires Software as a Service Refrigeration Language USB Experience Unified Communications Deep Learning Digital Signage Humor Mail Merge Solar Hacks Print Toner Unified Threat Management Blockchain Cost Management Monitoring Disaster Shortcut Digital Payment Public Speaking Google Calendar Chatbots Running Cable Net Neutrality Screen Reader Virtual Desktop Budget Statistics Politics Competition Printer Wearable Technology Work Cryptocurrency Content Spyware Superfish Chromebook Smart Technology Motherboard Buisness Voice over Internet Protocol How To Computing Infrastructure Dongle Bring Your Own Device Desktop sip Address Collaboration Shortcuts User Error Permissions Assessment IT solutions Spying Uninterrupted Power Supply Patch Management Legislation Identity Lithium-ion battery FCC Smart Tech Analysis Bluetooth Tech Support Optimization Bitcoin Streaming Network Congestion Distributed Denial of Service 5G FinTech Information Technology Computer Care Undo Alerts Service Level Agreement Best Practice Troubleshooting telephony Corporate Profile File Sharing Halloween Security Cameras Writing VoIP Samsung Marketing Fraud Internet Exlporer Cortana Google Docs Solid State Drive Comparison Black Market Point of Sale Physical Security Upgrades Law Enforcement Printers Emergency Travel Notifications Twitter Botnet Supercomputer 3D Printing Gadget Staffing Motion Sickness Crowdsourcing Taxes Personal Information Administrator Web Server Machine Learning IT Budget Domains Unsupported Software GPS IT Consultant Computer Repair Processors Cameras Relocation Regulation Mobile Data Tracking Meetings Entertainment Cleaning Health Alert CCTV Private Cloud Webcam CrashOverride Emoji Work/Life Balance Electronic Medical Records Mobile Computing Error