Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

“Paying the Ransom” Isn’t a Ransomware Defense

“Paying the Ransom” Isn’t a Ransomware Defense

Ransomware has become a favorite attack vector for hackers - after all, for them, it’s pretty much a no loss game. They either get paid, or they move on to their next target. Unfortunately, cyberattackers that dispatch ransomware often do get paid, and these payments can sometimes come from a surprising source: cybersecurity firms.

0 Comments
Continue reading

Tip of the Week: How to Keep Your Files Properly Organized

Tip of the Week: How to Keep Your Files Properly Organized

Now that we have access to better file storage and management than the file cabinets that we’ve historically utilized, our capabilities have increased exponentially… assuming, of course, that our better file storage and management solutions are kept organized. As this organization is so crucial to successfully undergoing your operations, we’re offering a few tips to help you keep your files in order.

0 Comments
Continue reading

Does Your Business Have a Sufficient Backup Plan?

Does Your Business Have a Sufficient Backup Plan?

Is your business prepared for any disasters that come its way? If you haven’t considered which threats could cause your operations the most trouble, you need to devise a strategy that takes all possibilities into account. Here, we’ll help guide you through these considerations.

0 Comments
Continue reading

Tip of the Week: Creating a Database in Excel

Tip of the Week: Creating a Database in Excel

When trying to keep a lot of data organized concisely, while still keeping it all accessible when needed, a database is an excellent tool to leverage. Furthermore, it can be fairly simple to generate one of your own by using Microsoft Excel. We’ll offer a few steps and tips to ensure you get the most out of this capability.

0 Comments
Continue reading

Tech Terminology: PDF

Tech Terminology: PDF

Today, while the world is still effectively split between PCs and Macs, we have at least one file format that bridges the divide: the PDF. This file format became standard in business communications, and is now used the world over. Today, we’ll dive into the history of the Portable Document Format and why it is so well-suited to business processes.

0 Comments
Continue reading

Hurricane Season is Half Over - Be Prepared for Next Year’s

Hurricane Season is Half Over - Be Prepared for Next Year’s

We have almost made it through this year’s hurricane season, but unfortunately, this doesn’t mean that businesses will suddenly be safe again. Many businesses that are impacted by these kinds of disasters are unprepared, and so when push comes to shove, some ultimately close their doors after trying (and failing) to bounce back. We’re going to tell you how to help avoid this outcome for your business the next time there’s a disaster.

0 Comments
Continue reading

Fileless Ransomware Uses Windows Tools Against You

Fileless Ransomware Uses Windows Tools Against You

By now everyone knows about ransomware, the dastardly strand of malware that encrypts data (or the drives it’s stored on) and sends the user a message demanding payment in a certain amount of time before the data is deleted forever. To add a little more menace to an already stressful situation, the message includes a countdown clock. If it sounds like a bad situation, rest assured it is. How could it get worse you ask? Simple, make it more difficult to stop.

0 Comments
Continue reading

Tip of the Week: How to Cut Back on Your Mobile Data Use

Tip of the Week: How to Cut Back on Your Mobile Data Use

One of the biggest benefits of mobile data is how useful it is to business users for networking and productivity while they’re on-the-go. However, one of the biggest drawbacks to mobile data is how easy it is to use up while networking and being productive, and how expensive this can be. Fortunately, there are some ways to reduce the amount of data an Android device uses, as we’ll discuss in this tip.

0 Comments
Continue reading

Why it’s a Big Mistake to Overlook Big Data

Why it’s a Big Mistake to Overlook Big Data

Managing your businesses technology is important because your operations rely heavily on efficient access to information. One advantage that secure and reliable IT provides is the ability to remain competitive, as the slightest advantage could mean a world of difference in your given market. One new IT trend is the analysis of big data. If it is leveraged properly, you could help your business get the leg up on local competition.

0 Comments
Continue reading

Forget Micro SD Cards, the Future is Molecular-Level Data Storage

Forget Micro SD Cards, the Future is Molecular-Level Data Storage

As far as leaps in computing go, this one’s pretty tiny: a research team from IBM has managed to store data on a single atom. Despite the microscopic size of the result, the impact is potentially huge when one considers the effects this discovery could have on computing.

0 Comments
Continue reading

New Technology Delivers Staggering Data Retention Options

b2ap3_thumbnail_light_data_storage_400.jpgAs more data systems develop the need for structured data storage, the development of fast and secure solutions have become essential to the viability of storing and retrieving data. Scientists have been looking at the field of optoelectronics to develop constructs where an enormous amount of data can be stored for exorbitant amounts of time.

