Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Hide Yourself from Skype

Tip of the Week: How to Hide Yourself from Skype

In a recent update, Microsoft added Skype to the taskbars of many PCs. While many may believe that they don’t use Skype, they actually have an account because it is tied to their Microsoft account. If you don’t want people to be able to find you on the video chatting service, you’re going to want to follow the instructions we’ve outlined here.

0 Comments
Continue reading

Have You Adopted Messaging in Your Business Processes?

Have You Adopted Messaging in Your Business Processes?

It has become more evident than ever: any business that wants to be successful needs to have the proper means of communication established. For many years, this meant utilizing email for business correspondence. Now, while email still has a valuable place in business operations, users rely on messaging platforms that almost ensure that they get their point across instantly.

0 Comments
Continue reading

Tech Terminology: PDF

Tech Terminology: PDF

Today, while the world is still effectively split between PCs and Macs, we have at least one file format that bridges the divide: the PDF. This file format became standard in business communications, and is now used the world over. Today, we’ll dive into the history of the Portable Document Format and why it is so well-suited to business processes.

0 Comments
Continue reading

How to Select a Phone Solution (and How to Properly Use It)

How to Select a Phone Solution (and How to Properly Use It)

Considering how long we’ve had access to the basic technology, telephones (and proper telephone etiquette while using them) haven’t changed all that much on the surface. What has changed is how the technology fundamentally works, and the options that are available for businesses. Here, we’ll go over some of the options today’s businesses have.

0 Comments
Continue reading

Why You Should Be Encrypting Your Emails

Why You Should Be Encrypting Your Emails

Encryption can be an invaluable tool for your company, especially where your email communications are concerned. Here, we’ll go over a few of the benefits you can see by adopting it - but first, we’ll briefly go over what encryption is.

0 Comments
Continue reading

How to Form Better Business Relationships

How to Form Better Business Relationships

“Even the Lone Ranger didn’t do it alone.” - Harvey MacKay

In business, there’s a good argument to be made that the most important capital is your social capital. In other words, your relationships with those around you hold quite a bit of value. Below, we’ll review some ways to form positive relationships with those that you have connected with as a result of your business operations.

0 Comments
Continue reading

Checking in on Today’s Virtual Assistants

Checking in on Today’s Virtual Assistants

The virtual assistant has become a commonly-known feature of most technology around today. While many people might first associate them with their mobile devices, virtual assistants have been appearing in more and more technologies. What assistants are out there today, and what capabilities do they have? Let’s discuss.

0 Comments
Continue reading

Spruce Up Your Business with Digital Signs

Spruce Up Your Business with Digital Signs

The modern office is a wonderland of incredible new technology solutions designed to augment both your employees’ and your visitors’ experience, and nowhere is this more true than with digital signage.

0 Comments
Continue reading

Tip of the Week: How to Add a Watermark in Microsoft Word

Tip of the Week: How to Add a Watermark in Microsoft Word

Adding a watermark to a document is a great way to very visibly share a message about the contents of a document. Microsoft Word makes it pretty easy to do it yourself and leverage the associated benefits. Below, we explain how.

0 Comments
Continue reading

Tech Term: What Does “Encryption” Mean?

Tech Term: What Does “Encryption” Mean?

Email is a solution that needs to be protected, lest you expose important information to any onlookers while messages are in transit. Encryption is one of the key ways you can make sure that your messages are safe, but email hasn’t always used this method to secure messages. In fact, it wasn’t until relatively recently that encryption became a staple of the major email providers.

0 Comments
Continue reading

How to Keep IT and the Rest of Your Staff on the Same Side

How to Keep IT and the Rest of Your Staff on the Same Side

There are some facets to IT that are universally accepted as important, such as security. However, there are also others that create some conflicting opinions between management and IT personnel. When surveyed, business leaders and IT management held vastly different opinions as to the importance of various IT tasks. Is there a way to unify these priorities?

