Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

One Phish, Two Phish, The Grinch Who Didn’t Phish

One Phish, Two Phish, The Grinch Who Didn’t Phish

An email’s important, that much is clear fact - but you need to stay safe from an email attack.

0 Comments
Continue reading

Why You Should Be Encrypting Your Emails

Why You Should Be Encrypting Your Emails

Encryption can be an invaluable tool for your company, especially where your email communications are concerned. Here, we’ll go over a few of the benefits you can see by adopting it - but first, we’ll briefly go over what encryption is.

0 Comments
Continue reading

Tip of the Week: Outlook 2016 Can Do More than You Think

Tip of the Week: Outlook 2016 Can Do More than You Think

Email is one of the most common productivity tools in any office. It can also be one of the easiest to become disorganized. However, users of Microsoft Outlook 2016 will find that the program provides plenty of useful tools to ensure that your communications don’t get out of hand. For this week’s tip, we’ll explore some of them.

0 Comments
Continue reading

Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

0 Comments
Continue reading

Tech Term: Opening the Spam Folder

Tech Term: Opening the Spam Folder

Spam is a tricky subject to talk about, as it seems everyone has a different definition for it. Yet, most have come to the conclusion that spam is a bad thing. For today’s Tech Term, we want to delve deep into the different kinds of spam out there, as well as theorize where the term even came from.

0 Comments
Continue reading

Tech Term: What Does “Encryption” Mean?

Tech Term: What Does “Encryption” Mean?

Email is a solution that needs to be protected, lest you expose important information to any onlookers while messages are in transit. Encryption is one of the key ways you can make sure that your messages are safe, but email hasn’t always used this method to secure messages. In fact, it wasn’t until relatively recently that encryption became a staple of the major email providers.

0 Comments
Continue reading

Tip of the Week: Managing Gmail with Labels and Filters

Tip of the Week: Managing Gmail with Labels and Filters

Gmail is a great way to take advantage of business email, but do you know all of the ins and outs of how to use some of its finer details? Today’s tip is dedicated to going over some of the more useful features of Gmail, like filters and labels--both of which will be helpful in controlling your inbox.

0 Comments
Continue reading

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

Tags:
0 Comments
Continue reading

Is Your In-House Email Server Worth It? Probably Not

Is Your In-House Email Server Worth It? Probably Not

If you’re like most businesses, you almost certainly rely on email on a daily basis. However, if your email is hosted on an in-house server, you are becoming less like many businesses, as they are moving their solutions to the cloud. Here’s why you should follow suit and make the switch yourself.

0 Comments
Continue reading

How a Single Hacker Stole $100 Million From Two Major Tech Companies

How a Single Hacker Stole $100 Million From Two Major Tech Companies

An unfortunate fact about the modern business world is that any organization that utilizes technology is playing with fire. Cyber attacks can circumvent even the most well-protected networks through the company’s users. This is, unfortunately, something that business owners often don’t learn until they’re on the receiving end of an attack; just like the two companies that fell victim to phishing attempts that were supposedly operated by Evaldas Rimasauskas, a Lithuanian hacker who has been accused of stealing $100 million from them.

0 Comments
Continue reading

Tip of the Week: 3 Tools for Simplifying Your Company’s Email

Tip of the Week: 3 Tools for Simplifying Your Company’s Email

Managing your company’s email can be a complex endeavor, due to the sheer volume of messages being sent and received, as well as the need to have a way to prioritize which messages are important. It’s safe to say that all organizations can benefit from email management solutions, such as email archiving and spam protection, and multi-factor authentication.

0 Comments
Continue reading

Tip of the Week: 4 Easy Ways to Share Files

Tip of the Week: 4 Easy Ways to Share Files

There are many ways to share a file between two computers. Being familiar with multiple options will certainly come in handy, especially when your preferred method of file sharing isn’t an option (like when you can’t find your flash drive, or maybe you lose Internet connection). For this week’s tip, here are four options to help your business more effectively share files.