0 Comments
Continue reading

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business User Tips Microsoft Malware Business Computing Hosted Solutions Network Security Computer Google Productivity Software Internet Communication Tech Term Data Small Business Efficiency IT Services Ransomware Mobile Devices Backup Workplace Tips Hardware Windows 10 Smartphone Cloud Computing Saving Money Data Recovery IT Support Android Microsoft Office Productivity Office 365 Upgrade Social Media Windows Information Gmail Browser Data Management Business Continuity Facebook Managed IT Services Users Phishing Innovation Word Managed IT Services Mobile Device Server Internet of Things Data Backup App Outsourced IT Passwords Windows 10 Miscellaneous Smartphones Disaster Recovery Business Management Encryption Employer-Employee Relationship Network Chrome Remote Monitoring communications Artificial Intelligence Vulnerability Managed Service Provider VoIP Cybersecurity Managed Service Apps Government Save Money Office Tips Hacker Applications Infrastructure BYOD Apple Content Filtering Analytics IT Support Big Data Virtual Reality Gadgets Money Tip of the week Spam Website Unified Threat Management VPN Customer Service Access Control Augmented Reality Router Development Settings Firewall Two-factor Authentication Data storage Display Bandwidth IT Management WiFi YouTube Avoiding Downtime Maintenance The Internet of Things Education Robot Virtualization Risk Management Tablet Wireless Paperless Office Printing Automation Antivirus Employee-Employer Relationship Bring Your Own Device Wi-Fi Computing Laptop Password Hard Disk Drive Holiday Google Drive HIPAA Mouse Vendor Management Data Security Data loss Business Technology Hacking Safety Chromebook Virtual Private Network LiFi Collaboration Computers OneNote Storage Server Management Downtime Touchscreen Retail Mobile Security Hosted Solution Document Management Presentation Telephone Systems Outlook Office Monitors Wireless Technology Search Quick Tips Business Intelligence Scam Recovery IBM Mobile Device Management SaaS Solid State Drive Administration Operating System Company Culture End of Support Networking Customer Relationship Management Recycling sip Human Error IT service Heating/Cooling Hard Drives Smart Technology Buisness Motherboard Remote Computing How To Students WannaCry Computing Infrastructure Dongle Lithium-ion battery Legislation Identity Update MSP Scalability Permissions IT solutions Assessment Time Management Bitcoin Managing Stress Network Congestion Managed Services Cabling FCC Smart Tech PowerPoint Updates Firefox Best Practice eWaste telephony Device BDR Servers Refrigeration 5G Distributed Denial of Service Information Technology Mixed Reality User Alerts Service Level Agreement Digital Payment Network Management Comparison Halloween Writing Migration Public Speaking Cortana Fraud Internet Exlporer Politics Google Docs LED SharePoint Windows 8 Cables Laptops Managed IT Competition Fun Title II Connectivity Onboarding Techology Business Growth Continuity Mobility Google Maps Managed IT Service Modem Google Wallet Slack Data Breach Digital Lenovo Licensing Private Cloud Specifications Scary Stories Compliance Current Events Charging Mail Merge Value Tech Support Smart Office Co-Managed IT IP Address Downloads Cybercrime IT Technicians File Sharing Wires Software as a Service Disaster Shortcut Online IoT Computer Care Legal Digital Signage GDPR Unified Threat Management Alt Codes Solar Dark Data Print Toner Statistics Undo Break Fix Cookies Samsung Drones Monitoring Hard Disk Drives Spyware Superfish Cooperation Content Marketing Black Friday Sports Regulations Going Green Social Engineering Messaging Address Knowledge Hotspot Professional Services Websites Identity Theft Work Application Mobile Office Multi-Factor Security Mirgation Social Voice over Internet Protocol Entertainment Uninterrupted Power Supply Patch Management Microsoft Excel Star Wars Training Desktop User Error Automobile Typing Shortcuts Bluetooth Dark Web Nanotechnology G Suite Spying Solid State Drives Staff Deep Learning Optimization Humor Streaming Cyber Monday Social Networking Analysis Employee-Employer Relationships Corporate Profile Experience Language Unified Communications USB Google Calendar Running Cable Chatbots Hacks FinTech iOS Blockchain Cost Management Troubleshooting VoIP Wearable Technology Cryptocurrency Security Cameras Net Neutrality Virtual Desktop Screen Reader Budget National Security How To Printer Web Server Emergency Machine Learning IT Budget Domains GPS Printers Computer Repair IT Consultant Processors Cameras Relocation Meetings Mobile Computing Tracking Health Cleaning Physical Security Alert CCTV Upgrades Emoji Webcam Windows 7 Electronic Medical Records Work/Life Balance Error 3D Printing Black Market Point of Sale Regulation Travel Law Enforcement Data Warehouse Notifications Unsupported Software CrashOverride Twitter Botnet Supercomputer Motion Sickness Gadget Staffing Personal Information Administrator Crowdsourcing Taxes Mobile Data Business Analysis