Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Social Media Can Be a Great Business Tool, So Long as It’s Secured

Social Media Can Be a Great Business Tool, So Long as It’s Secured

There is no denying that social media is one of the most powerful communication tools of our time, especially for businesses trying to communicate with their clients and customers. However, while you will want to have an account for your business on social media, you might not want a presence of your own. Today, we’ll discuss this quandary, and how you can resolve it.

0 Comments
Continue reading

Tip of the Week: How to Hide Yourself from Skype

Tip of the Week: How to Hide Yourself from Skype

In a recent update, Microsoft added Skype to the taskbars of many PCs. While many may believe that they don’t use Skype, they actually have an account because it is tied to their Microsoft account. If you don’t want people to be able to find you on the video chatting service, you’re going to want to follow the instructions we’ve outlined here.

0 Comments
Continue reading

Have You Adopted Messaging in Your Business Processes?

Have You Adopted Messaging in Your Business Processes?

It has become more evident than ever: any business that wants to be successful needs to have the proper means of communication established. For many years, this meant utilizing email for business correspondence. Now, while email still has a valuable place in business operations, users rely on messaging platforms that almost ensure that they get their point across instantly.

0 Comments
Continue reading

Tech Terminology: PDF

Tech Terminology: PDF

Today, while the world is still effectively split between PCs and Macs, we have at least one file format that bridges the divide: the PDF. This file format became standard in business communications, and is now used the world over. Today, we’ll dive into the history of the Portable Document Format and why it is so well-suited to business processes.

0 Comments
Continue reading

How to Select a Phone Solution (and How to Properly Use It)

How to Select a Phone Solution (and How to Properly Use It)

Considering how long we’ve had access to the basic technology, telephones (and proper telephone etiquette while using them) haven’t changed all that much on the surface. What has changed is how the technology fundamentally works, and the options that are available for businesses. Here, we’ll go over some of the options today’s businesses have.

0 Comments
Continue reading

Why You Should Be Encrypting Your Emails

Why You Should Be Encrypting Your Emails

Encryption can be an invaluable tool for your company, especially where your email communications are concerned. Here, we’ll go over a few of the benefits you can see by adopting it - but first, we’ll briefly go over what encryption is.

0 Comments
Continue reading

How to Form Better Business Relationships

How to Form Better Business Relationships

“Even the Lone Ranger didn’t do it alone.” - Harvey MacKay

In business, there’s a good argument to be made that the most important capital is your social capital. In other words, your relationships with those around you hold quite a bit of value. Below, we’ll review some ways to form positive relationships with those that you have connected with as a result of your business operations.

0 Comments
Continue reading

Checking in on Today’s Virtual Assistants

Checking in on Today’s Virtual Assistants

The virtual assistant has become a commonly-known feature of most technology around today. While many people might first associate them with their mobile devices, virtual assistants have been appearing in more and more technologies. What assistants are out there today, and what capabilities do they have? Let’s discuss.

0 Comments
Continue reading

Spruce Up Your Business with Digital Signs

Spruce Up Your Business with Digital Signs

The modern office is a wonderland of incredible new technology solutions designed to augment both your employees’ and your visitors’ experience, and nowhere is this more true than with digital signage.

0 Comments
Continue reading

Tip of the Week: How to Add a Watermark in Microsoft Word

Tip of the Week: How to Add a Watermark in Microsoft Word

Adding a watermark to a document is a great way to very visibly share a message about the contents of a document. Microsoft Word makes it pretty easy to do it yourself and leverage the associated benefits. Below, we explain how.

0 Comments
Continue reading

Tech Term: What Does “Encryption” Mean?

Tech Term: What Does “Encryption” Mean?

Email is a solution that needs to be protected, lest you expose important information to any onlookers while messages are in transit. Encryption is one of the key ways you can make sure that your messages are safe, but email hasn’t always used this method to secure messages. In fact, it wasn’t until relatively recently that encryption became a staple of the major email providers.

0 Comments
Continue reading

How to Keep IT and the Rest of Your Staff on the Same Side

How to Keep IT and the Rest of Your Staff on the Same Side

There are some facets to IT that are universally accepted as important, such as security. However, there are also others that create some conflicting opinions between management and IT personnel. When surveyed, business leaders and IT management held vastly different opinions as to the importance of various IT tasks. Is there a way to unify these priorities?

