Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Does Your Business Have a Sufficient Backup Plan?

Does Your Business Have a Sufficient Backup Plan?

Is your business prepared for any disasters that come its way? If you haven’t considered which threats could cause your operations the most trouble, you need to devise a strategy that takes all possibilities into account. Here, we’ll help guide you through these considerations.

0 Comments
Continue reading

Tip of the Week: Creating a Database in Excel

Tip of the Week: Creating a Database in Excel

When trying to keep a lot of data organized concisely, while still keeping it all accessible when needed, a database is an excellent tool to leverage. Furthermore, it can be fairly simple to generate one of your own by using Microsoft Excel. We’ll offer a few steps and tips to ensure you get the most out of this capability.

0 Comments
Continue reading

Tech Terminology: PDF

Tech Terminology: PDF

Today, while the world is still effectively split between PCs and Macs, we have at least one file format that bridges the divide: the PDF. This file format became standard in business communications, and is now used the world over. Today, we’ll dive into the history of the Portable Document Format and why it is so well-suited to business processes.

0 Comments
Continue reading

Hurricane Season is Half Over - Be Prepared for Next Year’s

Hurricane Season is Half Over - Be Prepared for Next Year’s

We have almost made it through this year’s hurricane season, but unfortunately, this doesn’t mean that businesses will suddenly be safe again. Many businesses that are impacted by these kinds of disasters are unprepared, and so when push comes to shove, some ultimately close their doors after trying (and failing) to bounce back. We’re going to tell you how to help avoid this outcome for your business the next time there’s a disaster.

0 Comments
Continue reading

Fileless Ransomware Uses Windows Tools Against You

Fileless Ransomware Uses Windows Tools Against You

By now everyone knows about ransomware, the dastardly strand of malware that encrypts data (or the drives it’s stored on) and sends the user a message demanding payment in a certain amount of time before the data is deleted forever. To add a little more menace to an already stressful situation, the message includes a countdown clock. If it sounds like a bad situation, rest assured it is. How could it get worse you ask? Simple, make it more difficult to stop.

0 Comments
Continue reading

Tip of the Week: How to Cut Back on Your Mobile Data Use

Tip of the Week: How to Cut Back on Your Mobile Data Use

One of the biggest benefits of mobile data is how useful it is to business users for networking and productivity while they’re on-the-go. However, one of the biggest drawbacks to mobile data is how easy it is to use up while networking and being productive, and how expensive this can be. Fortunately, there are some ways to reduce the amount of data an Android device uses, as we’ll discuss in this tip.

0 Comments
Continue reading

Why it’s a Big Mistake to Overlook Big Data

Why it’s a Big Mistake to Overlook Big Data

Managing your businesses technology is important because your operations rely heavily on efficient access to information. One advantage that secure and reliable IT provides is the ability to remain competitive, as the slightest advantage could mean a world of difference in your given market. One new IT trend is the analysis of big data. If it is leveraged properly, you could help your business get the leg up on local competition.

0 Comments
Continue reading

Forget Micro SD Cards, the Future is Molecular-Level Data Storage

Forget Micro SD Cards, the Future is Molecular-Level Data Storage

As far as leaps in computing go, this one’s pretty tiny: a research team from IBM has managed to store data on a single atom. Despite the microscopic size of the result, the impact is potentially huge when one considers the effects this discovery could have on computing.

0 Comments
Continue reading

New Technology Delivers Staggering Data Retention Options

b2ap3_thumbnail_light_data_storage_400.jpgAs more data systems develop the need for structured data storage, the development of fast and secure solutions have become essential to the viability of storing and retrieving data. Scientists have been looking at the field of optoelectronics to develop constructs where an enormous amount of data can be stored for exorbitant amounts of time.