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business Malware User Tips Computer Business Computing Internet Network Security Tech Term Microsoft Software Productivity Google Hosted Solutions Mobile Devices Efficiency IT Services Small Business Communication Windows 10 Hardware Ransomware Backup Smartphone Data Android IT Support Productivity Saving Money Workplace Tips Managed IT Services Data Management Browser Microsoft Office Data Recovery Gmail Windows Managed IT Services Facebook Server Business Continuity Cloud Computing Upgrade Internet of Things Word App Passwords Innovation Office 365 Data Backup Phishing Disaster Recovery Managed Service Provider Business Management VoIP Employer-Employee Relationship Artificial Intelligence Encryption Remote Monitoring Outsourced IT Mobile Device Windows 10 Users Smartphones Cybersecurity IT Support Government Applications Information Money BYOD Office Tips Infrastructure Network Chrome Content Filtering Spam Big Data Miscellaneous Website communications Tip of the week Vulnerability Analytics Social Media Router Display Firewall Robot Customer Service Printing Automation WiFi Avoiding Downtime Hacker Settings Two-factor Authentication IT Management The Internet of Things Maintenance Virtual Reality Bandwidth Save Money YouTube Paperless Office Apple Tablet Employee-Employer Relationship Risk Management Wireless Data storage Access Control Antivirus Managed Service Mobile Device Management Unified Threat Management Apps Administration Holiday VPN Customer Relationship Management Hacking Wi-Fi Data Security Outlook Laptop Data loss Business Technology Development Monitors Virtual Private Network Augmented Reality Mobile Security Safety Presentation Operating System Server Management Document Management Touchscreen End of Support Office Computing Downtime Password Wireless Technology Google Drive Hosted Solution Telephone Systems Gadgets Virtualization Mouse Vendor Management Recovery Quick Tips Business Intelligence Scam LiFi SaaS Search Education Computers Company Culture Storage IBM Retail Networking HIPAA Running Cable Distributed Denial of Service WannaCry Update Legal IT service Alerts Heating/Cooling Service Level Agreement MSP Comparison Hard Disk Drive PowerPoint Refrigeration Drones Virtual Desktop Fraud Time Management Internet Exlporer Managing Stress Managed Services User Alt Codes Dark Data Going Green Social Engineering Buisness Title II Firefox Connectivity eWaste Device Public Speaking SharePoint Cabling Digital Payment Lithium-ion battery Managed IT Service Modem Chromebook LED Competition IT solutions BDR Licensing Servers Politics Social Specifications Compliance Onboarding Collaboration Network Management Value Cables Laptops Typing 5G Online IoT Techology Continuity Mobility Deep Learning Humor Downloads IT Technicians Managed IT Slack Halloween Break Fix Digital Cookies Lenovo Smart Office Co-Managed IT Cortana Google Maps Cooperation Charging Tech Support Hacks Black Friday Regulations Mail Merge Digital Signage File Sharing Undo Budget Fun Hotspot Professional Services Wires Software as a Service Computer Care Cryptocurrency Marketing How To Microsoft Excel Star Wars Unified Threat Management Solar Samsung Print Toner Bring Your Own Device sip Multi-Factor Security Disaster Mirgation Shortcut Monitoring Scary Stories Dark Web Spyware Nanotechnology Superfish Work Content Staff Statistics Websites Identity Theft Application Cybercrime Cyber Monday Social Networking Address Desktop Language USB Voice over Internet Protocol Training Bitcoin Network Congestion IP Address Spying Automobile Information Technology Blockchain Cost Management User Error Shortcuts G Suite Best Practice telephony Google Calendar Uninterrupted Power Supply Chatbots Patch Management Writing Sports Net Neutrality Screen Reader Optimization Streaming Google Docs Knowledge Printer Wearable Technology Bluetooth Analysis Mobile Office Smart Technology Corporate Profile Motherboard Troubleshooting Computing Infrastructure Dongle FinTech Windows 8 Hard Drives Google Wallet Permissions VoIP Assessment Security Cameras Business Growth Legislation Solid State Drive Identity Current Events FCC How To Smart Tech Recycling Remote Computing Human Error Experience Unified Communications Emergency Printers GPS Computer Repair 3D Printing IT Consultant Processors Cameras Relocation Meetings Tracking Health Unsupported Software Cleaning Alert CCTV Private Cloud Emoji Webcam Electronic Medical Records Mobile Data Work/Life Balance Error Black Market Point of Sale Regulation Travel Law Enforcement Entertainment Notifications Mobile Computing CrashOverride Twitter Botnet Supercomputer Motion Sickness Physical Security Gadget Staffing Personal Information Administrator Upgrades Crowdsourcing Taxes Web Server Domains Machine Learning IT Budget