Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Social Media Can Be a Great Business Tool, So Long as It’s Secured

Social Media Can Be a Great Business Tool, So Long as It’s Secured

There is no denying that social media is one of the most powerful communication tools of our time, especially for businesses trying to communicate with their clients and customers. However, while you will want to have an account for your business on social media, you might not want a presence of your own. Today, we’ll discuss this quandary, and how you can resolve it.

0 Comments
Continue reading

Tip of the Week: How to Hide Yourself from Skype

Tip of the Week: How to Hide Yourself from Skype

In a recent update, Microsoft added Skype to the taskbars of many PCs. While many may believe that they don’t use Skype, they actually have an account because it is tied to their Microsoft account. If you don’t want people to be able to find you on the video chatting service, you’re going to want to follow the instructions we’ve outlined here.

0 Comments
Continue reading

Have You Adopted Messaging in Your Business Processes?

Have You Adopted Messaging in Your Business Processes?

It has become more evident than ever: any business that wants to be successful needs to have the proper means of communication established. For many years, this meant utilizing email for business correspondence. Now, while email still has a valuable place in business operations, users rely on messaging platforms that almost ensure that they get their point across instantly.

0 Comments
Continue reading

Tech Terminology: PDF

Tech Terminology: PDF

Today, while the world is still effectively split between PCs and Macs, we have at least one file format that bridges the divide: the PDF. This file format became standard in business communications, and is now used the world over. Today, we’ll dive into the history of the Portable Document Format and why it is so well-suited to business processes.

0 Comments
Continue reading

How to Select a Phone Solution (and How to Properly Use It)

How to Select a Phone Solution (and How to Properly Use It)

Considering how long we’ve had access to the basic technology, telephones (and proper telephone etiquette while using them) haven’t changed all that much on the surface. What has changed is how the technology fundamentally works, and the options that are available for businesses. Here, we’ll go over some of the options today’s businesses have.

0 Comments
Continue reading

Why You Should Be Encrypting Your Emails

Why You Should Be Encrypting Your Emails

Encryption can be an invaluable tool for your company, especially where your email communications are concerned. Here, we’ll go over a few of the benefits you can see by adopting it - but first, we’ll briefly go over what encryption is.

0 Comments
Continue reading

How to Form Better Business Relationships

How to Form Better Business Relationships

“Even the Lone Ranger didn’t do it alone.” - Harvey MacKay

In business, there’s a good argument to be made that the most important capital is your social capital. In other words, your relationships with those around you hold quite a bit of value. Below, we’ll review some ways to form positive relationships with those that you have connected with as a result of your business operations.

0 Comments
Continue reading

Checking in on Today’s Virtual Assistants

Checking in on Today’s Virtual Assistants

The virtual assistant has become a commonly-known feature of most technology around today. While many people might first associate them with their mobile devices, virtual assistants have been appearing in more and more technologies. What assistants are out there today, and what capabilities do they have? Let’s discuss.

0 Comments
Continue reading

Spruce Up Your Business with Digital Signs

Spruce Up Your Business with Digital Signs

The modern office is a wonderland of incredible new technology solutions designed to augment both your employees’ and your visitors’ experience, and nowhere is this more true than with digital signage.

0 Comments
Continue reading

Tip of the Week: How to Add a Watermark in Microsoft Word

Tip of the Week: How to Add a Watermark in Microsoft Word

Adding a watermark to a document is a great way to very visibly share a message about the contents of a document. Microsoft Word makes it pretty easy to do it yourself and leverage the associated benefits. Below, we explain how.

0 Comments
Continue reading

Tech Term: What Does “Encryption” Mean?

Tech Term: What Does “Encryption” Mean?

Email is a solution that needs to be protected, lest you expose important information to any onlookers while messages are in transit. Encryption is one of the key ways you can make sure that your messages are safe, but email hasn’t always used this method to secure messages. In fact, it wasn’t until relatively recently that encryption became a staple of the major email providers.

0 Comments
Continue reading

How to Keep IT and the Rest of Your Staff on the Same Side

How to Keep IT and the Rest of Your Staff on the Same Side

There are some facets to IT that are universally accepted as important, such as security. However, there are also others that create some conflicting opinions between management and IT personnel. When surveyed, business leaders and IT management held vastly different opinions as to the importance of various IT tasks. Is there a way to unify these priorities?