0 Comments
Continue reading

Tip of the Week: Use Android to Get Gmail Functionality for Your Non-Gmail Email Account

b2ap3_thumbnail_switch_your_mail_to_gmail_400.jpgGmail is a great email client, but not everyone uses it as their primary method of email communication. Some might prefer Microsoft Outlook, or they might still be using Yahoo Mail. Even if Google wants you to be using their email service, they know that they can’t win them all. For those who want the experience of Gmail without switching providers, you can now do so on the Gmail app for Android.

0 Comments
Continue reading

Tip of the Week: Unsure if an Email Address is Valid? Here’s How to Check!

b2ap3_thumbnail_email_verification_400.jpgSometimes you might write an email to someone who you’ve never emailed before (perhaps you scrawled down their email while on the phone or at an event), and questioned the authenticity of your recipient’s email address. Those who use email frequently know all too well what this feels like. It makes the most sense to first make sure that you have the right email address before sending a message.

0 Comments
Continue reading

Tip of the Week: How to Spot and Avoid Email Spoofing

b2ap3_thumbnail_email_spoofing_400.jpgLet’s say you get an email from a close friend. It looks like it’s legitimate, until you check the contents of the message. It’s an advertisement, or it’s trying to get you to click on a link to see something “important.” Regardless of what the content of the message is, you should probably slap that bad boy in the Spam section of your email inbox. You’ve just been the target of email spoofing, and it’s more common than you might think.

0 Comments
Continue reading

Your Professional Business Needs a Professional Communications Strategy

b2ap3_thumbnail_unified_communications_400.jpgIt’s not always easy for businesses to keep up with the latest communications technology. Some organizations are still stuck in the days of using antiquated communication mediums that are specific to the individual, rather than to an organization. In order to optimize the way your business communicates both internally and externally, it’s critical that you address the following two opportunities for unified communications.

0 Comments
Continue reading

How to Get a Grip On Your Email Inbox

b2ap3_thumbnail_email_best_400.jpgEmail is an aging communication protocol, but it’s still an important asset nonetheless. Even though society continues to push toward bigger and greater things, the modern office still depends on having an email solution for a communication medium. While we can’t get away from email completely, it’s important to make sure that using it is as easy as possible, especially for the busy business owner.

0 Comments
Continue reading

Tip of the Week: Quickly and Easily Find That Long Lost Gmail Message

b2ap3_thumbnail_gmail_app_400.jpgAs great as Gmail is, sometimes, you might have difficulty locating certain messages, especially if they were sent months, or even years ago. If you happen to misplace a message, you can use the search feature to locate it.

Tags:
0 Comments
Continue reading

Make Your Digital Life Easier By Consolidating Your Various Email Accounts

b2ap3_thumbnail_solutions_400.jpgHow many email accounts do you have? At the very least, you have one for work and for one that’s personal, and if you’ve been doing email long enough, then you may have a few accounts left over from years ago which you rarely check (like your email address from college). Is there a way to combine these scattered accounts into an email address of your choice?

