Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Technology Allows Fake News to Spread

How Technology Allows Fake News to Spread

In today’s political, social, and economic environment, information is more valuable than ever. However, this increased importance, paired with the speed that data can be dispersed via the Internet, has enabled many to use false information to manipulate the general public into agreeing with their views and acting upon them.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers Malware User Tips Business Computing Microsoft Computer Hosted Solutions Google Network Security Internet Productivity Tech Term Software Communication Mobile Devices Efficiency IT Services Data Small Business Backup Ransomware Workplace Tips Windows 10 Hardware Smartphone Android IT Support Productivity Microsoft Office Saving Money Cloud Computing Data Management Browser Business Continuity Data Recovery Managed IT Services Innovation Data Backup Facebook Office 365 Server Users Upgrade Internet of Things Word Managed IT Services Windows Gmail Passwords Smartphones Disaster Recovery Phishing Social Media Outsourced IT App Windows 10 Network Chrome Vulnerability Cybersecurity communications Business Management Remote Monitoring Managed Service Provider VoIP Artificial Intelligence Employer-Employee Relationship Mobile Device Encryption Managed Service Hacker Tip of the week Applications Information Content Filtering Save Money Big Data Miscellaneous Apple Spam Government Website Analytics IT Support BYOD Infrastructure Money Office Tips Access Control Virtual Reality WiFi Settings Router Paperless Office Tablet Two-factor Authentication Avoiding Downtime The Internet of Things Antivirus Bandwidth Virtualization YouTube Education Risk Management Data storage Wireless Display IT Management Robot Customer Service Printing Firewall Maintenance Employee-Employer Relationship Automation HIPAA Quick Tips Safety End of Support Computing Presentation Scam Downtime Google Drive Password Office Mouse Vendor Management Solid State Drive Hosted Solution SaaS Gadgets Development Wireless Technology Networking LiFi Mobile Security Recovery Holiday Hard Disk Drive VPN Computers Unified Threat Management Data Security Search Storage Retail Data loss Business Technology IBM Virtual Private Network Chromebook Mobile Device Management Administration Customer Relationship Management Server Management Apps Outlook Touchscreen Business Intelligence Wi-Fi Document Management Monitors Hacking Laptop Telephone Systems Augmented Reality Company Culture Operating System User Error Recycling Human Error Halloween Budget Training FCC Uninterrupted Power Supply Smart Tech Patch Management Students Cortana Cryptocurrency How To G Suite Distributed Denial of Service Bluetooth MSP Scalability Fun Bring Your Own Device sip Automobile Alerts Service Level Agreement Comparison Managing Stress Managed Services Undo Fraud Corporate Profile Internet Exlporer PowerPoint SharePoint VoIP eWaste Marketing Device Scary Stories Title II Connectivity Bitcoin Network Congestion LED Application IP Address Cybercrime Information Technology Managed IT Service Modem Migration Best Practice telephony Licensing How To Writing Remote Computing Specifications IT service Compliance Heating/Cooling Cables Laptops Google Docs WannaCry Value Onboarding Downloads IT Technicians Time Management Continuity Mobility Sports Online IoT Slack Knowledge Windows 8 Update Cooperation Firefox Smart Office Co-Managed IT Mobile Office Google Wallet Break Fix Cabling Cookies Charging Business Growth Current Events Black Friday BDR Regulations Servers Wires Software as a Service Digital Payment Hotspot Professional Services Digital Signage Multi-Factor Security Mirgation Network Management Solar Print Toner Hard Drives Legal Politics Microsoft Excel Star Wars Monitoring Experience Unified Communications Staff Techology Work Content Running Cable Drones Dark Web Nanotechnology Managed IT Messaging Alt Codes Dark Data Collaboration Going Green Social Engineering Cyber Monday Google Maps Social Networking Voice over Internet Protocol Entertainment Virtual Desktop Language Digital USB Lenovo Desktop Google Calendar Chatbots Shortcuts Refrigeration Buisness Tech Support Blockchain Cost Management Mail Merge Spying User Social Printer Wearable Technology Unified Threat Management Optimization Streaming Lithium-ion battery Computer Care Net Neutrality Disaster Screen Reader Shortcut Analysis Employee-Employer Relationships Public Speaking IT solutions Typing File Sharing Samsung Smart Technology Motherboard Statistics FinTech iOS Competition Deep Learning Humor Computing Infrastructure Spyware Dongle Superfish Troubleshooting Legislation Identity Security Cameras 5G Websites Identity Theft Permissions Assessment Address Hacks Mobile Data Law Enforcement Travel Printers Notifications CrashOverride Twitter Botnet Supercomputer Gadget Staffing Motion Sickness Crowdsourcing Taxes Personal Information Administrator Mobile Computing Web Server Machine Learning IT Budget Emergency Physical Security GPS Upgrades IT Consultant Windows 7 Computer Repair Processors Cameras Relocation Meetings Tracking 3D Printing Cleaning Regulation Domains Health Alert CCTV Private Cloud Emoji Webcam Unsupported Software Work/Life Balance Electronic Medical Records Error Black Market Point of Sale