0 Comments
Continue reading

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Hackers User Tips Malware Microsoft Computer Business Computing Internet Productivity Network Security Hosted Solutions Google Software Tech Term Mobile Devices Efficiency IT Services Communication Data Small Business Backup Hardware Smartphone Ransomware Workplace Tips Windows 10 Android IT Support Productivity Microsoft Office Saving Money Data Recovery Data Management Managed IT Services Browser Cloud Computing Business Continuity Gmail Internet of Things Facebook Windows Managed IT Services Server Users Innovation Upgrade Data Backup Word Office 365 Smartphones Disaster Recovery Passwords Outsourced IT App Windows 10 Phishing Social Media Employer-Employee Relationship Artificial Intelligence Managed Service Provider VoIP Remote Monitoring Encryption Network Chrome Mobile Device Business Management Vulnerability communications Cybersecurity Analytics IT Support Money Infrastructure Office Tips Spam Website Hacker Government Managed Service Content Filtering Save Money Tip of the week BYOD Big Data Information Apple Applications Miscellaneous Data storage Education Firewall Risk Management Display Wireless WiFi Virtual Reality Robot Avoiding Downtime Paperless Office The Internet of Things Printing Automation Customer Service Virtualization IT Management Employee-Employer Relationship Settings Maintenance Two-factor Authentication Access Control Router Bandwidth Tablet YouTube Antivirus Search Retail Document Management Mobile Security Hacking IBM Hard Disk Drive VPN Data Security Outlook Data loss Business Technology Administration Mobile Device Management Presentation Monitors Customer Relationship Management Virtual Private Network Wi-Fi Laptop Server Management Office SaaS Wireless Technology Business Intelligence Augmented Reality Touchscreen Gadgets Operating System End of Support Recovery Safety Computing Telephone Systems Unified Threat Management Company Culture Password Holiday Google Drive Downtime Quick Tips Mouse Vendor Management HIPAA Scam Hosted Solution Chromebook LiFi Apps Computers Solid State Drive Storage Networking Development WannaCry Specifications Compliance Public Speaking Cables Laptops Current Events IT service Heating/Cooling Tech Support Value Mobile Office Onboarding IT Technicians Competition Continuity Mobility Time Management Computer Care Online IoT Slack Legal File Sharing Downloads Smart Office Co-Managed IT Alt Codes Dark Data Firefox Samsung Break Fix Cookies Charging Experience Unified Communications Drones Cabling Cooperation Black Friday Regulations Wires Software as a Service Going Green BDR Social Engineering Servers Websites Identity Theft Hotspot Professional Services Digital Signage Running Cable Multi-Factor Security Mirgation Solar Print Toner Virtual Desktop Social Network Management Training Microsoft Excel Star Wars Monitoring Undo Work Content Buisness Typing Techology G Suite Dark Web Nanotechnology Messaging Managed IT Automobile Staff Desktop Deep Learning Humor Digital Lenovo Cyber Monday Social Networking Voice over Internet Protocol Entertainment IT solutions Google Maps Language USB Marketing Lithium-ion battery Google Calendar Chatbots Shortcuts Hacks Blockchain Cost Management Application Spying Mail Merge Optimization 5G Streaming Cryptocurrency Unified Threat Management Net Neutrality Screen Reader Analysis Employee-Employer Relationships Budget Disaster Shortcut Printer Wearable Technology Troubleshooting Halloween Bring Your Own Device sip Spyware Superfish Remote Computing Smart Technology Motherboard FinTech Cortana iOS How To Statistics Computing Infrastructure Dongle Update Legislation Identity Fun Security Cameras Permissions Assessment Address Recycling Human Error Bitcoin Network Congestion User Error FCC Smart Tech Students Uninterrupted Power Supply Patch Management Hard Drives Scary Stories Best Practice telephony Distributed Denial of Service MSP Scalability Information Technology Bluetooth Digital Payment Alerts Service Level Agreement Comparison Managing Stress Managed Services Writing Politics Fraud Internet Exlporer IP Address PowerPoint Cybercrime Google Docs Corporate Profile eWaste Device Windows 8 VoIP Title II Connectivity Collaboration SharePoint Refrigeration LED Sports Business Growth How To Managed IT Service Modem User Knowledge Migration Google Wallet Licensing Emergency Emoji Webcam Work/Life Balance Electronic Medical Records Windows 7 3D Printing Error Black Market Point of Sale Travel Law Enforcement Notifications Regulation Unsupported Software Twitter Botnet Supercomputer Motion Sickness Gadget Staffing Crowdsourcing Taxes Mobile Data Personal Information Administrator Web Server Machine Learning IT Budget GPS IT Consultant Computer Repair Printers CrashOverride Processors Cameras Relocation Meetings Domains Mobile Computing Tracking Cleaning Physical Security Health Alert CCTV Upgrades Private Cloud