0 Comments
Continue reading

Tip of the Week: Ease Your Email Anxiety with MailTrack

b2ap3_thumbnail_mailtrack_400.jpg.jpgOne of the most unpleasant aspects regarding email is the anxiety associated with sending an important message. Did the message really send? Has the recipient read it yet? Should I contact them and ask if they got my email? The struggle is real. Thankfully, there’s a Chrome extension designed to alleviate this stress by answering these pressing questions.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business Malware User Tips Computer Business Computing Network Security Internet Google Microsoft Software Tech Term Productivity Hosted Solutions Mobile Devices Efficiency IT Services Communication Small Business Ransomware Backup Windows 10 Hardware Android Smartphone Data Saving Money IT Support Workplace Tips Productivity Microsoft Office Browser Managed IT Services Data Management Facebook Server Data Recovery Upgrade Business Continuity Internet of Things Managed IT Services Gmail Windows Cloud Computing Office 365 Phishing Word Disaster Recovery Passwords Innovation App Data Backup Cybersecurity Users Artificial Intelligence Remote Monitoring Smartphones Outsourced IT Business Management Managed Service Provider Employer-Employee Relationship VoIP Mobile Device Windows 10 Encryption Chrome Applications Content Filtering Analytics Spam Information Website IT Support Big Data Miscellaneous communications Social Media Infrastructure Money Government BYOD Tip of the week Office Tips Network Vulnerability Managed Service Apple Antivirus Hacker Settings Two-factor Authentication Virtual Reality Data storage Paperless Office Bandwidth Display YouTube Risk Management Robot Wireless Printing Automation IT Management Firewall Maintenance WiFi Access Control Customer Service Avoiding Downtime Router Tablet Save Money Employee-Employer Relationship The Internet of Things Gadgets Wireless Technology Computers Networking Recovery Downtime Virtualization Storage Retail Mobile Security Hosted Solution VPN Data Security Development Data loss Business Technology SaaS Outlook Virtual Private Network Monitors Search Education Server Management Holiday Apps IBM Unified Threat Management Touchscreen Hacking Administration Operating System Mobile Device Management Telephone Systems Customer Relationship Management End of Support Wi-Fi Computing Laptop Business Intelligence Password Quick Tips Google Drive Augmented Reality Mouse Vendor Management Document Management Presentation HIPAA Scam Safety Company Culture Office LiFi Application Title II Connectivity Fun Websites Identity Theft SharePoint Recycling Windows 8 Human Error How To Managed IT Service Modem MSP Google Wallet IT service Heating/Cooling Training Licensing Business Growth WannaCry Specifications Compliance Scary Stories Managing Stress Current Events Managed Services Time Management G Suite Value PowerPoint Hard Disk Drive Automobile Firefox Online IoT Legal Cabling Downloads IT Technicians IP Address Cybercrime eWaste Device Break Fix Cookies Drones BDR Servers Cooperation Alt Codes LED Dark Data Black Friday Regulations Sports Cables Going Green Laptops Social Engineering Network Management Hard Drives Hotspot Professional Services Knowledge Onboarding Mobility Techology Remote Computing Microsoft Excel Star Wars Slack Managed IT Multi-Factor Security Mirgation Mobile Office Continuity Social Dark Web Nanotechnology Charging Google Maps Staff Smart Office Typing Co-Managed IT Digital Lenovo Update User Cyber Monday Social Networking Wires Software as a Service Refrigeration Language USB Experience Unified Communications Deep Learning Digital Signage Humor Mail Merge Solar Hacks Print Toner Unified Threat Management Blockchain Cost Management Monitoring Disaster Shortcut Digital Payment Public Speaking Google Calendar Chatbots Running Cable Net Neutrality Screen Reader Virtual Desktop Budget Statistics Politics Competition Printer Wearable Technology Work Cryptocurrency Content Spyware Superfish Chromebook Smart Technology Motherboard Buisness Voice over Internet Protocol How To Computing Infrastructure Dongle Bring Your Own Device Desktop sip Address Collaboration Shortcuts User Error Permissions Assessment IT solutions Spying Uninterrupted Power Supply Patch Management Legislation Identity Lithium-ion battery FCC Smart Tech Analysis Bluetooth Tech Support Optimization Bitcoin Streaming Network Congestion Distributed Denial of Service 5G FinTech Information Technology Computer Care Undo Alerts Service Level Agreement Best Practice Troubleshooting telephony Corporate Profile File Sharing Halloween Security Cameras Writing VoIP Samsung Marketing Fraud Internet Exlporer Cortana Google Docs Solid State Drive Comparison Black Market Point of Sale Physical Security Upgrades Law Enforcement Printers Emergency Travel Notifications Twitter Botnet Supercomputer 3D Printing Gadget Staffing Motion Sickness Crowdsourcing Taxes Personal Information Administrator Web Server Machine Learning IT Budget Domains Unsupported Software GPS IT Consultant Computer Repair Processors Cameras Relocation Regulation Mobile Data Tracking Meetings Entertainment Cleaning Health Alert CCTV Private Cloud Webcam CrashOverride Emoji Work/Life Balance Electronic Medical Records Mobile Computing Error