Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Lock and Unlock Your Google Wallet Card

b2ap3_thumbnail_google_wallet_400.jpgGoogle might be best known for its search engine and groups of desktop apps, but it’s also known for innovating and rattling the cages of how we live our lives. One of the ways it’s doing so is with Google Wallet, an app that’s designed to make sharing cash and money transfers online even easier. What a lot of people forget, however, is that Google Wallet, and its associated card, can still be the target of fraud.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business Malware User Tips Computer Business Computing Productivity Network Security Google Internet Microsoft Software Tech Term Hosted Solutions Mobile Devices Efficiency IT Services Communication Small Business Backup Ransomware Windows 10 Hardware Smartphone Data IT Support Android Microsoft Office Saving Money Workplace Tips Productivity Data Management Cloud Computing Browser Managed IT Services Data Recovery Business Continuity Internet of Things Managed IT Services Facebook Server Windows Data Backup Upgrade Gmail Innovation Outsourced IT Windows 10 App Users Phishing Word Office 365 Passwords Smartphones Disaster Recovery Managed Service Provider VoIP Mobile Device Encryption Artificial Intelligence Vulnerability Chrome Cybersecurity Social Media Business Management Employer-Employee Relationship communications Remote Monitoring Apple Applications Analytics IT Support Spam Managed Service Website Office Tips Network Tip of the week Information Hacker Money Content Filtering Government Big Data Miscellaneous BYOD Infrastructure Wireless Access Control Save Money WiFi Router Avoiding Downtime The Internet of Things IT Management Maintenance Data storage Employee-Employer Relationship Virtual Reality Display Customer Service Paperless Office Tablet Settings Antivirus Robot Two-factor Authentication Printing Automation Bandwidth YouTube Firewall Risk Management HIPAA Presentation Document Management Server Management Business Intelligence Administration Touchscreen LiFi Mobile Device Management Office Computers Customer Relationship Management Storage Wi-Fi Wireless Technology Gadgets Telephone Systems Virtualization Company Culture Retail Recovery Laptop Mobile Security Augmented Reality Quick Tips Scam Outlook SaaS Safety Monitors Downtime Networking Development Unified Threat Management Apps Holiday Hosted Solution VPN Operating System Hacking End of Support Data Security Chromebook Data loss Business Technology Computing Virtual Private Network Password Search Education Google Drive Mouse Vendor Management IBM telephony Desktop Digital Lenovo Information Technology Voice over Internet Protocol Entertainment Tech Support Experience Unified Communications FCC Smart Tech Google Maps Best Practice Alerts Service Level Agreement Undo Mail Merge Writing Shortcuts Computer Care Distributed Denial of Service Google Docs Spying File Sharing Running Cable Fraud Internet Exlporer Marketing Disaster Shortcut Windows 8 Optimization Streaming Samsung Virtual Desktop Comparison Unified Threat Management Analysis Business Growth Troubleshooting Buisness SharePoint Spyware Superfish Google Wallet FinTech iOS Websites Identity Theft Title II Connectivity Application Statistics Licensing Address Current Events Security Cameras Training IT solutions Managed IT Service Modem Lithium-ion battery Value Uninterrupted Power Supply Patch Management Recycling Human Error G Suite Specifications Compliance User Error Legal Automobile Bluetooth Alt Codes Dark Data 5G Downloads IT Technicians Drones MSP Scalability Online IoT Cooperation Corporate Profile Going Green Managing Stress Social Engineering Managed Services Cortana Break Fix Cookies PowerPoint Halloween Hotspot Professional Services Hard Drives Solid State Drive Social eWaste Device Fun Black Friday Regulations VoIP Typing LED Remote Computing Multi-Factor Security Mirgation How To Migration Microsoft Excel Star Wars Scary Stories Staff WannaCry Cables Laptops Dark Web Nanotechnology IT service Heating/Cooling Deep Learning Humor Onboarding Update Language USB Refrigeration Hard Disk Drive Hacks Continuity Mobility Cyber Monday Social Networking User Time Management Slack IP Address Cybercrime Cabling Cryptocurrency Smart Office Co-Managed IT Google Calendar Chatbots Public Speaking Firefox Budget Charging Digital Payment Blockchain Cost Management Sports Printer Wearable Technology Competition Wires How To Software as a Service Politics Knowledge Net Neutrality Screen Reader BDR Servers Bring Your Own Device sip Digital Signage Computing Infrastructure Dongle Solar Print Toner Smart Technology Motherboard Network Management Monitoring Mobile Office Collaboration Managed IT Bitcoin Work Network Congestion Content Legislation Identity Techology Messaging Permissions Assessment Emoji Webcam Mobile Computing Work/Life Balance Electronic Medical Records Physical Security Error Black Market Point of Sale Upgrades Law Enforcement Travel Notifications Printers Twitter CrashOverride 3D Printing Botnet Supercomputer Gadget Staffing Motion Sickness Crowdsourcing Taxes Personal Information Administrator Web Server Domains Unsupported Software Machine Learning IT Budget Emergency GPS IT Consultant Computer Repair Processors Cameras Mobile Data Windows 7 Relocation Meetings Tracking Cleaning Health Alert CCTV Regulation Private Cloud