Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Hackers User Tips Malware Microsoft Computer Business Computing Internet Google Network Security Hosted Solutions Productivity Software Tech Term Communication Mobile Devices Efficiency IT Services Hardware Data Small Business Backup Ransomware Smartphone Workplace Tips Windows 10 IT Support Android Productivity Microsoft Office Saving Money Browser Data Recovery Business Continuity Managed IT Services Data Management Cloud Computing Gmail Office 365 Internet of Things Managed IT Services Facebook Innovation Server Users Upgrade Windows Data Backup Word Passwords Smartphones Disaster Recovery Outsourced IT Windows 10 Phishing App Social Media Cybersecurity Chrome Employer-Employee Relationship Artificial Intelligence Business Management communications Remote Monitoring Managed Service Provider VoIP Mobile Device Encryption Vulnerability Network IT Support Hacker Content Filtering Managed Service Money Big Data Miscellaneous Government Information Infrastructure BYOD Spam Website Save Money Applications Apple Tip of the week Office Tips Analytics Display Antivirus Paperless Office Settings Two-factor Authentication Employee-Employer Relationship Firewall Bandwidth Robot YouTube WiFi Printing Avoiding Downtime Automation Education The Internet of Things Risk Management Wireless Access Control Virtualization IT Management Router Maintenance Customer Service Tablet Virtual Reality Data storage Networking Downtime SaaS Hacking Hard Disk Drive VPN Hosted Solution Company Culture Outlook Monitors Data Security Unified Threat Management Data loss Business Technology Holiday Virtual Private Network Presentation Search Operating System End of Support Server Management Chromebook Office IBM Development Touchscreen Gadgets Computing Wireless Technology Mobile Device Management Recovery Password HIPAA Administration Google Drive Document Management Telephone Systems Mouse Vendor Management Customer Relationship Management Wi-Fi Laptop LiFi Quick Tips Computers Augmented Reality Scam Storage Mobile Security Safety Solid State Drive Retail Business Intelligence Apps Employee-Employer Relationships User Cooperation Fun Optimization Streaming Refrigeration Legal How To Break Fix Cookies Analysis Public Speaking Alt Codes IT service Dark Data Heating/Cooling Hotspot Professional Services Troubleshooting Drones WannaCry Black Friday Regulations FinTech iOS Time Management Microsoft Excel Star Wars Scary Stories Going Green Social Engineering Multi-Factor Security Mirgation Security Cameras Competition Students Social Cabling Staff Recycling Human Error Remote Computing Firefox Dark Web Nanotechnology IP Address Cybercrime Typing BDR Servers Language USB Update Cyber Monday Social Networking MSP Scalability Humor Network Management Blockchain Cost Management Sports PowerPoint Google Calendar Chatbots Knowledge Managing Stress Managed Services Deep Learning Digital Payment Hacks Managed IT Printer Wearable Technology eWaste Device Undo Techology Net Neutrality Screen Reader Mobile Office Cryptocurrency Google Maps Computing Infrastructure Dongle LED Marketing Budget Digital Lenovo Smart Technology Motherboard Migration Politics Bring Your Own Device sip Permissions Assessment Onboarding Collaboration Application How To Mail Merge Legislation Identity Experience Unified Communications Cables Laptops Running Cable Slack Disaster Shortcut Continuity Mobility Unified Threat Management FCC Smart Tech Bitcoin Network Congestion Statistics Alerts Service Level Agreement Virtual Desktop Smart Office Co-Managed IT Spyware Superfish Distributed Denial of Service Charging Tech Support Best Practice telephony Fraud Internet Exlporer Buisness Digital Signage File Sharing Information Technology Address Comparison Wires Software as a Service Computer Care Lithium-ion battery Monitoring Uninterrupted Power Supply Writing Patch Management SharePoint IT solutions Solar Print Toner Samsung Google Docs User Error Title II Connectivity Websites Identity Theft Windows 8 Bluetooth Licensing Work Content Hard Drives Managed IT Service Modem Messaging Business Growth Value 5G Desktop Google Wallet Corporate Profile Specifications Compliance Voice over Internet Protocol Entertainment Training Online IoT Halloween Spying Automobile Current Events Downloads IT Technicians Cortana Shortcuts G Suite VoIP Botnet Supercomputer Twitter Motion Sickness 3D Printing Emergency Gadget Staffing Personal Information Administrator Crowdsourcing Taxes Machine Learning IT Budget Web Server Printers Unsupported Software GPS Computer Repair IT Consultant Relocation Processors Cameras Meetings Mobile Data Tracking Health Cleaning Private Cloud Alert CCTV Emoji Webcam Windows 7 Electronic Medical Records Work/Life Balance Error Mobile Computing Black Market Point of Sale CrashOverride Physical Security Regulation Domains Travel Upgrades Law Enforcement Notifications