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers User Tips Malware Business Computing Computer Microsoft Network Security Hosted Solutions Productivity Google Software Internet Tech Term Data Small Business Mobile Devices Efficiency Backup Communication IT Services Ransomware Workplace Tips Hardware Windows 10 Smartphone Data Recovery IT Support Microsoft Office Saving Money Cloud Computing Android Productivity Managed IT Services Facebook Upgrade Windows Social Media Browser Gmail Business Continuity Data Management Internet of Things Information Server Users Innovation Managed IT Services Phishing Mobile Device Word Data Backup Office 365 Disaster Recovery Smartphones Outsourced IT App Windows 10 Passwords Business Management Managed Service Provider VoIP Remote Monitoring Encryption Network Chrome Employer-Employee Relationship Vulnerability Cybersecurity Artificial Intelligence Miscellaneous communications Managed Service Government Money Gadgets Spam Infrastructure BYOD Website Applications Office Tips Save Money Apps Virtual Reality Hacker Apple Tip of the week Analytics Content Filtering IT Support Big Data The Internet of Things Robot Risk Management Wireless Printing Automation Access Control Virtualization Router Development Customer Service Augmented Reality IT Management Maintenance Settings Two-factor Authentication Tablet Data storage Paperless Office Firewall Display Bandwidth Antivirus YouTube WiFi Avoiding Downtime Unified Threat Management Employee-Employer Relationship VPN Education IBM Office Data Security Data loss Business Technology Wireless Technology Operating System Chromebook Recovery Mobile Device Management Virtual Private Network HIPAA Administration Customer Relationship Management End of Support Server Management Bring Your Own Device Wi-Fi Computing Google Drive Laptop Password Document Management Touchscreen Mouse Vendor Management Telephone Systems Mobile Security LiFi Safety Computers Quick Tips Storage Hacking Downtime Scam Retail Hosted Solution SaaS Solid State Drive Business Intelligence Networking Outlook Presentation Hard Disk Drive Monitors Holiday Search Company Culture Smart Technology Motherboard Cabling Students Typing Marketing Computing Infrastructure Dongle Recycling Human Error Firefox Unified Communications MSP BDR Scalability Servers Deep Learning Humor Permissions Application Assessment Legislation Identity Digital Payment Experience FCC Smart Tech Running Cable PowerPoint Updates Hacks Politics Managing Stress Managed Services Network Management Distributed Denial of Service Collaboration Mixed Reality Managed IT Cryptocurrency Alerts Service Level Agreement Virtual Desktop eWaste Device Techology Budget Google Maps Migration sip Fraud Internet Exlporer Buisness LED Digital Lenovo How To Comparison Private Cloud Title II Connectivity Lithium-ion battery Onboarding Mail Merge SharePoint Tech Support IT solutions Cables Laptops Managed IT Service Modem File Sharing Slack Disaster Data Breach Shortcut Bitcoin Network Congestion Licensing Hard Drives Computer Care Continuity Mobility Unified Threat Management Charging Statistics Best Practice telephony Samsung Value 5G Smart Office Co-Managed IT Spyware Superfish Information Technology Specifications Compliance Wires Software as a Service Google Docs Online IoT Halloween Digital Signage Address Writing Downloads IT Technicians Websites Identity Theft Cortana Break Fix User Cookies Monitoring Uninterrupted Power Supply Hard Disk Drives Patch Management Windows 8 Cooperation Refrigeration Training Fun Solar Print Toner User Error Messaging Bluetooth Business Growth Hotspot Professional Services G Suite Work Content Google Wallet Black Friday Regulations Automobile Public Speaking Voice over Internet Protocol Entertainment Microsoft Excel Star Wars Scary Stories Desktop Corporate Profile Current Events Multi-Factor Security Mirgation Competition Dark Web Nanotechnology IP Address Cybercrime Spying Solid State Drives Staff Shortcuts VoIP Legal Cyber Monday Social Networking Analysis Employee-Employer Relationships Alt Codes Dark Data Language USB Optimization Streaming How To Drones FinTech IT service iOS Heating/Cooling Blockchain Remote Computing Cost Management Sports Troubleshooting WannaCry Going Green Social Engineering Google Calendar Chatbots Knowledge Net Neutrality Update Screen Reader Mobile Office National Security Social Printer Wearable Technology Undo Security Cameras Time Management Computer Repair IT Consultant Unsupported Software Processors Cameras Printers Relocation Meetings Tracking Health Cleaning Mobile Data Alert CCTV Emoji Webcam Electronic Medical Records Work/Life Balance Windows 7 Error Domains Black Market Point of Sale Mobile Computing Travel Law Enforcement Physical Security Regulation Notifications CrashOverride Upgrades Twitter Botnet Supercomputer Motion Sickness Gadget Staffing Personal Information Administrator Crowdsourcing Taxes 3D Printing Web Server Emergency Machine Learning IT Budget GPS