Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

There’s Nothing “Smashing” About the Nigelthorn Malware

There’s Nothing “Smashing” About the Nigelthorn Malware

Once again, there is an example of why all users need to be careful about what they install. This time, however, users of the Google Chrome browser are the ones being specifically targeted by a particularly nasty attack known as “Nigelthorn.”

0 Comments
Continue reading

4 Websites People Use Constantly

4 Websites People Use Constantly

The Internet is its own little world. Actually, it’s a massive world that presents a seemingly endless array of options. According to a study done by MIT, the average American spends 24 hours a week online. That’s an average. Some people are locked into the Internet every waking minute of their day. Despite its sheer size (currently over 644 million websites), people typically spend their time online on a very small number of sites. Today, we take a look at four of the most visited websites in the west and what makes them so popular.

0 Comments
Continue reading

What's It Mean When Online Traffic is Concentrated to a Handful of Apps?

What's It Mean When Online Traffic is Concentrated to a Handful of Apps?

The Internet is always changing, and anyone who has been using it for a while has experienced this change for themselves. While it might be strange to think about, the latest statistics have proven that the current changes to the Internet are some of the most significant--especially for businesses. “Online business as usual” will be significantly different moving forward.

0 Comments
Continue reading

Tip of the Week: How to Keep a Facebook Friend From Viewing a Post You Don’t Want Them to See

Tip of the Week: How to Keep a Facebook Friend From Viewing a Post You Don’t Want Them to See

The advantage of Facebook is also its disadvantage: the fact that you’ve likely got a large variety of people on your friends list. While this works out great for networking, it may mean holding back on posting a personal opinion if it isolates or offends someone you’re friends with. To get around this social dilemma, Facebook allows you to hide your status from one or more friends. Here’s how to do it.

0 Comments
Continue reading

The Cause of Social Media Addiction and How to Stop It

b2ap3_thumbnail_social_media_blocking_400.jpgSocial media addiction is a problem that plagues most modern businesses. Even though it’s a best practice to leverage social media to your business’s advantage, it’s a well-known fact that social media addiction can lead to wasted time and distractions in the office. In order to beat social media addiction in the office, it’s best to understand how it comes about, and what you can do to help your workers leave it alone, rather than locking everything down completely.

0 Comments
Continue reading

Tip of the Week: How to Grow Your Professional Network Using Facebook

b2ap3_thumbnail_social_media_networking_400.jpgFacebook is a powerful networking tool that can help you build relationships with new professionals and introduce your product or service to entirely new markets and groups of people. That is if you know how to use it. Here are five steps you can take to get started with Facebook and use it to build a professional network.

