Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How G Suite Can Benefit Your Business

Tip of the Week: How G Suite Can Benefit Your Business

When you’re trying to run a business, there are a few things that you will require of your technology solutions. However, finding a solution that fits the bill isn’t always the easiest thing to do independently. That’s why we’re dedicating this week’s tip to an overview on using Google’s solutions for your business’ benefit.

0 Comments
Continue reading

Securing Your Google Account: The Unofficial Guide

Securing Your Google Account: The Unofficial Guide

If you use a computer today, there’s a fair chance that you have a Google account. The practicality that if offers with its comprehensive service offerings simply can’t be ignored. However, it is also important that a user’s, whether they utilize it for business or personal use, security isn’t ignored either.

0 Comments
Continue reading

Google Drive Offers More Shortcuts than a GPS

Google Drive Offers More Shortcuts than a GPS

Google has an assortment of solutions available on the Internet. Chances are, your business uses some of them. However, they probably aren’t using them as efficiently as they could. Google’s online solutions have a huge assortment of shortcuts available for each. Today, we’ll go over a few of them.

0 Comments
Continue reading

Google Maps Now Has Commuter-Friendly Features

Google Maps Now Has Commuter-Friendly Features

Maps are one of those very basic technologies that are always improving, starting as lines scratched into the ground and now living in our phones and giving us exponentially larger amounts of data. One of the first examples you may think of is Google Maps, which just got a few impressive updates that make the service even cooler.

0 Comments
Continue reading

There’s Nothing “Smashing” About the Nigelthorn Malware

There’s Nothing “Smashing” About the Nigelthorn Malware

Once again, there is an example of why all users need to be careful about what they install. This time, however, users of the Google Chrome browser are the ones being specifically targeted by a particularly nasty attack known as “Nigelthorn.”

0 Comments
Continue reading

4 Websites People Use Constantly

4 Websites People Use Constantly

The Internet is its own little world. Actually, it’s a massive world that presents a seemingly endless array of options. According to a study done by MIT, the average American spends 24 hours a week online. That’s an average. Some people are locked into the Internet every waking minute of their day. Despite its sheer size (currently over 644 million websites), people typically spend their time online on a very small number of sites. Today, we take a look at four of the most visited websites in the west and what makes them so popular.

0 Comments
Continue reading

Tech Terminology: Chromebook

Tech Terminology: Chromebook

Chromebooks are a pretty common device at this point, and this popularity only makes sense. For many, the Chromebook offers basic features that serve their purposes well, but there are those who wouldn’t be satisfied with their capabilities. This week, our Tech Term is Chromebook, so let’s take a closer look to gain a deeper understanding of them.

0 Comments
Continue reading

Tip of the Week: Managing Gmail with Labels and Filters

Tip of the Week: Managing Gmail with Labels and Filters

Gmail is a great way to take advantage of business email, but do you know all of the ins and outs of how to use some of its finer details? Today’s tip is dedicated to going over some of the more useful features of Gmail, like filters and labels--both of which will be helpful in controlling your inbox.

0 Comments
Continue reading

Google Will No Longer Display Results As You Type--Here’s Why

Google Will No Longer Display Results As You Type--Here’s Why

If you hadn’t yet noticed, there’s been a change made to the Google search engine that will influence how search results are presented to users. Google’s ‘Instant’ feature, introduced in 2010, is no more.

0 Comments
Continue reading

What's It Mean When Online Traffic is Concentrated to a Handful of Apps?

What's It Mean When Online Traffic is Concentrated to a Handful of Apps?

The Internet is always changing, and anyone who has been using it for a while has experienced this change for themselves. While it might be strange to think about, the latest statistics have proven that the current changes to the Internet are some of the most significant--especially for businesses. “Online business as usual” will be significantly different moving forward.

0 Comments
Continue reading

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

0 Comments
Continue reading

Tip of the Week: How to Lock and Unlock Your Google Wallet Card

b2ap3_thumbnail_google_wallet_400.jpgGoogle might be best known for its search engine and groups of desktop apps, but it’s also known for innovating and rattling the cages of how we live our lives. One of the ways it’s doing so is with Google Wallet, an app that’s designed to make sharing cash and money transfers online even easier. What a lot of people forget, however, is that Google Wallet, and its associated card, can still be the target of fraud.

0 Comments
Continue reading

Sorry, Windows XP Users: No More Google Chrome Updates for You

b2ap3_thumbnail_chrome_support_ending_400.jpgIt’s been quite some time since Microsoft cut the cord on Windows XP support, rendering it insecure and incredibly risky to run in a professional setting. This was quite a blow to both PC users and business professionals, but it’s about to get even worse for the antiquated operating system. Now, even Google is cutting support for their web browser, Google Chrome, for older operating systems from both Microsoft and Apple.

0 Comments
Continue reading

Tip of the Week: View Your Current Google Sessions for Optimal Security

b2ap3_thumbnail_google_sessions_400.jpgLogging into an account only to find out that you’ve been hacked can be a real hassle. If you’re wondering why and how this could have happened, you’re in luck; some accounts, like Google, record when and how the account is accessed, and finding out how is as easy as checking out your security settings. Here’s how you can see who is accessing your account, and how.