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Hackers User Tips Malware Microsoft Computer Business Computing Google Internet Network Security Hosted Solutions Productivity Software Tech Term Mobile Devices Communication Efficiency IT Services Hardware Data Small Business Backup Smartphone Ransomware Workplace Tips Windows 10 IT Support Android Productivity Microsoft Office Saving Money Data Recovery Business Continuity Managed IT Services Data Management Cloud Computing Browser Office 365 Gmail Internet of Things Managed IT Services Facebook Innovation Windows Server Data Backup Users Upgrade Word Disaster Recovery Smartphones Passwords Outsourced IT Windows 10 App Phishing Social Media Employer-Employee Relationship Artificial Intelligence communications Remote Monitoring Business Management Managed Service Provider VoIP Mobile Device Encryption Vulnerability Network Cybersecurity Chrome Big Data Miscellaneous Infrastructure Money Government Managed Service BYOD Spam Save Money Office Tips Website Information Tip of the week Applications Apple Hacker Analytics IT Support Content Filtering Bandwidth YouTube Paperless Office Firewall Robot Education Risk Management Printing Wireless WiFi Automation IT Management Avoiding Downtime The Internet of Things Employee-Employer Relationship Maintenance Access Control Virtualization Customer Service Router Tablet Settings Antivirus Data storage Two-factor Authentication Virtual Reality Display Data Security Data loss Business Technology Outlook Hacking SaaS Monitors Virtual Private Network Search Business Intelligence IBM Server Management Presentation Operating System Holiday Touchscreen Unified Threat Management Mobile Device Management End of Support Administration Company Culture Customer Relationship Management Telephone Systems Office Computing Wireless Technology Google Drive Wi-Fi Gadgets Password Chromebook Quick Tips Laptop Recovery HIPAA Mouse Vendor Management Scam Augmented Reality LiFi Document Management Development Safety Computers Solid State Drive Networking Storage Mobile Security Downtime Retail Hard Disk Drive VPN Hosted Solution Apps Wires Software as a Service IP Address Firefox Cybercrime User Alt Codes Dark Data Automobile Cooperation Digital Signage Cabling Refrigeration Drones G Suite Break Fix Cookies Print Toner Public Speaking Hotspot Professional Services Monitoring BDR Servers Going Green Social Engineering Black Friday Regulations Solar Microsoft Excel Star Wars Messaging Network Management Sports Social Multi-Factor Security Mirgation Work Content Knowledge Competition Nanotechnology Voice over Internet Protocol Entertainment Mobile Office Techology Typing Staff Desktop Managed IT Dark Web Shortcuts Digital Lenovo Deep Learning Humor Language USB Spying Google Maps Remote Computing Cyber Monday Social Networking Blockchain Cost Management Analysis Employee-Employer Relationships Hacks Update Google Calendar Chatbots Optimization Streaming Experience Mail Merge Unified Communications Net Neutrality Screen Reader FinTech iOS Running Cable Unified Threat Management Cryptocurrency Printer Wearable Technology Troubleshooting Disaster Shortcut Undo Budget Security Cameras Spyware Superfish Bring Your Own Device sip Digital Payment Computing Infrastructure Dongle Statistics Virtual Desktop Marketing How To Smart Technology Motherboard Politics Permissions Assessment Students Buisness Application Legislation Identity Recycling Human Error Address FCC Smart Tech MSP Scalability Lithium-ion battery User Error Bitcoin Network Congestion Collaboration Uninterrupted Power Supply Patch Management IT solutions Managing Stress Managed Services Best Practice telephony Alerts Service Level Agreement PowerPoint Bluetooth Information Technology Distributed Denial of Service Corporate Profile Google Docs Tech Support Fraud Internet Exlporer 5G Writing Comparison eWaste Device Title II Connectivity Migration VoIP Halloween Windows 8 File Sharing SharePoint LED Cortana Computer Care Cables Laptops How To Business Growth Licensing Onboarding Fun Hard Drives Google Wallet Samsung Managed IT Service Modem WannaCry Websites Identity Theft Value Slack IT service Heating/Cooling Current Events Specifications Compliance Continuity Mobility Online IoT Charging Time Management Scary Stories Downloads IT Technicians Smart Office Co-Managed IT Legal Training Notifications 3D Printing Botnet Supercomputer Twitter Gadget Staffing Regulation Motion Sickness Personal Information Administrator Crowdsourcing Unsupported Software Taxes Machine Learning IT Budget Web Server GPS Computer Repair Mobile Data IT Consultant Relocation Processors Cameras Tracking Meetings Health Printers Cleaning CrashOverride Private Cloud Alert CCTV Mobile Computing Emoji Webcam Electronic Medical Records Work/Life Balance Physical Security Error Upgrades Emergency Domains Black Market Point of Sale Windows 7 Travel Law Enforcement