0 Comments
Continue reading

Fans of Facebook Now Have a Facebook Business App

b2ap3_thumbnail_facebook_at_work_400.jpgFacebook has come a long way. Originally designed as a networking tool to be exclusively used by college students, Facebook now has 1.44 billion active users, making it the world’s largest social network. Today, businesses take Facebook seriously and utilize it for their marketing initiatives. However, it’s still viewed as a time-waster by many office managers who restrict or ban employees from accessing it.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business Malware User Tips Computer Business Computing Internet Network Security Tech Term Microsoft Software Productivity Google Hosted Solutions Mobile Devices Efficiency IT Services Small Business Communication Windows 10 Hardware Ransomware Backup Android Smartphone Data Workplace Tips Productivity IT Support Saving Money Data Management Managed IT Services Microsoft Office Browser Cloud Computing Internet of Things Gmail Data Recovery Windows Facebook Server Managed IT Services Upgrade Business Continuity Word Disaster Recovery Data Backup Passwords App Innovation Phishing Office 365 Mobile Device Windows 10 Business Management Smartphones Employer-Employee Relationship Managed Service Provider VoIP Cybersecurity Artificial Intelligence Encryption Remote Monitoring Users Outsourced IT communications Social Media Miscellaneous Government Information Applications Tip of the week Vulnerability Analytics BYOD IT Support Office Tips Money Network Infrastructure Chrome Spam Content Filtering Website Big Data Access Control Maintenance Save Money Router Apple Risk Management Tablet Wireless Data storage Firewall Antivirus Display WiFi Avoiding Downtime Customer Service The Internet of Things Robot Virtual Reality Printing Hacker Settings Automation Paperless Office Two-factor Authentication Bandwidth IT Management Employee-Employer Relationship Managed Service YouTube HIPAA Unified Threat Management Holiday Search Education LiFi Quick Tips Apps IBM Scam Computers Storage Hacking Development Administration Mobile Device Management Retail Customer Relationship Management Networking Mobile Security Wi-Fi Document Management VPN Outlook Laptop Presentation Augmented Reality Data Security Monitors Data loss Business Technology Office Virtual Private Network Gadgets Safety Wireless Technology Operating System Recovery Business Intelligence Virtualization End of Support Server Management Downtime SaaS Hosted Solution Touchscreen Computing Google Drive Company Culture Password Mouse Vendor Management Telephone Systems Update Knowledge Address Best Practice telephony MSP FCC Smart Tech Sports Information Technology Uninterrupted Power Supply Patch Management Google Docs Managing Stress Managed Services Distributed Denial of Service Mobile Office User Error Writing PowerPoint Alerts Service Level Agreement Digital Payment User eWaste Device Comparison Windows 8 Refrigeration Fraud Internet Exlporer Bluetooth SharePoint Corporate Profile Chromebook Experience Unified Communications Business Growth Title II Connectivity Politics Google Wallet Public Speaking LED Solid State Drive Collaboration Cables Laptops Managed IT Service Modem VoIP Running Cable Current Events Competition Onboarding Licensing Virtual Desktop Legal Continuity Mobility Specifications Compliance How To Slack Value Co-Managed IT Downloads IT Technicians WannaCry Alt Codes Dark Data Charging Online IoT IT service Heating/Cooling Tech Support Buisness Drones Smart Office Cooperation Hard Disk Drive File Sharing IT solutions Wires Software as a Service Break Fix Cookies Lithium-ion battery Time Management Computer Care Going Green Social Engineering Digital Signage Cabling Solar Print Toner Black Friday Regulations Firefox Samsung Social Undo Monitoring Hotspot Professional Services Work Content Multi-Factor Security Mirgation Typing Marketing Microsoft Excel Star Wars BDR 5G Servers Websites Identity Theft Staff Cortana Deep Learning Humor Application Voice over Internet Protocol Dark Web Nanotechnology Network Management Halloween Training Desktop Fun Managed IT Automobile Shortcuts Cyber Monday Social Networking Techology G Suite Hacks Spying Language USB Optimization Streaming Google Calendar Chatbots Digital Lenovo Cryptocurrency Analysis Blockchain Cost Management Google Maps Budget Printer Wearable Technology Mail Merge Bring Your Own Device sip FinTech Net Neutrality Screen Reader Scary Stories How To Troubleshooting Disaster Shortcut Security Cameras Smart Technology Motherboard IP Address Cybercrime Unified Threat Management Computing Infrastructure Dongle Recycling Human Error Legislation Identity Spyware Remote Computing Superfish Bitcoin Network Congestion Hard Drives Permissions Assessment Statistics GPS Domains Printers Computer Repair IT Consultant Mobile Computing Physical Security CrashOverride Processors Cameras Relocation Meetings Tracking Upgrades Health Cleaning Private Cloud Alert CCTV Emoji Emergency Webcam 3D Printing Electronic Medical Records Work/Life Balance Error Black Market Point of Sale Regulation Unsupported Software Travel Entertainment Law Enforcement Notifications Mobile Data Twitter Botnet Supercomputer Motion Sickness Gadget Staffing Personal Information Administrator Crowdsourcing Taxes Web Server Machine Learning IT Budget