0 Comments
Continue reading

Tip of the Week: How to Search the Web Without Typing

b2ap3_thumbnail_drag_to_search_and_others_400.jpgHow fast are you at finding the information you need using Google Search? In today’s data-driven world, knowing how to effectively use Google is actually a marketable skill. Did you know that there are ways in Google Chrome to search for what you need that take less time than typing your query in the search bar?

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business Malware User Tips Computer Business Computing Network Security Internet Google Tech Term Productivity Microsoft Software Hosted Solutions Mobile Devices Efficiency IT Services Communication Small Business Backup Windows 10 Hardware Ransomware Android Smartphone Data IT Support Saving Money Workplace Tips Productivity Managed IT Services Data Management Browser Microsoft Office Server Business Continuity Upgrade Managed IT Services Internet of Things Gmail Cloud Computing Windows Facebook Data Recovery Office 365 Phishing Disaster Recovery Word Innovation Data Backup App Passwords Users Artificial Intelligence Remote Monitoring Outsourced IT Smartphones Managed Service Provider Employer-Employee Relationship VoIP Mobile Device Windows 10 Encryption Cybersecurity Business Management Spam IT Support Big Data Website communications BYOD Miscellaneous Applications Infrastructure Social Media Money Information Tip of the week Vulnerability Office Tips Network Chrome Analytics Government Content Filtering Display Bandwidth Router YouTube Robot Risk Management Employee-Employer Relationship IT Management Wireless Printing Managed Service Automation Maintenance Virtual Reality Firewall Customer Service Tablet Paperless Office WiFi Save Money Avoiding Downtime Antivirus The Internet of Things Hacker Settings Apple Two-factor Authentication Data storage Access Control Data loss Business Technology Virtual Private Network Outlook Business Intelligence Monitors Server Management Search Education IBM Mobile Security Document Management Touchscreen Apps Company Culture Operating System Mobile Device Management Telephone Systems Administration Customer Relationship Management End of Support Hacking Quick Tips Wi-Fi Computing Google Drive Scam Laptop Password Development Augmented Reality Mouse Vendor Management SaaS Presentation LiFi Networking Safety Computers Office VPN Holiday Storage Gadgets Downtime Unified Threat Management Wireless Technology Recovery Data Security HIPAA Retail Virtualization Hosted Solution Legal IP Address Cybercrime Alerts Service Level Agreement Digital Payment Work Content BDR Servers Distributed Denial of Service Voice over Internet Protocol Fraud Internet Exlporer Alt Codes Politics Dark Data Desktop Network Management Comparison Chromebook Drones Knowledge Title II Connectivity Spying Techology Sports SharePoint Going Green Collaboration Social Engineering Shortcuts Managed IT Modem Analysis Digital Lenovo Mobile Office Licensing Social Hard Drives Optimization Streaming Google Maps Managed IT Service FinTech Mail Merge Value Typing Tech Support Troubleshooting Specifications Compliance Experience Unified Communications Online IoT Deep Learning Humor Computer Care Unified Threat Management Downloads IT Technicians File Sharing Security Cameras Disaster Shortcut Break Fix Cookies Samsung User Spyware Superfish Running Cable Cooperation Hacks Refrigeration Recycling Human Error Statistics Public Speaking MSP Address Hotspot Professional Services Cryptocurrency Websites Identity Theft Virtual Desktop Black Friday Regulations Budget Patch Management Microsoft Excel Star Wars Bring Your Own Device sip Training PowerPoint User Error Buisness Multi-Factor Security Mirgation How To Competition Managing Stress Managed Services Uninterrupted Power Supply Dark Web Nanotechnology G Suite Lithium-ion battery Staff Automobile eWaste Device Bluetooth IT solutions Corporate Profile Language USB Bitcoin Network Congestion LED Cyber Monday Social Networking Solid State Drive Blockchain Cost Management Best Practice telephony Onboarding VoIP 5G Google Calendar Chatbots Information Technology Cables Laptops Net Neutrality Screen Reader Google Docs Slack How To Halloween Printer Wearable Technology Writing Undo Continuity Mobility Cortana Charging WannaCry Computing Infrastructure Dongle Windows 8 Marketing Smart Office Co-Managed IT IT service Heating/Cooling Fun Smart Technology Motherboard Remote Computing Software as a Service Hard Disk Drive Permissions Assessment Business Growth Application Digital Signage Time Management Legislation Identity Update Google Wallet Wires FCC Smart Tech Monitoring Firefox Scary Stories Current Events Solar Print Toner Cabling Processors Cameras Regulation Relocation Entertainment Tracking Meetings 3D Printing Cleaning Health Alert CCTV Private Cloud Emoji Webcam Unsupported Software Domains Work/Life Balance Electronic Medical Records Error Printers Black Market Point of Sale Mobile Data Law Enforcement Travel Notifications CrashOverride Botnet Supercomputer Twitter Gadget Staffing Motion Sickness Crowdsourcing Taxes Personal Information Mobile Computing Administrator Web Server Physical Security Emergency Machine Learning IT Budget GPS Upgrades IT Consultant Computer Repair